Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:25
Static task
static1
Behavioral task
behavioral1
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
Resource
win10v2004-20241007-en
General
-
Target
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe
-
Size
2.7MB
-
MD5
5f573a664988c7ae35ec36f0e619728e
-
SHA1
e9af094474fdb64ae89014abfd7fc67aff7b4324
-
SHA256
5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992
-
SHA512
6ca73ea44d42869bbd99cdd1ba6853c76531868d50e8cf75bcfa27ea67c9de10d77fea177f08c3343b34107784520ccdd8d1a2b05e00fefe85e10f8800a38083
-
SSDEEP
49152:9AodtaG9kS2U84B+FLan9k5TRM9zlgVjgg0YOm+3iZ1o1e4XTur23ANIS://B1pY/ZiDG2a
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Extracted
redline
FOZ
212.162.149.53:2049
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023ce4-66.dat family_redline behavioral2/memory/2036-85-0x0000000000830000-0x0000000000882000-memory.dmp family_redline -
Redline family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2988 powershell.exe 1600 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation regasm.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation server_BTC.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 26 IoCs
pid Process 5112 alg.exe 4816 server_BTC.exe 4596 neworigin.exe 2036 build.exe 1048 elevation_service.exe 4032 elevation_service.exe 4972 maintenanceservice.exe 1280 OSE.EXE 2700 TrojanAIbot.exe 1412 DiagnosticsHub.StandardCollector.Service.exe 2168 fxssvc.exe 4576 msdtc.exe 696 PerceptionSimulationService.exe 5016 perfhost.exe 2968 locator.exe 3004 SensorDataService.exe 5052 snmptrap.exe 2216 spectrum.exe 3508 ssh-agent.exe 4156 TieringEngineService.exe 3996 AgentService.exe 4624 vds.exe 4380 vssvc.exe 1448 wbengine.exe 924 WmiApSrv.exe 4984 SearchIndexer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.ipify.org 17 api.ipify.org -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe regasm.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe regasm.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\47ba7ccce5a029dd.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe regasm.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe regasm.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4408 set thread context of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{87F23B05-A117-4666-BB8C-A9C77E6BFB56}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1384 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ff78f0a6d863db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E46787A1-4629-4423-A693-BE1F003B2742} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e3bdd7a7d863db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008916eea6d863db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f78b03a7d863db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000002649a3a7d863db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a0fc75a7d863db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000379b54a7d863db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005a2720a7d863db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000868841a7d863db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9908 = "Wave Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4760 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2988 powershell.exe 2988 powershell.exe 4596 neworigin.exe 4596 neworigin.exe 1600 powershell.exe 1600 powershell.exe 1048 elevation_service.exe 1048 elevation_service.exe 1048 elevation_service.exe 1048 elevation_service.exe 1048 elevation_service.exe 1048 elevation_service.exe 1048 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeTakeOwnershipPrivilege 1328 regasm.exe Token: SeDebugPrivilege 4596 neworigin.exe Token: SeDebugPrivilege 4816 server_BTC.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 2700 TrojanAIbot.exe Token: SeDebugPrivilege 5112 alg.exe Token: SeDebugPrivilege 5112 alg.exe Token: SeDebugPrivilege 5112 alg.exe Token: SeTakeOwnershipPrivilege 1048 elevation_service.exe Token: SeAuditPrivilege 2168 fxssvc.exe Token: SeRestorePrivilege 4156 TieringEngineService.exe Token: SeManageVolumePrivilege 4156 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3996 AgentService.exe Token: SeBackupPrivilege 4380 vssvc.exe Token: SeRestorePrivilege 4380 vssvc.exe Token: SeAuditPrivilege 4380 vssvc.exe Token: SeBackupPrivilege 1448 wbengine.exe Token: SeRestorePrivilege 1448 wbengine.exe Token: SeSecurityPrivilege 1448 wbengine.exe Token: 33 4984 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4984 SearchIndexer.exe Token: SeDebugPrivilege 1048 elevation_service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4596 neworigin.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2988 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 85 PID 4408 wrote to memory of 2988 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 85 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 4408 wrote to memory of 1328 4408 5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe 87 PID 1328 wrote to memory of 4816 1328 regasm.exe 89 PID 1328 wrote to memory of 4816 1328 regasm.exe 89 PID 1328 wrote to memory of 4816 1328 regasm.exe 89 PID 1328 wrote to memory of 4596 1328 regasm.exe 90 PID 1328 wrote to memory of 4596 1328 regasm.exe 90 PID 1328 wrote to memory of 4596 1328 regasm.exe 90 PID 1328 wrote to memory of 2036 1328 regasm.exe 91 PID 1328 wrote to memory of 2036 1328 regasm.exe 91 PID 1328 wrote to memory of 2036 1328 regasm.exe 91 PID 4816 wrote to memory of 1600 4816 server_BTC.exe 97 PID 4816 wrote to memory of 1600 4816 server_BTC.exe 97 PID 4816 wrote to memory of 1600 4816 server_BTC.exe 97 PID 4816 wrote to memory of 4760 4816 server_BTC.exe 98 PID 4816 wrote to memory of 4760 4816 server_BTC.exe 98 PID 4816 wrote to memory of 4760 4816 server_BTC.exe 98 PID 4816 wrote to memory of 2700 4816 server_BTC.exe 101 PID 4816 wrote to memory of 2700 4816 server_BTC.exe 101 PID 4816 wrote to memory of 2700 4816 server_BTC.exe 101 PID 4816 wrote to memory of 4936 4816 server_BTC.exe 102 PID 4816 wrote to memory of 4936 4816 