Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 10:19
Static task
static1
Behavioral task
behavioral1
Sample
19012025_1019_x.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
19012025_1019_x.exe
Resource
win10v2004-20241007-en
General
-
Target
19012025_1019_x.exe
-
Size
973KB
-
MD5
72d63924b474c076c3f54e556dcd3f8b
-
SHA1
bf448f7c1d3a8906b6c697d2f2dadf58e56f7bbf
-
SHA256
d78342ca78b975e822d380ccf2d2e8ec9dc910f91eefdeb049f28e7c97598c68
-
SHA512
b846ade542938e2b70375620c3d2b8e8c28b1232cbf3d11c62ba21109a2d1b1733b5951ba57f1369532bc5fd75cc7466eb8552bf8d439c39418048446aebba55
-
SSDEEP
24576:bBVRVxmQEkZkjSnbyewh+lMewKe9X7yxw7IYNoIjSst8H2se:bBmB+Q+SJwxw7IYNbjSi8H2se
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/4676-2-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-7-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-10-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-15-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-22-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-34-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-51-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-66-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-65-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-64-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-63-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-62-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-61-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-59-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-58-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-57-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-56-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-54-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-47-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-46-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-44-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-42-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-41-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-60-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-37-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-36-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-55-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-35-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-53-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-52-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-33-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-50-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-32-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-49-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-31-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-48-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-30-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-45-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-29-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-28-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-43-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-27-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-26-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-40-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-39-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-38-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-25-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-24-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-23-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-21-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-20-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-19-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-18-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-17-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-16-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-14-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-13-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-12-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-11-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-9-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 