Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:31
Static task
static1
Behavioral task
behavioral1
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win10v2004-20241007-en
General
-
Target
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
-
Size
2.7MB
-
MD5
5f573a664988c7ae35ec36f0e619728e
-
SHA1
e9af094474fdb64ae89014abfd7fc67aff7b4324
-
SHA256
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992
-
SHA512
6ca73ea44d42869bbd99cdd1ba6853c76531868d50e8cf75bcfa27ea67c9de10d77fea177f08c3343b34107784520ccdd8d1a2b05e00fefe85e10f8800a38083
-
SSDEEP
49152:9AodtaG9kS2U84B+FLan9k5TRM9zlgVjgg0YOm+3iZ1o1e4XTur23ANIS://B1pY/ZiDG2a
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
redline
FOZ
212.162.149.53:2049
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b79-74.dat family_redline behavioral2/memory/212-90-0x0000000000E90000-0x0000000000EE2000-memory.dmp family_redline -
Redline family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2660 powershell.exe 700 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation server_BTC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 26 IoCs
pid Process 4964 alg.exe 1492 server_BTC.exe 2352 neworigin.exe 212 build.exe 2324 elevation_service.exe 5072 elevation_service.exe 2980 maintenanceservice.exe 716 OSE.EXE 3556 TrojanAIbot.exe 5100 DiagnosticsHub.StandardCollector.Service.exe 2500 fxssvc.exe 2180 msdtc.exe 1864 PerceptionSimulationService.exe 4424 perfhost.exe 1224 locator.exe 4776 SensorDataService.exe 2120 snmptrap.exe 5000 spectrum.exe 4940 ssh-agent.exe 4420 TieringEngineService.exe 2944 AgentService.exe 428 vds.exe 1936 vssvc.exe 4364 wbengine.exe 2224 WmiApSrv.exe 2772 SearchIndexer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org 11 api.ipify.org -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\151b682265f51a6c.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe jsc.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2616 set thread context of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_85500\java.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe elevation_service.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3908 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000308ae88fd963db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000829cfb8fd963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005ea7c890d963db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000fa1afd90d963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007cac4c90d963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bac5e38fd963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9909 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000eb76d58fd963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000014d45390d963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000475d5d90d963db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4748 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3556 