server_BTC.exe 102 PID 4816 wrote to memory of 4936 4816 server_BTC.exe 102 PID 4936 wrote to memory of 1384 4936 cmd.exe 104 PID 4936 wrote to memory of 1384 4936 cmd.exe 104 PID 4936 wrote to memory of 1384 4936 cmd.exe 104 PID 4984 wrote to memory of 1504 4984 SearchIndexer.exe 132 PID 4984 wrote to memory of 1504 4984 SearchIndexer.exe 132 PID 4984 wrote to memory of 1700 4984 SearchIndexer.exe 133 PID 4984 wrote to memory of 1700 4984 SearchIndexer.exe 133 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"C:\Users\Admin\AppData\Local\Temp\5a1e020c5c5ad435e9bb8cd1d76d10a88f9312f2622ddcaf4b4b559e37e8a992.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 03:30 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4760
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBBBE.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4032
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4972
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1280
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2972
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4576
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:696
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:5016
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2968
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3004
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:5052
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2216
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:3508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4224
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4624
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:924
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:1504
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD59ccbf7328a1d6820114438f524d0520d
SHA1106bbfcfc9855a3c68d1e71297370b945e2e4528
SHA2565614ec8712aecd5c248212b2a97ecb35d576b52a5c95429f1b79d0b38d58f4b1
SHA512f62a7918a2b974aa179fdedb3091a4bcc367c97a062901005186069518a1f225c11da9715eefd44d1ed416d8deb1a2ff7c92f526762b9d8c6b818157f5db07dd
-
Filesize
1.3MB
MD54e71bbcafe67a603d25e91b72eeb1cab
SHA1033536f74ff49d49beaba0873b3b2655307854f5
SHA25636390d7311370d3cba637a0f6978cece22ed250cd64d2e41d11064f36022b8ae
SHA512067f9b1362c881dc260b1e1c312859f9133d7dd2e24d70eedf3a07dc927eb88f963428fb054f38935a953590c55253748d879e54079bbf44e9c66a06590f8384
-
Filesize
1.6MB
MD57f10eb88383d4a394cf617b25ebed1f3
SHA1b2791db3301fe5fa8759f31df66a3ab5d3f24ae7
SHA25652cd5e0bbf90c3606fed9303c1b2fbd8cdfd8b19256881edcb80ee6d928a4a57
SHA51259c6ed7122c2c9d772c961ff10179444fdf2abca15cd93788834995da3ac6ee3b2b63168b431b37e4a91c2d65c2184bbf883a3e18a6b54355b9da303438189ac
-
Filesize
1.5MB
MD57acabe030af75ec57ada5a8c98155f1f
SHA110e9a94b1203951cdd9f69b9d8d302c725417562
SHA2560de4cac3f818a532f2e0a896406bb0d63c2952a053225a8367fd3d3cc278da06
SHA5129f44fc1ff786650ed46c56d588def7a376419c4679b493495c4b822c568f381cd899f9049aada761b565f0619706c3c7f501750e7ee00be73d2b5431cf5448fd
-
Filesize
1.2MB
MD51bcdc92086f9c2a4f90c4b7c22cb82a5