behavioral2/memory/4676-8-0x00000000029C0000-0x00000000039C0000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2512 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation xgtukcbW.pif Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Trading_AIBot.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk Trading_AIBot.exe -
Executes dropped EXE 33 IoCs
pid Process 932 svchost.pif 1828 alpha.pif 1064 Upha.pif 2076 alpha.pif 4076 Upha.pif 3000 alpha.pif 3988 aken.pif 1052 xgtukcbW.pif 1976 alg.exe 4976 DiagnosticsHub.StandardCollector.Service.exe 3496 fxssvc.exe 4000 elevation_service.exe 4328 elevation_service.exe 2032 maintenanceservice.exe 4768 Trading_AIBot.exe 116 Microsofts.exe 2992 OSE.EXE 4880 msdtc.exe 2284 apihost.exe 868 PerceptionSimulationService.exe 3200 perfhost.exe 5032 locator.exe 1420 SensorDataService.exe 2740 snmptrap.exe 2368 spectrum.exe 3768 ssh-agent.exe 508 TieringEngineService.exe 4892 AgentService.exe 2028 vds.exe 2224 vssvc.exe 2196 wbengine.exe 1500 WmiApSrv.exe 2228 SearchIndexer.exe -
Loads dropped DLL 1 IoCs
pid Process 932 svchost.pif -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Microsofts.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Microsofts.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Microsofts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wbckutgx = "C:\\Users\\Public\\Wbckutgx.url" 19012025_1019_x.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 drive.google.com 18 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 checkip.dyndns.org 67 reallyfreegeoip.org 68 reallyfreegeoip.org -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe xgtukcbW.pif File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe xgtukcbW.pif File opened for modification C:\Windows\System32\msdtc.exe xgtukcbW.pif File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe xgtukcbW.pif File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe xgtukcbW.pif File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a2654c2638f5360d.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe xgtukcbW.pif File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4676 set thread context of 1052 4676 19012025_1019_x.exe 107 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_86328\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe xgtukcbW.pif File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE elevation_service.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe xgtukcbW.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgtukcbW.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trading_AIBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsofts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19012025_1019_x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apihost.