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2660 powershell.exe 2660 powershell.exe 2352 neworigin.exe 2352 neworigin.exe 700 powershell.exe 700 powershell.exe 2324 elevation_service.exe 2324 elevation_service.exe 2324 elevation_service.exe 2324 elevation_service.exe 2324 elevation_service.exe 2324 elevation_service.exe 2324 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeTakeOwnershipPrivilege 1164 jsc.exe Token: SeDebugPrivilege 2352 neworigin.exe Token: SeDebugPrivilege 1492 server_BTC.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 3556 TrojanAIbot.exe Token: SeDebugPrivilege 4964 alg.exe Token: SeDebugPrivilege 4964 alg.exe Token: SeDebugPrivilege 4964 alg.exe Token: SeTakeOwnershipPrivilege 2324 elevation_service.exe Token: SeAuditPrivilege 2500 fxssvc.exe Token: SeRestorePrivilege 4420 TieringEngineService.exe Token: SeManageVolumePrivilege 4420 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 2944 AgentService.exe Token: SeBackupPrivilege 1936 vssvc.exe Token: SeRestorePrivilege 1936 vssvc.exe Token: SeAuditPrivilege 1936 vssvc.exe Token: SeBackupPrivilege 4364 wbengine.exe Token: SeRestorePrivilege 4364 wbengine.exe Token: SeSecurityPrivilege 4364 wbengine.exe Token: 33 2772 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2772 SearchIndexer.exe Token: SeDebugPrivilege 2324 elevation_service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2352 neworigin.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2660 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 84 PID 2616 wrote to memory of 2660 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 84 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 2616 wrote to memory of 1164 2616 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 86 PID 1164 wrote to memory of 1492 1164 jsc.exe 88 PID 1164 wrote to memory of 1492 1164 jsc.exe 88 PID 1164 wrote to memory of 1492 1164 jsc.exe 88 PID 1164 wrote to memory of 2352 1164 jsc.exe 89 PID 1164 wrote to memory of 2352 1164 jsc.exe 89 PID 1164 wrote to memory of 2352 1164 jsc.exe 89 PID 1164 wrote to memory of 212 1164 jsc.exe 90 PID 1164 wrote to memory of 212 1164 jsc.exe 90 PID 1164 wrote to memory of 212 1164 jsc.exe 90 PID 1492 wrote to memory of 700 1492 server_BTC.exe 96 PID 1492 wrote to memory of 700 1492 server_BTC.exe 96 PID 1492 wrote to memory of 700 1492 server_BTC.exe 96 PID 1492 wrote to memory of 4748 1492 server_BTC.exe 98 PID 1492 wrote to memory of 4748 1492 server_BTC.exe 98 PID 1492 wrote to memory of 4748 1492 server_BTC.exe 98 PID 1492 wrote to memory of 3556 1492 server_BTC.exe 100 PID 1492 wrote to memory of 3556 1492 server_BTC.exe 100 PID 1492 wrote to memory of 3556 1492 server_BTC.exe 100 PID 1492 wrote to memory of 4468 1492 server_BTC.exe 101 PID 1492 wrote to memory of 4468 1492 server_BTC.exe 101 PID 1492 wrote to memory of 4468 1492 server_BTC.exe 101 PID 4468 wrote to memory of 3908 4468 cmd.exe 103 PID 4468 