SHA13ab99b3909822599521c78365f858eab4890bbf5
SHA25657de3ed3d149f52ee01027da74d719633089703fe9163a9e5ad6fb12f42f555f
SHA51284ee84f78db160c5832fb0442b60284bae15c97c33e01634bbb6dc0319b487eb20099210600b6b517d020615adcd65637c5f9d9fe3ce4190997e74b347c6d010
-
Filesize
1.1MB
MD54678e02b9de56ad9bc7a3c6e63cc2113
SHA1abba5cefee56bb7b81faf6af0135211358338bdd
SHA256a7d19c09716f6f0a0683fbfc463aa1d56224287206f0236eeb3e7ba0e66f01ce
SHA512c09bb25e7ec3f60f095b3aa3a97f8d742a6f75b5f1e989e3bbd23a358e95899cc2a9f1bc939576da3bdd67ee87c5798a248b4d24f2c5450dfdf4fcf7b46d6aa1
-
Filesize
1.3MB
MD5a8e7a8ecb4422e0c1652c2a326cb38c8
SHA14a122f6b3d31ee80a30312ba4d3c0145dbec7974
SHA2569b8d4c57ed6b96fdea1ac47c1a7e929e15bd5e3d9536f80666d6a300aad8bbc5
SHA512c45f615a80a9ae3f4f2091c5801f1db5ffd63d1bf7cf946ae3f2d4fe1a02a65811ea91a88bbebe4550bbb3412dd64e153e54ef2cf8287d8ad126d74952e67757
-
Filesize
4.6MB
MD507cd673da9c35fda8d71e854123c0a11
SHA19ed7ec48e1c8960f4576d85a7b3c94746a2999ed
SHA2562215dc84cc03db4ba5c02276c0e0b61934833f1623a18b4614a402218a0bcc8b
SHA512d629d5ddaec9bede785baa99349dfd44a65541ef98e49340d8113107b9feafa787d1b207282b4ccf6cbb01a2990270a952c5205f9113c9dcd134fab05e6273cc
-
Filesize
1.4MB
MD514915a2084a037caa29be53f7f27c860
SHA14088025e456e07d062738ebc444541934190b6f0
SHA2568539c8a10f5085d16b50b2546d3550374ac8db11d65957419c0854c1611cc944
SHA512b53ed5a12582c1100a57684e373748ad2f3d271c57f9e7f114d9a2f371e8377965bb84e1d70f8df22b2b0642f0863ec3d045f34899564524f13ed4e95691c3c2
-
Filesize
24.0MB
MD59901d5b3d0cf5791a91561031b7e3235
SHA102e87540821725e81db6d410e8a1e96cb6ca5a2d
SHA256caf1a1e2f30ff1c9faf8f15f69c31aed10d1fd44d547ae8626d6610f09930cfb
SHA512d3d5b6a7219231bd8c152f29233bb0373e4605ef6c803cc992dc4d9cdc19a6e9f3712927121ff86afc78e8decec8222a84211053ad5800db2464e18627656784
-
Filesize
2.7MB
MD58c2a18070883b0545e8f7ae3a34e30fa
SHA159da3c450dd2498c16ebfd4e2d34843f512c5882
SHA256da29f9c1616e82987b4133ea26ec082969c9bbd880a0d5b55afe0e27edaddbc0
SHA512d75ec6e8dc64047c993feced5e57bb199d34d928654894ad49c81910b0b6a463871ebab847d6b52dca7f0e7bb3de6073a9bbcf63891a12cee091dc0111970300
-
Filesize
1.1MB
MD500a96a4fed38ae94bd55f6895107589a
SHA177c28890f4d9d77f4afd876895597bd3ad75a04e
SHA2564315bab36d73111d6b36f39e31a76e63cc424d84a014814a77ef4fb9710c9567
SHA512fc1f3905a6f1c3f7f5ffd4c1325dfbe23f4dd7648fd0ede5f99cb57136efc31fb72b23dab1949c4b559d6d77e8cf0c1172b774ef9feac4ed5a4928d5c769c79c
-
Filesize
1.3MB
MD5e0f55fcf8222fe7a2066c7b0d1d37b86
SHA190365af4e6f8248cf38ee2b1513489a0bc9c53f1
SHA256c09f4bf69b904ed1b554dce11fc53fc91bf5c5d4e05c785e776dc13cb0ec0d74
SHA5126d7676bdd05feed690d53f1395fe068233d9dfab67be41e15908d6e963211d85b35520490aab8314b361e18d645ad09634ae8a060c09ef4219e0c9c527bd75c9
-
Filesize
1.2MB
MD5373f41d3fe33fb42a56271c09a212ae6
SHA1f79935b7388dc2c77b61388e7f9bf0bad591371d
SHA256df06fa27416f56e43a6651d022da02763168a528502e206686ba9fbcd8437a52
SHA5121c32ee84dddb36c754863d9a24c14bc4c5f79d3b674ce9a20d544620014bbf6829e516c2c6b95b4d18215832e92cbc0c1765418014c6d6d482d424c361eb54b6
-
Filesize
4.6MB
MD5025548173341467e7be70e515a821f0c