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b027a13e5c6adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000001746bc3d5c6adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6005 = "Shortcut to MS-DOS Program" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006bf2293e5c6adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4803 = "VBScript Encoded Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9926 = "M3U file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000001746bc3d5c6adb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a5f6cc3d5c6adb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2284 apihost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 3988 aken.pif 3988 aken.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif 932 svchost.pif -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 3988 aken.pif Token: SeTakeOwnershipPrivilege 1052 xgtukcbW.pif Token: SeDebugPrivilege 1052 xgtukcbW.pif Token: SeAuditPrivilege 3496 fxssvc.exe Token: SeDebugPrivilege 116 Microsofts.exe Token: SeDebugPrivilege 4768 Trading_AIBot.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 2284 apihost.exe Token: SeDebugPrivilege 1976 alg.exe Token: SeDebugPrivilege 1976 alg.exe Token: SeDebugPrivilege 1976 alg.exe Token: SeDebugPrivilege 4976 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 4000 elevation_service.exe Token: SeRestorePrivilege 508 TieringEngineService.exe Token: SeManageVolumePrivilege 508 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4892 AgentService.exe Token: SeBackupPrivilege 2224 vssvc.exe Token: SeRestorePrivilege 2224 vssvc.exe Token: SeAuditPrivilege 2224 vssvc.exe Token: SeBackupPrivilege 2196 wbengine.exe Token: SeRestorePrivilege 2196 wbengine.exe Token: SeSecurityPrivilege 2196 wbengine.exe Token: 33 2228 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2228 SearchIndexer.exe Token: SeDebugPrivilege 4000 elevation_service.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4676 wrote to memory of 3768 4676 19012025_1019_x.exe 88 PID 4676 wrote to memory of 3768 4676 19012025_1019_x.exe 88 PID 4676 wrote to memory of 3768 4676 19012025_1019_x.exe 88 PID 4676 wrote to memory of 1100 4676 19012025_1019_x.exe 91 PID 4676 wrote to memory of 1100 4676 19012025_1019_x.exe 91 PID 4676 wrote to memory of 1100 4676 19012025_1019_x.exe 91 PID 1100 wrote to memory of 932 1100 cmd.exe 94 PID 1100 wrote to memory of 932 1100 cmd.exe 94 PID 932 wrote to memory of 996 932 svchost.pif 95 PID 932 wrote to memory of 996 932 svchost.pif 95 PID 996 wrote to memory of 3244 996 cmd.exe 97 PID 996 wrote to memory of 3244 996 cmd.exe 97 PID 996 wrote to memory of 4480 996 cmd.exe 98 PID 996 wrote to memory of 4480 996 cmd.exe 98 PID 996 wrote to memory of 544 996 cmd.exe 99 PID 996 wrote to memory of 544 996 cmd.exe 99 PID 996 wrote to memory of 1828 996 cmd.exe 100 PID 996 wrote to memory of 1828 996 cmd.exe 100 PID 1828 wrote to memory of 1064 1828 alpha.pif 101 PID 1828 wrote to memory of 1064 1828 alpha.pif 101 PID 996 wrote to memory of 2076 996 cmd.exe 102 PID 996 wrote to memory of 2076 996 cmd.exe 102 PID 2076 wrote to memory of 4076 2076 alpha.pif 103 PID 2076 wrote to memory of 4076 2076 alpha.pif 103 PID 996 wrote to memory of 3000 996 cmd.exe 104 PID 996 wrote to memory of 3000 996 cmd.exe 104 PID 3000 wrote to memory of 3988 3000 alpha.pif 105 PID 3000 wrote to memory of 3988 3000 alpha.pif 105 PID 4676 wrote to memory of 1052 4676 19012025_1019_x.exe 107 PID 4676 wrote to memory of 1052 4676 19012025_1019_x.exe 107 PID 4676 wrote to memory of 1052 4676 19012025_1019_x.exe 107 PID 4676 wrote to memory of 1052 4676 19012025_1019_x.exe 107 PID 4676 wrote to memory of 1052 4676 19012025_1019_x.exe 107 PID 1052 wrote to memory of 4768 1052 xgtukcbW.pif 115 PID 1052 wrote to memory of 4768 1052 xgtukcbW.pif 115 PID 1052 wrote to memory of 4768 1052 xgtukcbW.pif 115 PID 1052 wrote