Analysis
-
max time kernel
142s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 14:40
Static task
static1
General
-
Target
28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe
-
Size
5.3MB
-
MD5
3e34a4079a28dd2da3595cda4b02b28f
-
SHA1
b0b3df4afb3d9714a551f9f1db8877e3bb248770
-
SHA256
28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5
-
SHA512
9e1b0bf3f00dec6774adb49f0126302c0e7726d3f38c044e4bc12505922cc4bb93e55d5a926a4309cd0f407b8c1314cc0f1670eeb1eb4b67c9fa2e1ae03d8df9
-
SSDEEP
49152:U7nubEiNrMdIyfN6RCZjKDvsbl6TT3kc40e4VOmCOVMhDkrda1oS3QZX+yav3Qwf:U3EJZalfT3x0byWYwE
Malware Config
Extracted
vidar
6
5a1fadccb27cfce506dba962fc85426d
https://steamcommunity.com/profiles/76561199560322242
https://t.me/cahalgo
-
profile_id_v2
5a1fadccb27cfce506dba962fc85426d
-
user_agent
Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 uacq
Extracted
amadey
3.89
http://193.42.32.29/9bDc8sQ/index.php
-
install_dir
1ff8bec27e
-
install_file
nhdues.exe
-
strings_key
2efe1b48925e9abf268903d42284c46b
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral2/memory/4224-190-0x0000000004FF0000-0x00000000058DB000-memory.dmp family_glupteba behavioral2/memory/2292-195-0x0000000005050000-0x000000000593B000-memory.dmp family_glupteba behavioral2/memory/4224-206-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/2292-216-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/4224-262-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/2292-304-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/2292-370-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral2/memory/4224-416-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 PID 5028 created 3176 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 34 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts LC.exe -
Stops running service(s) 3 TTPs
-
.NET Reactor proctector 7 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000700000002326f-291.dat net_reactor behavioral2/files/0x000700000002326f-290.dat net_reactor behavioral2/memory/4172-302-0x0000000000BC0000-0x0000000000C30000-memory.dmp net_reactor behavioral2/files/0x000700000002329d-464.dat net_reactor behavioral2/files/0x000700000002329d-463.dat net_reactor behavioral2/files/0x000700000002329d-453.dat net_reactor behavioral2/memory/5740-484-0x0000000000470000-0x00000000004FA000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation fYlX9aKP1uodujCFIUpxSNrG.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation nhdues.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation oNHogzyZO5ZOnSgSyr0eSLNG.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation LC.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation Install.exe -
Drops startup file 11 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CfUsuU1g2bBQn1pbokbmbJPF.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zofGq4Iajlhbo5xWsEzqQYIt.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kazOppOwYNQG0BJKKJa3WZz5.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kJ3VBGm5AGm668adLozAyzS7.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Oa0eKCuBjFGS3Yj6uT3DHYXa.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjK472J6Fbz1AoG72GfABnYP.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SqBTr2Oj46u3tsbUZbx9nDzQ.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\caW9Bq7C4xQUtK5lP0nMots4.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\40CI0zc186Qc896lM1br76jg.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZjoWbRhiQRMtPOSr4GZzqZHC.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sE1T7ayiRn6fdhSrnGJRJ6gO.bat InstallUtil.exe -
Executes dropped EXE 29 IoCs
pid Process 1972 UUId9P09lBJ2fYg89bucxh65.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 4224 IzFckwxv2oDqWqb1ClfR8jix.exe 3604 fYlX9aKP1uodujCFIUpxSNrG.exe 3216 oNHogzyZO5ZOnSgSyr0eSLNG.exe 2292 2tBlYr0wq2PaklUwXPs5xbKZ.exe 4140 1ChTAMoUXeFUxDdpw4XCG6Bb.exe 3680 fAE331kNekFtA7ZYJToQMda9.exe 4240 nhdues.exe 3088 fAE331kNekFtA7ZYJToQMda9.tmp 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 4648 1ChTAMoUXeFUxDdpw4XCG6Bb.tmp 2608 x66lhFodRN0shx3mmoWoAfBb.exe 4792 RguwBEGFGt7NrWlyMyb6mtOG.exe 3024 RguwBEGFGt7NrWlyMyb6mtOG.exe 3284 x66lhFodRN0shx3mmoWoAfBb.tmp 4108 _setup64.tmp 4664 RguwBEGFGt7NrWlyMyb6mtOG.exe 3056 RguwBEGFGt7NrWlyMyb6mtOG.exe 4172 LC.exe 2428 nhdues.exe 4876 mJphSwvJUrHpRtKrYNF8U8op.exe 5252 Install.exe 5424 Install.exe 5556 DigitalPulseService.exe 5740 Pubabaleshu.exe 4248 lightcleaner.exe 1012 lightcleaner.tmp 2708 nhdues.exe -