SHA1cf1e143efc70d27242e09f95aacc0ee8a76f09ad
SHA25611a139c4b7c6e1986326089085eb3282bd0a976892326e00d54cb0ded66716ad
SHA5120eb14c39b62ec44b00c21112fbe08eddcd3afaecd059a678b9182b7ef20fdb63e65e10865d9b04d2c2c6826b8e734179494cb47a52f2ea8ceaab42c68971257e
-
Filesize
4.6MB
MD5d3256372bd7b06aa5f34468783aaaad6
SHA1e362e68da1228e8fb74f621524bcf36725ae25e2
SHA2563813b4cdff2ca9f442ee5499b933b9d76985d4d42e6b3d04c6d9b331d385f379
SHA512bd876fd58e6eadd402d2318cefb114125b085d1c33dc7f569fa9bbc07848661be7ed4292a6895a4c114e9cc35c9b974922e1c728da7f6933ecdbabfe5edff4a5
-
Filesize
1.9MB
MD5e74c2b31a8d63c5223fb7bc6edb21bfb
SHA1b201bf0889c5db05d2bf55ab96456112a351348a
SHA2568425cb6d14e3be6ffa75a858a8a1e66aef30f801a3c77b2f58dc133892430bcd
SHA512091a0d9bb4af9aefcc0d1652b4afd7209706e5c5b2c0db8762e9b109f542cc981cf08b6514a4cf897d8c207276070f9b988c06fe360fc3c3d5c8573b28740701
-
Filesize
2.1MB
MD56b9799fd4aa0ac29087228a01ad10858
SHA151d603b0c2692e9ab5e54ab6b60b74134bc38327
SHA256da3c0c2fc167f06a2425db4a4de4deb1df4e1cf7fcadde0175240ded68c572b2
SHA5120685304b1238802f3f03fcd7d68ea79d87661339e9ba6ee6f5eff84502e1bc048a08de23db96198531ccf0ff2b72f50f3996e613ee5ce8744d3383ebbf32012d
-
Filesize
1.8MB
MD50c41cf657b5194fc215aa435f787c2ca
SHA1f3026613cfe974312f3f3816ac782deb933f95c2
SHA256be1a1aa79f6c02a48541dd46e93c5952e9a9f8f0fa63c4cdcb12cfba0d85c2c3
SHA5129792f58c13e314389cbab4be54dce528808003d0ff9ee681fe5cf3e9a071a84decda2bb27c5ecc60ba38218629b07d9e3534f280538ffee9ffda2867011900f3
-
Filesize
1.6MB
MD52ce5f9309e22cb41726ce0a4313f8c0d
SHA10a60f7bf6c3f8cc39487238a9c2fd9a1509c9ec2
SHA25622839cf1cda47e496b21722584075d0d0b86fffb049439b5cc25dc12578e65a7
SHA512142d2fb0318ea17d54e2552c6b0ebc15e32b807d91038078fc6d7b156671da228a359ebdbe98cea41fef12b03009cfb0b08c8feaa260b120944ad5ec8ef629a8
-
Filesize
1.1MB
MD5adcb1de6f2151d99dfb4af89e8d803c2
SHA10b82bce6a8dd0f74130ac72b5e0154023f73713b
SHA256e4e92a6787f8fcc874e3b82a39c935d6b9c011c0f8b5967df22904cfc4cde50e
SHA512e3112de5f8dcd85a03c7a8815a1cf3630d928a911dbb3d693aa8b227986f544762e5f837c1cb61cbc73e15fe3c2cc64f6414be6b0be0bef76aff7bd3cb6ce433
-
Filesize
1.1MB
MD5852ce89b89fa44406611de8ce9f129a4
SHA1809dba4569ed386bae6452b65badfc9dcf987af6
SHA256e9cc2598b602725d2db5ef6c0c55e0f84a584206f56f6b61d6dbb2e5c70ae260
SHA5126ef38614f526b8d5fd50801b1b4e9f10cc206efc874b511fe19892d05c4b6486ffea9d8f18b5df15a2855d64c8050097d226400b310ff87b4406ea1bb70d1de8
-
Filesize
1.1MB
MD5ff8f9da70f36814ac18e8c572674f918
SHA18537cdcce5d0919dd47a512457bf7cda73ccdbc9
SHA256aac4b8681bd2df384d93b8c6e7825d7087bd46a1c333d907c64429706dc4c77f
SHA5128a7d5b788fc5f9ba2b2fa260514210da436f51629ec551c8b16482d1e09fc37ec7d129be1480dc62a86ea8ccd1ab3c5e0e545ce912272348136c5439c2e75f9d
-
Filesize
1.1MB
MD5d82a472c61796e19e484daece696dea5
SHA13f71a22a9ae80687b7d1656987c7c43518ca3b5f
SHA2568d5069097c2812c0a20d5ba4c5f38802eb8fe8520a75e8797392dd38bdf8c4c5
SHA512d5adea75b750ca2503c2d4866886ff1d9e14b7694d89963fbbe382128b2c7cad484b14716d0e591bf57cd5cac60f94c33dc0962fde241a102d81dcaa28bfbd31
-
Filesize
1.1MB
MD551acc2f0574b6bebd0cf6bf5f6ab53ab