wrote to memory of 3908 4468 cmd.exe 103 PID 4468 wrote to memory of 3908 4468 cmd.exe 103 PID 2772 wrote to memory of 3908 2772 SearchIndexer.exe 149 PID 2772 wrote to memory of 3908 2772 SearchIndexer.exe 149 PID 2772 wrote to memory of 4528 2772 SearchIndexer.exe 150 PID 2772 wrote to memory of 4528 2772 SearchIndexer.exe 150 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 03:36 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4748
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7F90.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5072
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2980
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:716
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:5100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4832
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2180
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:1864
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:4424
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1224
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4776
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2120
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5000
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1500
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:428
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2224
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3908
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:4528
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD53dd71d7b8ed7358e7591461d874c5c3e
SHA1b78f9caf7b9bf9cdfebf22a5c87099d9c9205e62
SHA2563fb7166e092701d8c8a5015d752d35ee2b5b29b474cc5ffa4b42c085ac31fb85
SHA51241111087655eaddb08a46a35d47852174f2a99095a7dd326574ae41fe5d7a8d25cfbedd87fed636d3d0f7e1b8915e4c9ded667fbd82a02bafee6f382135e6d13
-
Filesize
1.3MB
MD508d3d131167649c1886dec698ea5de8d
SHA1fd2b56454b099bb0d8bbebfef4b7354caf7a5960
SHA2562eecbf403c31fc735fb6d5efebd1f21e5859da1abf1bdd19651f54433c99826b
SHA5123b3032e45fccfd58d6d09cf74a1640183e63b527d6679008a3b8c55b8fa2923f81f6e451d4c98185deadbd4b6cd2df062b1e62928f6569a05e2510e5e0318810
-
Filesize
1.6MB
MD54691d7699c94fed945e6ebbb78864632
SHA157f0da0c78be7d27bd066e06ca8cf6936e7c13f3
SHA256d15a8ca2293257726bd709514a11a97fcd0d46c74777bf04b43d2c9e474ea7fe
SHA512da1fbd8b65dddb8388ca7f2b5ff05034e485041c4d2fc02cb7fd9b7120eb50eec0d30c98c00a776ba5fd91c7c21273e8beda078aac5d304d0e84385a4057999f
-
Filesize
1.5MB
MD5b163c864a3663a39b2ead5546edc6a63
SHA159b87fac0b1c83feba2d616cd8280e7d1175c072
SHA256ff61b666c715cbeb1a14420e75b8f9472405423094b5f46f24717831a887ada1
SHA512ff23335a6ac4b5de11521e046563be3f951e2cdf85ad420975290638305c24338d96a2ca4f2c449d10928f86975971305d63b028273195ab0875148967ca3079
-
Filesize
1.2MB
MD571628ed9a0dde8f1b32dd3e6403d118a
SHA1fd646b0ca55f2eff86ed34cdf43b68cdea0196a2
SHA256f69eaf7e7b0e5016de21cfaafe90cf6c0f261c1095a00068aad76ebbf676cd29