Loads dropped DLL 12 IoCs
pid Process 3088 fAE331kNekFtA7ZYJToQMda9.tmp 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 4792 RguwBEGFGt7NrWlyMyb6mtOG.exe 3284 x66lhFodRN0shx3mmoWoAfBb.tmp 3024 RguwBEGFGt7NrWlyMyb6mtOG.exe 4664 RguwBEGFGt7NrWlyMyb6mtOG.exe 3056 RguwBEGFGt7NrWlyMyb6mtOG.exe 3216 oNHogzyZO5ZOnSgSyr0eSLNG.exe 3216 oNHogzyZO5ZOnSgSyr0eSLNG.exe 5188 rundll32.exe 5276 rundll32.exe 5660 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000700000002322f-159.dat upx behavioral2/files/0x000700000002322f-168.dat upx behavioral2/memory/1160-196-0x0000000000050000-0x000000000059D000-memory.dmp upx behavioral2/files/0x000700000002322f-200.dat upx behavioral2/files/0x000700000002322f-211.dat upx behavioral2/memory/4792-218-0x0000000000050000-0x000000000059D000-memory.dmp upx behavioral2/memory/3024-230-0x0000000000E00000-0x000000000134D000-memory.dmp upx behavioral2/files/0x0007000000023250-221.dat upx behavioral2/memory/3024-243-0x0000000000E00000-0x000000000134D000-memory.dmp upx behavioral2/files/0x000700000002322f-245.dat upx behavioral2/memory/4664-253-0x0000000000050000-0x000000000059D000-memory.dmp upx behavioral2/files/0x000700000002322f-261.dat upx behavioral2/memory/4664-349-0x0000000000050000-0x000000000059D000-memory.dmp upx behavioral2/memory/3056-350-0x0000000000050000-0x000000000059D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DigitalPulse = "\"C:\\Users\\Admin\\AppData\\Roaming\\DigitalPulse\\DigitalPulseService.exe\" 5333:::clickId=:::srcId=" 1ChTAMoUXeFUxDdpw4XCG6Bb.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Google\\Dimijosesha.exe\"" LC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: RguwBEGFGt7NrWlyMyb6mtOG.exe File opened (read-only) \??\F: RguwBEGFGt7NrWlyMyb6mtOG.exe File opened (read-only) \??\D: RguwBEGFGt7NrWlyMyb6mtOG.exe File opened (read-only) \??\F: RguwBEGFGt7NrWlyMyb6mtOG.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 204 ipinfo.io -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Dimijosesha.exe LC.exe File created C:\Program Files (x86)\Windows Multimedia Platform\WZVGQABOBQ\lightcleaner.exe LC.exe File created C:\Program Files\Google\Chrome\updater.exe 4fL5NU7cAAJINaayvKW2oDhO.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5544 sc.exe 5812 sc.exe 5924 sc.exe 6060 sc.exe 5344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 oNHogzyZO5ZOnSgSyr0eSLNG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString oNHogzyZO5ZOnSgSyr0eSLNG.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5176 schtasks.exe 2124 schtasks.exe 5352 schtasks.exe 4872 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5484 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\MuiCache SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4592 powershell.exe 4592 powershell.exe 4648 1ChTAMoUXeFUxDdpw4XCG6Bb.tmp 4648 1ChTAMoUXeFUxDdpw4XCG6Bb.tmp 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 3824 powershell.exe 3824 powershell.exe 3216 oNHogzyZO5ZOnSgSyr0eSLNG.exe 3216 oNHogzyZO5ZOnSgSyr0eSLNG.exe 3824 powershell.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5028 4fL5NU7cAAJINaayvKW2oDhO.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe 5740 Pubabaleshu.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeDebugPrivilege 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeLoadDriverPrivilege 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeDebugPrivilege 1476 InstallUtil.exe Token: SeDebugPrivilege 1972 UUId9P09lBJ2fYg89bucxh65.exe Token: SeDebugPrivilege 3824 powershell.exe Token: SeDebugPrivilege 4172 LC.exe Token: SeDebugPrivilege 5556 DigitalPulseService.exe Token: SeDebugPrivilege 5740 Pubabaleshu.exe Token: SeShutdownPrivilege 3376 powercfg.exe Token: SeCreatePagefilePrivilege 3376 powercfg.exe Token: SeShutdownPrivilege 3928 powercfg.exe Token: SeCreatePagefilePrivilege 3928 powercfg.exe Token: SeShutdownPrivilege 6120 powercfg.exe Token: SeCreatePagefilePrivilege 6120 powercfg.exe Token: SeShutdownPrivilege 3896 powercfg.exe Token: SeCreatePagefilePrivilege 3896 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4648 1ChTAMoUXeFUxDdpw4XCG6Bb.