to memory of 116 1052 xgtukcbW.pif 116 PID 1052 wrote to memory of 116 1052 xgtukcbW.pif 116 PID 1052 wrote to memory of 116 1052 xgtukcbW.pif 116 PID 4768 wrote to memory of 2512 4768 Trading_AIBot.exe 119 PID 4768 wrote to memory of 2512 4768 Trading_AIBot.exe 119 PID 4768 wrote to memory of 2512 4768 Trading_AIBot.exe 119 PID 4768 wrote to memory of 4424 4768 Trading_AIBot.exe 120 PID 4768 wrote to memory of 4424 4768 Trading_AIBot.exe 120 PID 4768 wrote to memory of 4424 4768 Trading_AIBot.exe 120 PID 4768 wrote to memory of 2284 4768 Trading_AIBot.exe 123 PID 4768 wrote to memory of 2284 4768 Trading_AIBot.exe 123 PID 4768 wrote to memory of 2284 4768 Trading_AIBot.exe 123 PID 2228 wrote to memory of 3992 2228 SearchIndexer.exe 141 PID 2228 wrote to memory of 3992 2228 SearchIndexer.exe 141 PID 2228 wrote to memory of 1260 2228 SearchIndexer.exe 142 PID 2228 wrote to memory of 1260 2228 SearchIndexer.exe 142 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Microsofts.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Microsofts.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19012025_1019_x.exe"C:\Users\Admin\AppData\Local\Temp\19012025_1019_x.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\WbckutgxF.cmd" "2⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows \SysWOW64\svchost.pif"C:\Windows \SysWOW64\svchost.pif"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd4⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif5⤵PID:3244
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif5⤵PID:4480
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif5⤵PID:544
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Public\Upha.pifC:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto6⤵
- Executes dropped EXE
PID:1064
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Public\Upha.pifC:\\Users\\Public\\Upha.pif start TrueSight6⤵
- Executes dropped EXE
PID:4076
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Public\aken.pifC:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
-
-
-
-
C:\Users\Public\Libraries\xgtukcbW.pifC:\Users\Public\Libraries\xgtukcbW.pif2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Trading_AIBot.exe"C:\Users\Admin\AppData\Local\Temp\Trading_AIBot.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe" /st 10:26 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4424
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsofts.exe"C:\Users\Admin\AppData\Local\Temp\Microsofts.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:116
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4992
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4328
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2032
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2992
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4880
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:868
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3200
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:5032
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1420
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2740
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2368
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:3768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4036
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:508
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2028
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1500
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3992
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e1b7d1400ef452e0c37cdbbdfa615f62