SHA5126b3fdc5cc2e5cb3908e0db4a8bcb7fa01b0af602d3ead396c5d4e001e03aa691be8fabf0405d34bc905902bc79fd94ec8b3b5b5a3e868563ee78e228eccf7389
-
Filesize
1.1MB
MD52cea350d21fbea2219b42be24200ffb1
SHA1d0ab7313d65b7097c85a81579f04cc218e262c55
SHA2565403718c02e8b766da12d6e43d580c71f581eb0074ff6aeddaf86bda3bd0fa98
SHA512f03c3fc612a18fe708d5ce8fda6843709685d2900b655a530d12c66afb1ab40b64e05dec07b20121720ce551228d76dbbb570480ec59d5f06e05d67b1a095e19
-
Filesize
1.3MB
MD5459850b38d8312ff3b1c8c42fda69670
SHA19b02d940bcaabe2693bccbba70421db44e50cf24
SHA256559b7d0c2c2803552bde26193817543ba2b430839e238cc5135cac6fec90e4e4
SHA51289a04b773b7f4ea63245887e490faed8f1769361d5a930284081032d91d78728663d731f705db82d7f58688b8ebedc1e6b2122caa44caea9f37d232e4e270e38
-
Filesize
4.6MB
MD5759b46576a53c1d746df7c87165612fd
SHA1d69373279d3d973ac6b100604d558d17038424c5
SHA2561c62394acaca164283213bc2bb421ea834ed7f3ddd07dad114fedc4563d4bd34
SHA5122b4ad147c7f2e9d11132e448a681050651b94d42e5f763a0905769bc637fbc2bcea609d810d502a6ff0fd7e263c3aa8ddd3bfe02aa177b134e148bfc0bf4f7f7
-
Filesize
1.4MB
MD58a99459ec9bb94852dc033e4a5694ca3
SHA164d20ff30a6c4e123395b9371781d895082a339e
SHA2568903fcea58fea4a80458c94378ddedaaedc2821c2b73dafd2cfbee9349326c05
SHA512d275d1b3d8335ab9a67ab49f83327eb20d6bde8f4a35df57e52d2e21a4ca38281f58611d6b72d77740b2eff5976c275a375b94363559201959f8601b16f249e6
-
Filesize
24.0MB
MD54bb9db70778fb6d921ba1e68cb98c048
SHA1c07fc01029f1a9ac53a6009e2fac94384f89602b
SHA2563024e860dd54f172c866a132713d5a910f096c84c04355dac7954dcf6372fc27
SHA512c88620f40dc3be8ff730fed59034a6618a246ee8e4a5d108828c2f53f6c107d63dcf45697b44dd202921b5e7cd1c03dc0edddeab08ed6864bdde51e1b9570971
-
Filesize
2.7MB
MD5eaf998ec323147b7a3122cd1a6ce13df
SHA1e4f64150d15abd421aca8ee5c3ef891589ba06e9
SHA256b7a00d4758a3ce706a9fd94516ae427e223aba11773588df65062fcc74439370
SHA5120ff1ef847499157743acf35fb1e5ec7617cf64192fb6aca64ca43300ec81eb991587f407ba5ebac57f1416ea7a0aa806554dbdfa02531efab8e468a61aeb9b95
-
Filesize
1.1MB
MD5ee375b399f82ae5d46136cb938335964
SHA1b950fd225319f19e5779e963fdef892f5f690be8
SHA256edcf2314aa615b6a3e90a4f9c4cb2cdf86810259e6bece07c24fc86921a57956
SHA5121ff5e27477007dc309a5556efc9c7fc8dd2b6dd92b6d53e9aa46ac84d2e400b4c9467313814f761e1f054d7fee8cbf36850d68e2804cab6ef78b1963d63d60d4
-
Filesize
1.3MB
MD5f71cc8dd5b6ea5ba5581644e0733a488
SHA16de2e7e2a7b3c43823d5a45a6865daf68c4c5012
SHA2563c90398aafffa347e3d54afa390e523cd4f50fa5cf6af617d5dbaa86316dc9fc
SHA512b46266509ef71d362ef883dc9ec6f389f1a4cf6e7faeabde22251452f567209aedf6112d794409855643dd87ac8b3c46e8a142c97072bbb10617d7c160e17703
-
Filesize
1.2MB
MD5d8d9890d5413c8dda0854997206646a5
SHA198a554d4db27cd33ba56b7f80c68737f63260f41
SHA2563a499b72f969d4bc4e13e844a7e693bdc8500558646b6b200a26f8ea9b5d5979
SHA512fa5063a990a0ba8451d85b030c672e8b735d434674e13d17876cbfc737dcfad0461b9421e962442fc840a28261cca9bf5f544068fe75d3c77add95f6c3db603b
-
Filesize
4.6MB
MD5b8bae909eed6dd4f5839b9e548bb5d93
SHA133683eb9f98e3e9e8edca2e4d96228ebf2be89ec