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5836 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4592 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 86 PID 2696 wrote to memory of 4592 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 86 PID 2696 wrote to memory of 2808 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 89 PID 2696 wrote to memory of 2808 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 89 PID 2696 wrote to memory of 2808 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 89 PID 2696 wrote to memory of 1364 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 91 PID 2696 wrote to memory of 1364 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 91 PID 2696 wrote to memory of 1364 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 91 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 2696 wrote to memory of 1476 2696 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 90 PID 1476 wrote to memory of 1972 1476 InstallUtil.exe 104 PID 1476 wrote to memory of 1972 1476 InstallUtil.exe 104 PID 1476 wrote to memory of 1972 1476 InstallUtil.exe 104 PID 1476 wrote to memory of 4224 1476 InstallUtil.exe 103 PID 1476 wrote to memory of 4224 1476 InstallUtil.exe 103 PID 1476 wrote to memory of 4224 1476 InstallUtil.exe 103 PID 1476 wrote to memory of 3604 1476 InstallUtil.exe 100 PID 1476 wrote to memory of 3604 1476 InstallUtil.exe 100 PID 1476 wrote to memory of 3604 1476 InstallUtil.exe 100 PID 1476 wrote to memory of 5028 1476 InstallUtil.exe 102 PID 1476 wrote to memory of 5028 1476 InstallUtil.exe 102 PID 1476 wrote to memory of 3216 1476 InstallUtil.exe 101 PID 1476 wrote to memory of 3216 1476 InstallUtil.exe 101 PID 1476 wrote to memory of 3216 1476 InstallUtil.exe 101 PID 1476 wrote to memory of 2292 1476 InstallUtil.exe 105 PID 1476 wrote to memory of 2292 1476 InstallUtil.exe 105 PID 1476 wrote to memory of 2292 1476 InstallUtil.exe 105 PID 1476 wrote to memory of 4140 1476 InstallUtil.exe 127 PID 1476 wrote to memory of 4140 1476 InstallUtil.exe 127 PID 1476 wrote to memory of 4140 1476 InstallUtil.exe 127 PID 1476 wrote to memory of 3680 1476 InstallUtil.exe 106 PID 1476 wrote to memory of 3680 1476 InstallUtil.exe 106 PID 1476 wrote to memory of 3680 1476 InstallUtil.exe 106 PID 3604 wrote to memory of 4240 3604 fYlX9aKP1uodujCFIUpxSNrG.exe 107 PID 3604 wrote to memory of 4240 3604 fYlX9aKP1uodujCFIUpxSNrG.exe 107 PID 3604 wrote to memory of 4240 3604 fYlX9aKP1uodujCFIUpxSNrG.exe 107 PID 3680 wrote to memory of 3088 3680 fAE331kNekFtA7ZYJToQMda9.exe 108 PID 3680 wrote to memory of 3088 3680 fAE331kNekFtA7ZYJToQMda9.exe 108 PID 3680 wrote to memory of 3088 3680 fAE331kNekFtA7ZYJToQMda9.exe 108 PID 1476 wrote to memory of 1160 1476 InstallUtil.exe 109 PID 1476 wrote to memory of 1160 1476 InstallUtil.exe 109 PID 1476 wrote to memory of 1160 1476 InstallUtil.exe 109 PID 4140 wrote to memory of 4648 4140 1ChTAMoUXeFUxDdpw4XCG6Bb.exe 110 PID 4140 wrote to memory of 4648 4140 1ChTAMoUXeFUxDdpw4XCG6Bb.exe 110 PID 4140 wrote to memory of 4648 4140 1ChTAMoUXeFUxDdpw4XCG6Bb.exe 110 PID 1476 wrote to memory of 2608 1476 InstallUtil.exe 111 PID 1476 wrote to memory of 2608 1476 InstallUtil.exe 111 PID 1476 wrote to memory of 2608 1476 InstallUtil.exe 111 PID 1160 wrote to memory of 4792 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 112 PID 1160 wrote to memory of 4792 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 112 PID 1160 wrote to memory of 4792 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 112 PID 4240 wrote to memory of 2124 4240 nhdues.exe 114 PID 4240 wrote to memory of 2124 4240 nhdues.exe 114 PID 4240 wrote to memory of 2124 4240 nhdues.exe 114 PID 1160 wrote to memory of 3024 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 113 PID 1160 wrote to memory of 3024 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 113 PID 1160 wrote to memory of 3024 1160 RguwBEGFGt7NrWlyMyb6mtOG.exe 113 PID 2608 wrote to memory of 3284 2608 x66lhFodRN0shx3mmoWoAfBb.exe 122 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe"C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe"2⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\Pictures\fYlX9aKP1uodujCFIUpxSNrG.exe"C:\Users\Admin\Pictures\fYlX9aKP1uodujCFIUpxSNrG.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F6⤵