SHA1df09d1b1e6c462153ce72c5e79fad36bddf27092
SHA25668903b04fe1a8622743a0e3a3d91ae9aa76d7e48f520756a9d7035153db9ee83
SHA512c752d7c7a5e8bd374c6a66a596a70b71ec7f40a42f24121a261d6a7fb37554313d9f371f8cd658428e675871c2c75618049857af3e9a7300339295fa45e45ff5
-
Filesize
1.3MB
MD513efe64fd94d5e515ea81630b9deb9e8
SHA19cf03fcb88a34ded5d08f6d7c4a857f2d0409300
SHA2563acf0d26ec431a13228ba2b22411105e241dc88e5a69a59be6ff86e0dd8aa508
SHA5128709765c375910c942559d846153aa909502ea8160bf0f92f2cd85c197782ca9857836120dc264f7bef6438fdde6264fecc6cf5af4566decb76c6a340bb35c62
-
Filesize
1.6MB
MD5a41ad86a60315e1a8f860f6f86efbc4f
SHA1faf0d8d71b8afc97e7b039a1d942b7f95b05409e
SHA25638b6705d31e0e9e6048b807b4f82b348fd7b884734ac8748a4a51760409a3388
SHA51272140375ada61ae0409493be1bf17becc862675d4e9fcdb402ff8ba51427951a7123ea44edeb3cfc870e38bbb67abe35f6c4c8ea55dad061f716a9c6c73a227e
-
Filesize
1.5MB
MD5c2cfece8aae166a5cdd4f9d0d609e566
SHA1c43f8d5c8fc6b2d02b1354eb662c5467a2e45ed9
SHA2565f2d2b1e9713ec3b636d79e2c9bd4357033e8c39e6fb3683843cf7f710d8e36d
SHA512180ce0afdbfd9a56430be2fd43ab5f8ee113625cf5e3b6559b756efb644ec47f06843ccaa58e7724e76b7ee6038189fa45937956989d66139b13835c6ebd35e3
-
Filesize
1.2MB
MD5eb5109cb904a405b746734288b93b01d
SHA16ce229ef32c5fa0fc6c9f4489f58e784529764be
SHA2568470408cae096cd5516c5d1bea19bd13631db743c4b8c9371c3ef31b5251a8fb
SHA512195c9e5a1cf28b1da26cd3e4ad8a2ee730fa02c949c6e466da85d2953f25a5c84ef76fa861a27fee110e9b03c80d77c2945095c47a9a97d77948c2ce38eee938
-
Filesize
1.1MB
MD504529d0319b82dd72bc2583a9ad4d838
SHA12e26efdbd40b4356eb707ecd41be41128bc4b81a
SHA256c1c5360488b5c3c8156d5d194d4f0406fa8c6433a4241bc8374c34eec69ee87f
SHA5127c1b7b41eaf4aa4b43004d4b99431dd89511cdbd754d64f5dd5a6670d4afb08d96e2244969d8cda16eef927d57e55144289a1e8fc8d0e547e70563246f17763c
-
Filesize
1.3MB
MD54e6796d050775a95abaee853647cc7c8
SHA1b7031567b131c866c33846a067c6ed05f3469507
SHA25678794382ed7e731d7a0ce2827501e31c8860bc46a0180f5f29eb3b8f19beac2b
SHA512d9d8a6d33d89ed416324d3a01b39631771cb2909e1f4088e18e0faab2f935631783df8b1da4b96904c6fff0a17c17ddffa2ea2a0a85ac704e63dcb54306a4afd
-
Filesize
4.6MB
MD5e6c46418e2e3aa683cf7acb17b724bdf
SHA185c2ffeffde9dc51294e47a3d86d259e1e351dfe
SHA25642e6377349dacc7af8305cf3d33a17640d626f54c2e178bb2bc68fa67807dfe6
SHA5121c52f06badcc46a4c1f6409c5a4cc6c2338cce55f7f01913b6a01081a0137eadf2945bdbee5c411f5077938bc3fa6f87c790a3f71fa3c6ac45ddb627eabf9de4
-
Filesize
1.4MB
MD529c0a68093b15b5991fb0d8c2fb0d150
SHA1b69e118b41fb02ee3633bf55ba9eb93191150301
SHA256f6d0498d3d0cda297e58be0ae094cfdf07fb3a8a9581c66e5449f95ed6136bb2
SHA512903692afaabeb45bbd27c887e2663cfc8f10124b5ebb3a17f1394e72621ad7a0a63046d839f07cf18cc60408cc73c76380c1e555232bb7730ba213513c697939
-
Filesize
24.0MB
MD5c55fa5aff4fb4180d41f7daa42309265
SHA18ac23519c418b49a2c7c065aa10bea3d4b043908
SHA25689738a3a581e6afc97c311ad0ffeb140035bd34202c879a33a55a541564393db
SHA5128853334ea136845e8e0d1088e15770012956fa549d14ad36b99d05f4ce6986fe2a5e1e49189807723af7e80abf12f277889465949625dd4026e1b951ea3f99a7
-
Filesize
2.7MB
MD54f277804690aa2f3db8a117b6d891a75
SHA1562a75f7ef4e511820e50fcd1a7df3d82d9956bf
SHA256ae38c6a5a61e02dacf27651fbf9a4edd264bf4da01b76ae1c0edc725aad694f4
SHA512afaa5fe2af7fd45a41d21b42986e230abd4a009852c40d4e84bc2590508a475953add6876e22961df4712b385762711dd0445f75607e4bcbd2ff526b40f3d6c9
-
Filesize
1.1MB
MD50dd909de1cc06b181ecf8d1b7b5e4560
SHA13d000b957abb82525c72f2c60483a2487dbd77fe
SHA256f086b37d6504c61148b7643562b1c979a283551a748cc2e092f971c5347a7765
SHA5127593645e4c36bb18f48978ab9a20eacc85706b402baf13d719b3d1666364752c5061336379c9a99a18b125b7a7f35b9bcf8e453ee23f68cc22dc5167dac99305
-
Filesize
1.3MB