SHA105e42bdeb9fea0860bde0cf5fba7dcf297dba62e
SHA2566ca1ffd65bd18b78268cadef69123f7ac46a7b1259103976bd2c8b2e63b72793
SHA512645842fc299af72b1f636490e515ee04eb611d2b3be8f916a2adb7c7ce04d78758b1f203c267c946cc37d0c6d1f18b772b3b80471572316761c04ddbb2ac1700
-
Filesize
1.1MB
MD586696a6ebf08d8c51752c3e38fdd63a1
SHA193d9af7600ee3b18be5abf67b4ddcd9f758f3f1b
SHA2569f21357158ba5af35ccfefbee51d904fb2f449f1b27903ada907ab4f0f175889
SHA51209b3b76ab2cf6cf6d8e20dbdcf6c681d7936995fb5167c970c580ecd14a12d6b14c0fca8b6c0345acad1992da49d417501f39cecd581438a2d7412fd6abcfdf6
-
Filesize
1.1MB
MD5f97736e9817625b2546c5f1bce3e35c7
SHA155bc054df245fa189591afd746bac48bfcbf7a03
SHA2565c4ddac8e3ad3128210c0481d874ca25a00ab3a4af52b2bcfb3ed3dd604c304c
SHA51264a64308ad19540e3f83a251d2b9dc91124b87716cbb5d7fc6507631db342a2a194a7146ea22209a48c1f475044421cda73123da81b489930383cee656281782
-
Filesize
1.3MB
MD52a20f3fcc9d744c43fd54faf612cbfa0
SHA175adac548d7318e637462b303e0e8fce3246ff3b
SHA256b058022ccd3fd009abda4f42e7c355db4dc3c43e36cb5efa5315418908e1f8ef
SHA512b3b95baed0fcf357b3e2063cc6feb79dc6830a16ea63968c9048cb1f57d0af038a70e2633ecd92a6d64cabda20ca9b38260adba5739c4aab7385c1bc9a240e06
-
Filesize
1.1MB
MD5cbb80e163156d0716ba54be5ac3bdb7e
SHA111dba6929992622edbbd329ea039a9d4eab67c1d
SHA25642d0373b54807c29f20c65dcbc0466406e27aa13845ce42a8afe775a94300347
SHA512fea04c6f89753c7730296fffc72344c432a44a5d2733988c3a1ea7e79cfcfdb5f882b7b037b3f870edc7c477e709cea2891b7821c95cf918b603bb88220782cf
-
Filesize
1.1MB
MD5e2e2ce7d0df77028d2f33a873ff6a3c2
SHA1de9833a197cf5d30cbe53464a07dc92b0d89e1c8
SHA25695e1875ae2722720a707d1f327f3760ea8b33d06e3ec2d4aa7c6ebaa01c694ae
SHA51234102715e499d7f43d943553ebc23b97af14b2130929bd426916d3684f0b6a9ffc2e28eb01d4d3f1ca37a3304ea7448254d08e53b8e54f31c38f061666a2590e
-
Filesize
1.2MB
MD52b9d581d9706029f069b813d2abc21c3
SHA1ce3decb5d8bbd52f53b862816f92912e52d66f47
SHA256f8ee6cbb66eda283e6128e929486e5e80a889251e41fdabfbcf6651740477e58
SHA5129f03835b8562fa25ad8efea38a045a8ebe31536a00cbb7a61747d03c3dd3a550fe5b57aba2ee0053ef9a3aed7483ee904b9af1f95e090e46f03cd59a201e78ef
-
Filesize
3.2MB
MD543128c4dae4b852ccdaa1e81b63e9aaa
SHA182af581488b54bb1fb0e7e10bd7110abc2a306a7
SHA2565a42164bedad00e0dda3a2496202e4fbbf6005a5e1f2e6429a4713e4ee536d12
SHA512d2c61deb288bf360c7802ef239a8ad53f622117cf1096ab4f56dd2e91270e45a0e3f53b49bc3ba6195dc2a80279595d8ef3e5ef6dfd2620dbd98660daff93894
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
300KB
MD53b6501feef6196f24163313a9f27dbfd
SHA120d60478d3c161c3cacb870aac06be1b43719228
SHA2560576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5
SHA512338e2c450a0b1c5dfea3cd3662051ce231a53388bc2a6097347f14d3a59257ce3734d934db1992676882b5f4f6a102c7e15b142434575b8970658b4833d23676
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD5f16ac25d36f98acdcd9de1b8db7c8811
SHA1d2d0e65d671cc90de1d9de49424f41add58b54f2
SHA25663825fc91d6bec05e4194004c1b306ff8e078da29b8bfce95b1084e13c582d99
SHA5122f56ad0c44fc707a1119eb444a7c0948d8ce8ba3cce44ee6dcaacd515960973a2af939ddcd91903823e49a93c79b4969115d739b987d4ca5e1d02a1b843a2c19