SHA25622bc5264753f07a20a99c5d9a2746527ab5013ff874bc2ac6efe8b02f37234f0
SHA512a01e7af334715c948d660392dd737e9b55b7b90e6364c802784f0065b37af4da057a32757f4f98254af2de025348766a6369920118842b5c60c142122ea54fde
-
Filesize
4.6MB
MD5c9e82501a851abd41776f4c94d82a0bb
SHA1897ce01b565e5ffcf4a5c8f96d0e83769b3e5b8a
SHA256123d866f2992c0cf759e760eacf5c566e33a2c6993f23a30dc70d8a4882423ad
SHA512684b9b1c88790c1413b0eceafe6a1910f159bf114f951cfbeb08f9803094d94ae638db8887e16d925c60f77512babeea5fc077e281b2d99657cbd349b9a36996
-
Filesize
1.9MB
MD56e2f6a05c335f632af7c31893254a416
SHA1dd7fedb5d31823247d0b0d394431ee64a6d8128c
SHA2566df04a8598d1a6130b77dd7418211f81508867c8911148aef219962ebd2afe6f
SHA512c766660fb1c430261af30dc693a644d4f0a5c83bff8aacfb9c88d4ef868f2b0ef7d6dfebe1dbc001a3bd0d0b6b91f783bca2d57710e931932eb012817436e488
-
Filesize
2.1MB
MD56c2f4e030ac7a8b75f94d76253943ab9
SHA15456b70661896b97bcd5125dba5b638fd0eb07ce
SHA2563f1178befd9fa5eeb5c4086ab1b0b6b67459ebe83ab6fd994c561071180954a4
SHA512496f60dab0cc4212f05805b2e614622e1831c927fd0184918bfad8cda385889a5894bbb529e36c95826977ea3ab6ab7b8d97090ca031f2399101b7af5179cf1f
-
Filesize
1.8MB
MD547aeea2735d91fff0f7f9cef2882ee47
SHA157ade30eaac485dd9b7d9f51069e5d51ee041243
SHA2569e36af07571c917b39fe907ec93efeb6597cc77efe9fed355d4ddad1f57c23fc
SHA512e7b917cb622c6ea084da6f7c43bca308d698fbc7b062969ca3370f654502c16c4d434dc78a6f84b8705ccf732fbefae890130bfd279ee71221ab79dd18bbce4e
-
Filesize
1.6MB
MD550e049186c44e917efff8c1e30872911
SHA1613dba8969200ebc5062373dbf0cc7f1a49f880a
SHA25697a3a6a020388c7b66cce3b943a32e68892204da3ce3e33d4e21281b6bad5cb8
SHA5120b5dfea9ab566d9aaec715f77a0692c6a7878ef426dff35f8868dcd1a8d4bf2085cbba29b2f0617a61685e7160851e5cb6cc379105dd00a440c37e30bb35409c
-
Filesize
1.1MB
MD5cc3ba34dd952b8c5aa95334804872bef
SHA1aa5578041969ee26ac5ab8f8f84780fd3618cab7
SHA25600929c239794b1b939d9b0c57ab94801919e803ef25707e164a5d3684d5e2818
SHA51222b12b3627afdb4a628270eeb8d9e82a78ff9197ce128740d088bc8679cc8f2847b799a399419b2ae1703c20f4cb77afcce5a3ae5fffa4be10e412488475cc12
-
Filesize
1.1MB
MD501a6f15259693ff2ad6b44223da07e97
SHA194e189a060343aebef580f11339a2d4a391f37fa
SHA256c09a8a19cc98c5d0e424d376b61815f6e09ab0de0617fc5399731b8081f80d79
SHA512f0735f10011b15a4f3332a7efbd49a9bf493567742f3eb02ffa9793cc36382361f29115f4d8cf7bb5153aa742ce1ea6cabc5553aa9fae0a4d00f561a08998c46
-
Filesize
1.1MB
MD5d6af0441775b159db06dd8ebec383a46
SHA1176f82e094fb2a94eaf41e7ef97dec7fa4a559a6
SHA256250cb36cb0afc9f62b4029d05035a4cbd93a35d7dc9e04157bd1845e83043be4
SHA512a26cfbbf70a9778a96d6425f1e622fc0040e3c30c9fd05031f7a00eaf976efa9b76c5bed67e28046c4bfeb9d42b932f38029cb98be458240124aecbe4ad89eca
-
Filesize
1.1MB
MD5170a4bfab0c446f87fa2c747a6683372
SHA11a0b22441e4bb6bfdbb60110d1654168382092f2
SHA256d43107be1aabdd84f4a99280b4ca3e3dd5a0703a8e8b059f59ec7213fd8d721d
SHA512aa495fba098f745fa24678c0aecd94bb5f28aababe0b4f32542cc60ccf2acf31fc716270d42735263876ea122c3a13d3779ff7c48f4a5913c59f19339ab2bc7a
-
Filesize