MD542b9595c6490051f8e6805e35e52b2a5
SHA11cbe2ff9b54cbf03fdb63bc00088b1194ac8ae9c
SHA25647594f4405ae3ea3500a28c5c3c3db8225d263f3d24308129510d729d845eca4
SHA512434adde452af23db471cbc6ffa8ed31ed195d220a4132ee4edd3a6a0cfb2bac16058aa4d96cd4b28695d2b14fa399cddad903e33ccf540cca76d493bf61d7a70
-
Filesize
1.2MB
MD5ca650103cfac5708eb73a0a2b3cbfa82
SHA10263f41580c7d9256d4fc61b4b6104d56a5c66e0
SHA2562de78ba3f81caad034509c940f396c771d67cc4b04d1803feb9f32024b77c51f
SHA512b71ffec0b5b2f362fc779bade83089999dd5af69bfb0a9e4e777171ff9da234e00e48bf226b55e4e91492c8d21068a5f2d5d8dc39c84f7dca18bc7f9af862ab4
-
Filesize
4.6MB
MD5d52eb18460607c1c6171eab2cd1c3135
SHA1d1fe66ebdc1251750740f852ac7bbc184e2dcf94
SHA256a0bcbe2df80ce3a8ce1a564175e5a5a0d5a476390d45e34cf71bf384e721ccf2
SHA5127e047fc91934c364bb770979cdf56d23f84929c5bf330464f8b0d03ecd36d953187a9ff08dca689fed79b05a0afe192d85fe8de699a097fdac03ac9749576b42
-
Filesize
4.6MB
MD5536d2bedac6fc07ebf805bcc26494705
SHA1d882f8e88e7a92f25515bc61c394a2a215ec7507
SHA2565b2ec650d02b0dea261c19789830da13f1597973fe18ef5082d72d9fabad90b7
SHA512af357a2f8a95e44e187c4b6078bf215e2bc24272ddae3c67cd5ede9ee9254e4fbc43f70f74bfdc05b80b95b0e5b777c76b5d27b43fc7ce07252a20f224038478
-
Filesize
1.9MB
MD5eb5a2d7d5aeeda5defd8710ed1f686fc
SHA1e66c7a66e74fc188958a9e8ee955ec7e04f01b44
SHA25612ea90af4c73e986e8960ff33b4d0c9d74c4175232e1fd6b0b13172882e8d55f
SHA512ee7fefb93eea608acfb1e557b2ef1042ceed8006c72ab451491cf99ecca804a6fe89c8ef0c6558907faa50cc39fda9126b2c0a1a416ed1da6d30057f244e1930
-
Filesize
2.1MB
MD55b53961c9ecbc185c377cb10e2aa403b
SHA1e8e705979b1716561c5e7cea52027e56425b146d
SHA2564cb25e5f02e1628a58304a80b3a66804cda94ce8137def4f50a8058e0c5ea04c
SHA51236bfc35c8935f88accca67dc1ed79aebad419d7a20acdb673762a41897e3c3754873d09b35d58277102ba6eb9f710b19204d7db122789ae1d773f54a55632252
-
Filesize
1.8MB
MD56dacab7d603f9310bf808b0a625d5d23
SHA116fe9a0677057e618d87b94bce8873c892d739f8
SHA256133ff67077d6ba1217f5efae224710684a2a7454b2865997244fdcff4e49ac7e
SHA512d7de3539009d1cdfc7bb5521b37d1b77c4d9de2be06fc61aad4b15298bb98637f3aaf319e6ffb0059a036126e8672e4518c50677e10cec637f11bf6f36ce860e
-
Filesize
1.6MB
MD5035afc2949aa9b80c41f4ada1c1f2c7c
SHA1fdc6805585557939d57e116f2df61764166fb0a5
SHA2563401ec3b34d656e715d6c594b55569e8d3c27fa97286d8d8df70d2a68967229c
SHA512fd8e265a9c392b37bab08569900d33d24561972df06d75cba7353fd99370c7759d872219a94071da471ee05be5aefba9b7eda1cd8882fcd2a39e2eaae5a29946
-
Filesize
1.1MB
MD514ab0aa65cac2a2af39b624481b5fe77
SHA173694c9dbe719ac39510ec328a9a47ba7a5c8f12
SHA256cc2285baf417c87b764639360e76853fedac337c2cd6efbfdd61657b5c7706b6
SHA512d28bf2bab441beafa3d6679f4cdae4bdfcf0326067f24cc40ba40a44598717604a24317a85f66450f46a17f63357c6d0e92f98612e7444c3a6e67711529b6b51
-
Filesize
1.1MB
MD5076586c7287b7d83f787b01f311c063f
SHA152780ba599ec742b652145e618e7a419c350406c
SHA25686cfebed12f463ab2ae91337144793c01b59bce2fa6543135ad52cbf4c0f40f4
SHA5126fbe126d239b5ee092c41e50e5bd48f424623db0df101aaa68e09eb2d6e1a267f9a92dec801519cb7bd7ed953c0da9685136caee14ffe6d3da53cdc52ae6812b
-
Filesize
1.1MB
MD537155a6b702216e944f7714c76ba310d
SHA15eae0e4735ccb89857727a4884502f4c6a1a5b02
SHA256c86c20cf309af37f1c47a3baec4ffad21ef8223a406cc5fa18a0ff52cb66abf6
SHA5128a95ccb93d64ffdc18420342fdfaaa69e0c110de72ad91a5ca568802ca4a5913a59e6e5c80ae21090c6eeff2a5416495a4b488089f12cce890bed945f2390e6d
-
Filesize
1.1MB
MD5ea87541f6f6236fb9f71257aaf976428
SHA1442bd89656e43a224ffd82f50434b1f161bcab56
SHA256cefd2f3eba58ff5824687cf400f341174890268cb0925a06a70ff240517579d7
SHA51244abdc1c4620e715ee9a302031f8a861aa26d098b67c77465c509692f5e96cc09297f5d884253c96e4b1dfa1c4b72de58e187c263410f741cf1c88b02deba089