-
Filesize
1.1MB
MD534bbc351233ee1a497e4b7e76b4beefb
SHA1c9f6711ef49ea129a1f48f2b2d0bbb56e2c136ab
SHA2569ff12d3a2a649ff818092f34cf4d5d754f6748237e89ed2f7094149e96c490f3
SHA51280dd0d277c877c988ee60ae39991d62d3167417bd79679bf5e92fb0c54bebaf4266eb0954177a30af9f990583d5367ad87756e57cc244ad86f36a75022ab4a36
-
Filesize
1.7MB
MD5c32159d43014b97beafc6eff6970b33e
SHA120d8002363b8c77b621a018f90a46c8a1c418f0b
SHA2566c213f1a847536d1f0a7ef4961f225ac3c7f250cee2385007e3b4a1f92664d76
SHA5126b22e50c530da7cca6a7417c744f2fd0a620be13a84a8da244a793701c083343678e959ba69e12e800ceb97bc16beb7086ce6f07b3fb466e4e5b81992fd6b7ec
-
Filesize
1.2MB
MD52a8c55556c76b6754d4fde4afa62eab4
SHA1dc966bf9b4232cf5c8cbebe852f70c432f11f620
SHA2560a6b8e61a78bd1cae2623cc7fdb461280029e1ca259af39fd21f9186ec77c45c
SHA512cdb19aa1fda03fa001106247ff2453b3253e91f9b561dc850d24c58e97f9d84d24b481969ab346913817c4840124e695ac680f199c108a88d288afce3dee129b
-
Filesize
1.2MB
MD53d801d3b7dba8038024aec8cba991347
SHA16991cca7e6b822b4001c1b81722a91f3473a9d03
SHA256d65a43f3ef5a6bc724dfd1ecd41a9945f28a1c037baadc2a1f4ee6fa90a03f7b
SHA512ed93e2ec1192ed066c6848fd831f665af5f575205e669508549bb0105d99cabe87b7e165d755add207d6819cad76d99c50afcc7d50f33246885270b9dae7ea37
-
Filesize
1.1MB
MD50e94b56726da126fbc900080504bb4a1
SHA10118f12e19c65e2e0aea56ae461ef0bf5f7db60a
SHA256e866cc41f9fcfa2e1954ca0ba07a09999c8229fe51adb52c871093affa6aa309
SHA512ba16407798c12a671aa081d5fb6d903d3272682e077555ec09ed5123696060a2819703f94dd2a44f65ca2f5c1904a7ad4e8014fd2e7e441d17bc2c294c7b0cd7
-
Filesize
1.4MB
MD5d4dfe145edb3075ae9daee2aed2f5da6
SHA191ae43f4f7c37cb4e8ef8dc4dd43bac9993a9402
SHA256f6eb3b3f955d821feb0bac283417740abc2deed8f0f970c10661fb8e91727e1b
SHA512a1126d3cb0a83820f112dd0ec5937e25e2ce7ffad3ad76f11d2cb26814aec1b83c516f740ab4d36cd49be02be3d3e7f90abd8ad6f22d539db11b474772c9cc8a
-
Filesize
1.2MB
MD586dd8af4a31286c645cbe27cc785e194
SHA1cec094d05dc5bceb559bcf6bd74223a4427d34c2
SHA25680a81dbca55b2da77367c0cf702757d105ff9d78a15c1f4515b7746cc0a570da
SHA512dc987edcbfa4d13eb59985b07d73dac798657112eb8273d4593e2335955579a9797c955824f56a5ffd6d3f1d814855bbc54f41e335240ca24c3f52efcb2e235b
-
Filesize
1.4MB
MD568a968752ecd4fdec61e01b29c6f5695
SHA11a51ecde08354a5359468729f46e6e4d11786fcf
SHA2561456a13ae762b92aac19d16e8f47214cecae470c544d74b5a041911aeaa6c5d4
SHA5121eee23b8ac49f358d40821fcf1920c55039fe4b08a6f4224b60702ee78551b49f642617fe5c647afefaa574c82f64f0f0f2a6196b3d3232b27a0e053971e2764
-
Filesize
1.8MB
MD5fd7293af3ca9d4ec5b912f61d49ee8b8
SHA165b3b9147716970e68409a3e192e9299cc9a2aff
SHA2560fafe6c60beff7572081e0dfa0420875c58f60f30451f5246ba64474fb9cbe3b
SHA512e275cd6ae05586c2a72d01fecec23da271add95524449af606681541e5d6e03e0be3076be914f31170e148f6cd6b57b91b547a1286d54bc0fcb80c775fe87e40
-
Filesize
1.4MB
MD580b2e0617af13ec99615123d588674b9
SHA1cdb736764ae9614852d7c5c1e3e5cbea5f81d304
SHA2568d1a63b09722fb4a0b4349cc2110da5fb5a3a64e876b2ef8557e6efa2ad96e9d
SHA512e2764cf174b3bf8d0d2a23138b7f9278531f890c591b0a6aa08802c3bc36ed911c35621105772c820418478c4d42feef72467502cd49adabc6469e77ea56a0fd