1.1MB
MD5719049e8de1dcac53fea5f192c7b0066
SHA1c4399f5477329c2ecd64dab9a4edf1ad86bba8ff
SHA256d7df103ca1f2ad0583c7aa7d6ab480e3f97b6d34d37e8deb52140ea07d51136a
SHA5122323cce434d41989f57925f16263567e0f22c6b3db8fe8aff4a342bd21df57caf553967f6de8d308ac82d3e584dcc36fad2c378d8d96c65f864858358b690c31
-
Filesize
1.1MB
MD52430c15de7b818e735ee8acacbebd214
SHA109865c899d7d570bf7c2a8a0df087896dbad68c7
SHA2569b211e2b8b84181c1e577f60f17bcc2fcbb20d2cf7f60af1e94a27f8fae4475a
SHA5128cebf24f99a71fa1503841926374b4f789e5b452b3018f0070a3b70d6403a46c90165a3025233d7273752df7bf0251c9f8ce2923794ca40c40b51716c6d66905
-
Filesize
1.1MB
MD5413367f753b5efcf5142fab283fd5b22
SHA154ccbce4e5517edb7cd0faffa7634e1f4e31d9e3
SHA256b4c8ba5c27d343159354ad34732d21b5ec1e702f10bd2f1ab196b6acac1553eb
SHA51218ab0d177afeb50b62baece6e43717ef10446daff8cb891ae018a5ccfe6bd1cf37dc7894e500c745987a79ed4c5053280aa4f32b9f727cd6683b6a9d7203ec10
-
Filesize
1.3MB
MD500a424aa4e603ea1e523a7f4db12737b
SHA13949143e85946d6002df650219abbacbbec36d90
SHA25666b66569da7c48a0bd3f429361d8b2c608c5346102298844386b8a8d3a0066cb
SHA512fcaeedda45dea6d9a753701ab79c1126865c862f9f550f626fafa249d16a9f5271448c9c690e6833c5dd2b35c22550c281d691c05aa80f434412beb393bb5319
-
Filesize
1.1MB
MD5d94e4306b5cee40675235e040d7c3a41
SHA180e2d63cec53fd472270fb767347bce08a8789a3
SHA256921ee44762c88e88ea9b4626bb3f42563c0be7d00e7b6f21966b74a7587ffcc4
SHA51210c2c373588f79b572a2c7b206593c55ee0852267e4d8a0f6a1d7e1cfb981e9a71abce25b5ddbd93d28227fe265f1a505832d3a79be1f5197cbd2fdcd7d9811c
-
Filesize
1.1MB
MD5afb1e699f711e02e7465bb1bff055178
SHA1c8fd70e5c5bd500e91db25549d456b81b29a1aeb
SHA2563af307b192781d4c17b983794baeb90d9734eb48b186cb2313ee0c13fded8001
SHA512c2a6cf6af13271634c80e5ec5e95597972477573fccfe26d2bae4c4a96e897628c97a09ac23a1b9ff06b0b7a2c3720d3202dcc911ec61054e0839666682ec015
-
Filesize
1.2MB
MD517f93e66a5ee7d2ed1bc38fc6c3d53a0
SHA12567e7b38b02b990262370ed4543f2dce1ca3f1f
SHA2561dfb3eecfd15e47da322169f92e01147f13ce645986355afe7df5474d5f47579
SHA512449299e620c8f483ccd2c5a1628c93b274a476cb45779215ede0f32cf2f9eafa55e542411bf8fe9e8b4bd6d3505283bbeead0e6cda755c8a9dbb6d05905bff59
-
Filesize
1.1MB
MD586ad8bcda42e435613b21e21cc3412ea
SHA120b3ab01b29f7c51ee969582daaa1f3513894b61
SHA256a868eb454ce8f5643f115927a8d5c18f1090e7e784f17b07885104a4b3c0965e
SHA512cff1c8c2a7e9705da649fa1e569f0963f98f78b04a8285735ea5cf99cda44d67a107b62f517f616a6ea9a4426df87dba0166ab67166df3f885efdf816d92e411
-
Filesize
1.2MB
MD56b71e9c634c1be5fb077652106f0e28a
SHA134089d785696aef7a7e0073a40b40777d6b625f5
SHA2560005bca1e18003a95c8c55292f7fce4575967199fd5141cd59f6a3a06366d753
SHA5125c3c983031a363da67af68405b9ca6b4e37216291490bbd41cb4c59c628cf15b3f81e3d39d8183ff624b09fb821d33dc5cc5e258fb65d0326b4d07e7c81a6c00
-
Filesize
3.2MB
MD589215db26220c027d80171c7bf80bae4
SHA147369087054ab58ea4ea1f263dac0d36fe624c0d
SHA25652a94e2518d3cb919a1fe06db8f952fcc719d786d3d01be5e66a2d46e860f8cb