-
Filesize
1.1MB
MD53d576d6ca2119f347e9a55085dd8f1d6
SHA1ef7ee83c62fc8463810c4f611d05373551ea7ab4
SHA2568127a70c322a39681c1d665112e0e3b5cad14e9efd2a55a054d4c88342ea3351
SHA512e0b7aaa21ba6de16e1c4c82e5303fc3c8e10529b9f302fb8589da8308ac84a1e82e0ff55a29008442cc15e2b9d9bd4d5fcb5f0f87f769ef8cb05f4b666b67ab7
-
Filesize
1.1MB
MD56eeec015ec6ba1531d1d403b4b4846f6
SHA116055ef86fd187f93c5951b51458fc6448e0f278
SHA256171e1e861fb24b414286d982badaf75b1f3ae983cd11e1590f454f70615d4cc0
SHA512d76b2933041690ed5e83d193bc93c77444c38e685e32f0ee73a67874e14b17f07c41ac8a9102da8b251de01b2bb44fa15a69a5b6f16214e52ad1806a7e03cdfe
-
Filesize
1.1MB
MD54aca03e0a056fd005b01eee456234ca0
SHA1df0566d06b61d8273c13e0e2dad7942e1e66a131
SHA256e9f50432e204a480e033653bda4fe61810f5726500cca3f3bebd4d8b2ca9866d
SHA512d0825575e26d8e8bfc15f8747d795098c817ccc0c72a82e7219dfce53db9a427a600b117aeb37cbb0165215642f5f9c54ec13ba069a6c8c0107b433f23594dce
-
Filesize
1.3MB
MD59bcbe6f7846d2096598d9f87e718dce1
SHA116e8312b47bdd7c6a563a42d9556efaf829521cc
SHA2562496916442220e81b5e76442c21977ef47ea64436b5047ca9d723b04a986fc61
SHA512207ad545559dd0573ff6ec9ed1225809aed7df6949ec10953f57357445fc253c60db85d8bcca881c76f530ddb992283ab934c9ae925165c120225b23f7ed2526
-
Filesize
1.1MB
MD5db89e0f970c6b505b3db122d7204d83b
SHA1d0a0dad57c45a2e1788368ea58fc6fa1dbda995c
SHA25656377397067cd8e82c151c765a25a59ca4b5d65fc81f9acf2d6e9dcbf4d98ec1
SHA512dd44a374e672a21cd831b6e4876e9c839f1eea06d1f73e09ad0e2790ff1ca88e3b9fa8e264c228849a0663f640274fb172e4390350daeb59271f8666e98321e9
-
Filesize
1.1MB
MD5162d31371e0df38801975658e89c152f
SHA1a8e31b303b57cbdc7abb4c6a7b6fc6d3cfb26d7a
SHA256f34284fb31b1c28a798015a73128c4c33f1e8686480fdb9f97d2266aafb409c4
SHA51235c7d663eb75a5102224d29418f58c445762d8e57263f3b7d95e8db1495865b0a423726af358f37779d51912457dd7b168be79f79c306d93b822a4d6f0098351
-
Filesize
1.2MB
MD5d775cb71ebda8e933ca2cfb5b4920519
SHA189882629900bdfa03d7b7901e55ac1899c159424
SHA256f76f53ffbd28825eec1562fc9f8fbdb8f52cf99ed7898b8b51773c0a3b02e524
SHA51214a9221e6309e8e80efcff35654474ad7afddac7a236f484d6edad187076cb45f48c3e6141dc00d7e59b6c5c80bbecba6e1b54770366303b84d2ac5eca571cba
-
Filesize
1.1MB
MD5add4f23eb7faaf7e3edd115116545929
SHA1b5e847c74d10495a2b2d3719818c4c6074133f4e
SHA256ce657d10a5ba1e0337708bb86823f771368fae4cd6dbedc43b3951c0c42e9d9c
SHA51200c5d54bd2706c990f02a618f4ea2ab8e51476e1df278ebdb7274e3faae000f6dfecd9224ea62ba5b91363dd785505ffecc7ad819e4c14176e1fbf42353e0ece
-
Filesize
1.1MB
MD5a56f8fc250e44c3b0f0f6a6691251a7f
SHA12824db464142c90fa9a690b14f5ecdb2f83f3195
SHA2563856ce527891d45fe6b55d79514a5f2a55179f7023e0f635e793afc0a3d4ef07
SHA5120300e94aec88fb7b56fbe9dc7d9325c7e1812e53a2424d172678fe3ef6d9f454d917817a497259f98dee2c1775e5780748c9d2a69bbcbd00776df1628bb0343a
-
Filesize
1.2MB
MD536986515d0d07c2906cbadfdba9a9509
SHA1b03b6e4480a0d8c0173af7045f95eaf65aa11287
SHA2560a927cfc490090500875f2d7cb45ffce3e55a1646264dbe7a34a58380c059041
SHA5123df8e9035e2cd3109c7ec57ed30310dce36964b11bd1ec57e7211f3f7af44417134a6fb914887e895f0fc2094f0961809dc4c93d28cb006041521034beab29d7
-
Filesize
1.3MB
MD5c65f9e121652d67f34fdad46200afa12
SHA1372d031c3c703faad09e6729314f1794750a73af
SHA256870ae09f518bf35156fae9408de20910a87fc4854e0d6e8acc3dd2c7b3bc00b5
SHA51200dd75949f5bb8fe81b366247cd0ab54365256ecb59065cb9f2a7fe8e5507e1c7e0549eed3b4300bc6c46a6dcc5d2db9a325266aa9ad980654fe1a914f224f99
-
Filesize
1.2MB
MD58968bb2c523b467ed7400a0e78088b1e
SHA1886b000375b6cd1a3b7b7fd4fb19f39d2f86288f
SHA256327caf5e22f43ec65210b40ac40ccbffb9a2d22de6c07315ac90651ec8cdd418
SHA512eaf1f277c42814cd383f603d7ee94f0f3dead4398cb87fcb433f9eda6c84c46f080228ae1ad6ce48d90427c119d7bef5c609f4058242bdf43a3c1ffbd3911f81