-
Filesize
1.4MB
MD5524e148a632842ee041329a5000f2676
SHA114776edbb802310722dd4885ba4877f2bd5eae73
SHA2567bf5da254de5a6a0c673e04b5672e4437eaa72237e6dc1e21cd4f4d701fb48d4
SHA512f17340b9250408c09e80e0835743775876e878bac30231eb4cf3f2716f2f2de5310519edd4c982dc649077ab116fdd8c550cd92ec9d3a460c667f968491545a7
-
Filesize
2.0MB
MD5b5ab4bd46428a736aa6217da3df7bee9
SHA1e2a64877db49066606698e067498ce438da641e5
SHA2563aee2289285b6d6fb2f52a51eed671d656dc088d71bad5053c5660f8855b62c2
SHA51223087325fb6a7a3126fefa7f43c86738278fb2833674587672ae94533a27dd59f29aff372af84fc3086a7e9c0a4c1e34f77dab1e08f38ec76ea79232b9e94fd3
-
Filesize
1.2MB
MD550ef1c10ecb819e889ab5f85990027ae
SHA153a5118964754c59db60feb1ede8adbd01deffc1
SHA2567e8504606d6041df4242e5805de2e818a8cbeabd1cd259bd631f23477f09033b
SHA512e32db0e7a76eba7ba8b1edf0b2a41f1bede8696616644bd45c8eadb3a20bce79177aad037e34b3cc64ab72c8761bca9c86237701695fbb9502e3a41b4ac25fb4
-
Filesize
1.2MB
MD5d580f6d5d24e756a31a0580d375db12b
SHA13199c3644550fd98480c8a1f5405d218d9c1b68c
SHA256897ff43770a9e207bbeeb344c16cfe2a626a6977cc344c90292b95b919054593
SHA51259e33b886b69c06f6185e7a6657e969ceeae240c963609bec88648ff00071f48946b79a83ec151e2bf0b42a84a837f7dfd3e2c74e443a166604f6febe3d02b53
-
Filesize
1.1MB
MD5bdcb334bf838e4a8591d09654d988b28
SHA12120215488b49ab7a46bdcf1a99450aaee5caf5b
SHA256c7f8589e02ee45f526eaa67820c4cfa3acad3617051341643bdfa471e72ea8e0
SHA512f8a2569571c74ddceadc44fc4745d7cc44d27577bf664c64f7de27ef15116a8a25a360bd636e9fd77efdd0a3b31732c1c0737c7e13e89a3a18132739d8d76712
-
Filesize
1.3MB
MD53576ca06d42d1c2a35bce1aa456a49b9
SHA1cfad3387e3ed2b83bf14d42743874794bd58a9dd
SHA2561fa956a0d97565f932bfaba581ddaf8d14668f17f6d1d0e5d18386084a0e258b
SHA5120fdc65435610dfbc35fbd1062519c2ab653a0c3af0aaeab4a6ddcb9afd52d3296e2182641622151de765949e7f06e7541342385ce8d849eccbb64491fef90f92
-
Filesize
1.3MB
MD5b6a992b5d5c6899e6c217c002352a129
SHA1d08cc376cf7a6c34bed630025ddec53394c5e367
SHA256e90a8b1801fb6989390a74341fec9538d24f4a3228b44ef01e5181cbe9c1b4a9
SHA512ab65d06f7732c63826c826a4e1ae03f0f27e69440655489b4153b2882764e737f43b9240189bec7f591f1c481d889196d6307e24bf229f4954a5e99476a37645
-
Filesize
2.1MB
MD5d59b850d2c78af416b4e08f5988165b3
SHA11e4df06f68e8bb24dd1e7fb2ff67257c4f40eb9a
SHA256b9b4ffa01950e930a6be509c4340a1d9ea24509f8c6177bf6fca9c1c9ebb3f80
SHA512a5d2b11b5b2f266827da9f414efd7ae950724ab4c5cdd510a5212854fdc6ca2ba03183b4098ae742430d82ef45cd15f05e1fb664c34cad391f62b37696cfddcc
-
Filesize
1.3MB
MD5339b2463defcb4df0d137a094481f10f
SHA17e373e7909ec2999ba9eeb9213b31b4abbc4af37
SHA2566357f7ed786a6fa52c0679b7e5a3dfc71293a02281732a6d15be003dc3a2fc9b
SHA5125d793f3d9105c92131422b225c4d11fc19aba174c305c41e336553db7a72cecd005082e61fb3dbd98b14102acf204f1dd9efca378cb9d633ed4ec48e540f581d
-
Filesize
655KB
MD5f790d53b5431d887f8f10f7508f1f38b
SHA107db145e4f2f00f718b23f2d6360d10e307478e9
SHA2563d7d68ecde44dc13218b82c7c380a26be71ddb28e025c05c184631a2788b1f1c
SHA51231b4989855bca81cd47dd90936b98c992ea3d36bac4b8a2e9490d68f760e52f0bdaae453b0b9631e35193adae4c7cd40de76865be2536c0e80914498cf52c73d