SHA5121add3f238e2385fc6ccd78a79b9064bcc3e3a89ba42fb40303233e9b92c6aff46b84346e239833035b95a070915c4ac42583759d7b684a2a060c1777f04a30d5
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD5e6cbec75f524973dab46f5fcb055ebfe
SHA166e5aaafd93b2b722d4f86c5604fc4a6263c023f
SHA2567034ea9e17b1f22846025a236cf5010c0e40a13b057c6340fecf347f5ffe59f0
SHA512b7001b7a0704c84c06dda8e84bb72a8e3073b097504e24aefcc1f2af1cfb595ad71ea6b491f11298ef20233f49b6ffbcbb8899ecd10d1cc99521df5b3b97bb95
-
Filesize
1.1MB
MD5cddc64a5e8697307767105eef69e5c2b
SHA1f960ef92e6c7daf0a4d3f24c0ddad5f8dc936b1b
SHA256140a491d19ea5a4d38790a0a191b06d0f656cc3f98db281623c3c1ca55a89177
SHA5121bc60bd31fc8af8e4a10c6ca0836994e268801290797ceb752d9d6559f6d6b0013863300b8e02e2b50f9db79c8b2a20abc9a993bb97359d72c038a3653841d52
-
Filesize
1.7MB
MD590cbd4fc80756dd293d6370a7ae02781
SHA15c4365b00151addeff2cae5b754bf53272f13bc6
SHA2569cfa78aa55678af475ac93927c56f1b7d88367ece5f87ebcf82959cf81ea49db
SHA512d8f847b4d318f9eada5e87104cf4df986c1e030221a121d43a05c4e4cbc2ee9ba2393986913eba51a3e66a9912dde30daa5f2959f5dd92faf2f0171189b5bd66
-
Filesize
1.2MB
MD558f1f8788b6dd8662f298e8a1d282b8d
SHA1b1bfed9527206e3f317b9b9f621c67cf2ad35fba
SHA2561b11f9f7fcef7768e87193d1f9c400d93257844d5c64425d1bed702a1e6d366d
SHA5125510e05ba57ac623cb42cfff7c4e61c8c66b625b449c45f60ee19579eb0723b9e3fc4b8432d54a5981cc371e8046896d1e91872f773a03de333f76250e7ef71e
-
Filesize
1.2MB
MD5036a17168715c5cdf7723a21819e4c31
SHA14c662ddff9edc3c35b12f7b3973ab013c3bc2dba
SHA256924716b435aed1f4f717d9c20e234cbb1aefd903d3debae63e22dca2d31b79cf
SHA512bf5450c146f052ed9e2b9224f3ac402ff7378ceb6b9d2f84899071bf3fc227c9738e7e09d797ea22a3bcc5a4e22422cd36c22a43899dfe1472aece1a2a1c5acd
-
Filesize
1.1MB
MD5b72650ce141103f49e2ffeb289aa2208
SHA169efa940178965590b1a3fce884393b67cbd6a60
SHA256c8c9a5abd739fc1503362518772a183e3858036ad7620fc2e538d877c35b18d8
SHA512f78c52ffde97c67d240a5ce6bdaa2598f1cf0c30e486f3a753d1059e238ee98b96b3a7a0808fbc56aab0a3bf287aaf2a78a3c037b57f42eab900b2e24cc9f701
-
Filesize
1.4MB
MD570396d82cfa52668d28edc5ab04fb399
SHA16bf667182c1f5d1eca852a914aeed91c9c982434
SHA25683d8800e1c1d093466a27a318cb7acf2c6276a577eb2a8a919dfb07e7fccf1da
SHA512d44d42ea5c803b64a33fb220cc17bd4866c9a037df2d9e4668883bb6210162eea69755c1474fef3aa664e82a21554c06aee94205564c67ccc1aca1d5d128ca02
-
Filesize
1.2MB
MD5dcb047af106221df30f6f8995f554e0c
SHA152f9259b23c04b2df1f44634ed51532ce0b6556b
SHA2564d89172d491d75262cd9a7fb061777733557fcd0fc34e45ac02ccd4770cd9e4f
SHA51210c3286412da5b54e5f43ad2d66d4cfb783e9d6feec1b3c0488a623d2693a9e5a55170dcee9efa4f564964bb1e636c3590d0958bd11440a19d210953c8f1dcab
-
Filesize
1.4MB
MD516c18e56b6b0b04ca028a6246852f9a0
SHA19fb3917991a8b2ca4532672dd5aa47cb8541ae9e
SHA256f75dc1091e88f8c824e117ae78d63b3a4cc3bd1133feb24794458eb8cd886819
SHA5121069dbca92c30b7ef315d8a369a685d46d0f0ff3ba45c58b0241106b37a01c2b9457729358678d56ff54e684e1f4ca2e833cb21cdca0ae100bb8b8c08b7bc19b
-
Filesize
1.8MB
MD59037d3c75f4d8514e07335696537e08e
SHA1358aad5ee7e35e0d83161d4cfbe2b92481a7c9a0