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
96KB
MD5f6b8018a27bcdbaa35778849b586d31b
SHA181bde9535b07e103f89f6aeabdb873d7e35816c2
SHA256ddc6b2bd4382d1ae45bee8f3c4bb19bd20933a55bdf5c2e76c8d6c46bc1516ce
SHA512aa958d22952d27bad1c0d3c9d08ddbf364274363d5359791b7b06a5d5d91a21f57e9c9e1079f3f95d7ce5828dcd3e79914ff2bd836f347b5734151d668d935de
-
Filesize
69KB
MD5e91a1db64f5262a633465a0aaff7a0b0
SHA1396e954077d21e94b7c20f7afa22a76c0ed522d0
SHA256f19763b48b2d2cc92e61127dd0b29760a1c630f03ad7f5055fd1ed9c7d439428
SHA512227d7dad569d77ef84326e905b7726c722ceff331246de4f5cf84428b9721f8b2732a31401df6a8cef7513bcd693417d74cdd65d54e43c710d44d1726f14b0c5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8KB
MD57821e3de3812e791cf3b223500d73bc9
SHA15e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d
SHA2563daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74
SHA5126eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26
-
Filesize
55KB
MD53c755cf5a64b256c08f9bb552167975c
SHA18c81ca56b178ffd77b15f59c5332813416d976d7
SHA25612e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490
SHA5128cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa
-
Filesize
171KB
MD522331abcc9472cc9dc6f37faf333aa2c
SHA12a001c30ba79a19ceaf6a09c3567c70311760aa4
SHA256bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c
SHA512c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c
-
Filesize
70KB
MD53fb5cf71f7e7eb49790cb0e663434d80
SHA1b4979a9f970029889713d756c3f123643dde73da
SHA25641f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9
SHA5122b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5
-
Filesize
11KB
MD5f82aeb3b12f33250e404df6ec873dd1d
SHA1bcf538f64457e8d19da89229479cafa9c4cce12f
SHA25623b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6
SHA5126f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397
-
Filesize
116KB
MD50f088756537e0d65627ed2ea392dcaae
SHA1983eb3818223641c13464831a2baad9466c3750f
SHA256abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6
SHA512d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7
-
Filesize
1.2MB
MD543672ab07e44138843cf0a28a8a57e21
SHA1442b0328cd12ed392b29aa693d3efd81e5617442
SHA2568c65f415980cbe613bf8ee961b8534e53243bdfd9c02da5f9f2d16f7fc0bbcc2
SHA5128a7793b3da8a70f058385594ae1344bb3f7409a7bff447a768a6c7a1c4539a811623c612079c1f3ba704c56a855cc4ebc5065349bf618b20f3a3688a34c76da9
-
Filesize
1.2MB
MD577f0941fb2cc4960b6a7d853fea2cac0
SHA1131ddfec9f870da3622cd02d914d73a1b2ae9d5b
SHA2563da0b9506a350ce29d0ecb305dc030ebf3b5e01a507eada78d2e9562c4964fe6
SHA51288f5a1ce1b9ab1c9f4c14399cf10d7f1e8ce4dbfa956df4a9f7469af65b1053f40b8319de1c12bb2ea750377d66f3b19787d0e1004e89a4cb8207acc89a2e3a0
-
Filesize
1.2MB
MD5c2001e62a3ace578e24c9e23f22c7325
SHA11fd1384e9123f937a8b8e87e8d5008052393196b
SHA256507c00d60ff7a39bce2d93caac5ab880943ee876f6ff3a0dd8b0ab9f88410ffc
SHA51268e0240ee128a6ea6861fc3279b1b7465e7be34a06e6a8f41b78f451894ba07d86ce512f5b5ed15e5b324f42ad02bbd3e840367939221122ec03cfe1127707fe
-
Filesize
1.2MB
MD5d6dea48aa1cb91447097ec3408406f7f
SHA16f21f05f33fc5b1b4487d1c27a72802af47e9864
SHA256db566e9e1b3a9df532718da9a8a0c9fc022263d60fc82d29aa269fd03ec5b758
SHA5120653cd2c6180a2de8e12bca0f679423b7150f90d63b0b46ed82d8881bf4c367d943d6091a7c1f9e93632c67e94afe6bdd8d45c077edda19a4bbc4974868a52f0
-
Filesize
1.3MB
MD5e8c2dd7d01b9579f0f71bc2901369f2f
SHA17b0ae5a632d1854ea7969408744bf5c9b0da1103
SHA256d88567a6b1da068076644591822a4acfedbeaff8843829a64b6584db6da0775e
SHA5123545bb72e6b0195c45e4c7a9a65c53e8cb6c9b08a1edc94f61fcecdf730bad27b29b54eeafdd19c928d4009c2c0413fc01fbdc6eab4473ba1c8933dfe2499229