SHA256868664af06d8ec42efe8de745a4fb81a09f8b31cd924e73d43fb520c1a85fd53
SHA512cd5ed01e900d1520f5053465ae7932d1ed84cb9e7c23b9407df3782d328861db74a4b5608fc9b09f8eec7e1e19df56ac297699be687630ccc334b03ad2d63782
-
Filesize
1.4MB
MD59b22902d4de29d254451a13a909a790e
SHA1d8f29b79e2db1b9189fc8a7de53797b6b77f260c
SHA256c11cdd876a6246366f98b4509e8fc6956dda342ef39d2a4eaea3c1a7f1aadf98
SHA5128124ceed7f9cad0b5a89e386d6f7dfee44f2675436f250d95ab93ff675b289cda520a9e646acc30a6a84e30104dbe5ffad6ae5c3c72e45433a38660b78f64914
-
Filesize
1.4MB
MD51394df86c09e16c7cde0f26d12d55c50
SHA16c46b9bb2c5e28647b31f045cd3956ef182a948f
SHA256d80df1327891aae3ab8b9f391c5538f046f5ce2c09c2bc6bf86c7165f31cfbf3
SHA51298177ea4ed592a839307a07e5956260a62996b9c1c2a6940066576b69b09af906fae5627588a87c43be57ce1a0c26a0a341da809b8dcf0e2977d51faa592a38f
-
Filesize
2.0MB
MD587d0b14574574237a42f588b68f68e35
SHA1fef975e572e7b33d8992f18fc244abc0781a8d3f
SHA25672b78e243b917aeeef746976c8a55d4a4e104f7acfa9bd40fed5fa34405e2deb
SHA512b7d2a6ac56e76f9ef1b40a3e61d1b65fef592648555bdeb1084272da1829a8eb8e665a9a4cee95da3a2fa6c865ad5048ba75d648b7636fc5be59727cf1f988b1
-
Filesize
1.2MB
MD537a8d45332c63e2a0378e219a450183a
SHA1f21e9c991834c18010db51d7bcb2024b5bfa0296
SHA256df2cc2a7da037958c62c5a5e1290e6d83c9809cc7759a01a2a2c226130a996ec
SHA512ca04ff3994016a194a686a8e97b59a2e122ed7010d827c96507aafb66568ad7e8283bacd910ab2d51fd3d041acca5c92d30dc75d22a000306641b9eeeb64a64e
-
Filesize
1.2MB
MD559a7d8d567e8cb92487b18954563995f
SHA121eb8498761435e87fcf1b1c0264f110e6558a71
SHA2562e2bb6e4a0efd114df9f9c224bd45912c154465fbb9550acb27a04938af4eef2
SHA512580281b7874605d109bf40397451a1ac2e03693fd3ccf6ef1fc98f85974ac58d28b9582735dc313dc1d537569637a8e8abb674eca61c621b982bc69f6372b5be
-
Filesize
1.1MB
MD5f9216a528e026563ccdd68406aaca134
SHA15aa99fa2f88ebe082afe1b356b6cb9dd27f9a71b
SHA2563d41dfe26ce5267c1e4962cdaa8e1f27bbb58d33566c86efe5bc920651dcd142
SHA512eacd97d8a84975923e8f37e36c7d907b2f1c9e1e62d89fc8c7d7c48965cbb53a1a4e76a22552d2437a93286453bac1ae648cfbfb0a555758f701888439ac4028
-
Filesize
1.3MB
MD5fc7f09840d37fc80ceb2542eab2107f3
SHA1443a0d2be03314fb3177cdd98189f3b2f5e80063
SHA256b8d13757a35a51317046f136f69c436d5e8bf2ee15e724f2c6a0bf17f1411e46
SHA5125d3857b16a2965439aa5f8970424ef74af7fd47571b976a9465e3037268eff823661ed4ce8d305ad519de6958b6f45eb868aa62ad33f15c6a48848efa07d6842
-
Filesize
1.3MB
MD531ece404164322777cc03b218bf320c9
SHA1e823e29a2d99b40e2f6d8f9325526c126a5edab1
SHA256b024a83e9420bc4297ae114b2558914edf2b1294ae499a8a8273492447246aec
SHA512eed3784be51f7d81e27936dedac10e25866da7bfffc383ba54652ee162e59446b899818287e64e22d8e618ebc261eac7dd988ec4e80024cf69f42aef354647f0
-
Filesize
2.1MB
MD56dfd5181fbd42044319f6e5d6d1f16ac
SHA1b4a28794166d11b2a75d717821e7fd7e002dff53
SHA2567c178ca10f37f3a7fa980fe7f6dd9452a6c95402afb93c181422ba67f39a0243
SHA512d3ae4d6008e83b9e42678b2535b78ee51d5ffc099f0e435737ceed6d23c7678095db53fd978459530aa0985b251ab5f90881c57c8e4a808a07bf4ff2233993db