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "Admin:N"&&CACLS "nhdues.exe" /P "Admin:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "Admin:N"&&CACLS "..\1ff8bec27e" /P "Admin:R" /E&&Exit6⤵PID:1164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:N"7⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:R" /E7⤵PID:5900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:6012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:N"7⤵PID:3936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:R" /E7⤵PID:2792
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main6⤵
- Loads dropped DLL
PID:5188 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main7⤵
- Loads dropped DLL
PID:5276 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5276 -s 6448⤵PID:4560
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5660
-
-
-
-
C:\Users\Admin\Pictures\oNHogzyZO5ZOnSgSyr0eSLNG.exe"C:\Users\Admin\Pictures\oNHogzyZO5ZOnSgSyr0eSLNG.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\oNHogzyZO5ZOnSgSyr0eSLNG.exe" & exit5⤵PID:5716
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:5484
-
-
-
-
C:\Users\Admin\Pictures\4fL5NU7cAAJINaayvKW2oDhO.exe"C:\Users\Admin\Pictures\4fL5NU7cAAJINaayvKW2oDhO.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Users\Admin\Pictures\IzFckwxv2oDqWqb1ClfR8jix.exe"C:\Users\Admin\Pictures\IzFckwxv2oDqWqb1ClfR8jix.exe"4⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1312
-
-
-
C:\Users\Admin\Pictures\UUId9P09lBJ2fYg89bucxh65.exe"C:\Users\Admin\Pictures\UUId9P09lBJ2fYg89bucxh65.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Users\Admin\Pictures\2tBlYr0wq2PaklUwXPs5xbKZ.exe"C:\Users\Admin\Pictures\2tBlYr0wq2PaklUwXPs5xbKZ.exe"4⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3456
-
-
-
C:\Users\Admin\Pictures\fAE331kNekFtA7ZYJToQMda9.exe"C:\Users\Admin\Pictures\fAE331kNekFtA7ZYJToQMda9.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\is-SIISV.tmp\fAE331kNekFtA7ZYJToQMda9.tmp"C:\Users\Admin\AppData\Local\Temp\is-SIISV.tmp\fAE331kNekFtA7ZYJToQMda9.tmp" /SL5="$B00EA,491791,408064,C:\Users\Admin\Pictures\fAE331kNekFtA7ZYJToQMda9.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\is-19HED.tmp\LC.exe"C:\Users\Admin\AppData\Local\Temp\is-19HED.tmp\LC.exe" /S /UID=10106⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\a0-3371c-741-2a695-f79cafffab4a4\Pubabaleshu.exe"C:\Users\Admin\AppData\Local\Temp\a0-3371c-741-2a695-f79cafffab4a4\Pubabaleshu.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5740
-
-
C:\Program Files (x86)\Windows Multimedia Platform\WZVGQABOBQ\lightcleaner.exe"C:\Program Files (x86)\Windows Multimedia Platform\WZVGQABOBQ\lightcleaner.exe" /VERYSILENT7⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\is-4TF1V.tmp\lightcleaner.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TF1V.tmp\lightcleaner.tmp" /SL5="$60232,833775,56832,C:\Program Files (x86)\Windows Multimedia Platform\WZVGQABOBQ\lightcleaner.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:1012
-
-
-
-
-
-
C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe"C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exeC:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.26 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6ecd8538,0x6ecd8548,0x6ecd85545⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\RguwBEGFGt7NrWlyMyb6mtOG.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\RguwBEGFGt7NrWlyMyb6mtOG.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024
-
-
C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe"C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1160 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231013144342" --session-guid=8614e9d3-0135-4000-a684-a36d0618c497 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=5C050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:4664 -
C:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exeC:\Users\Admin\Pictures\RguwBEGFGt7NrWlyMyb6mtOG.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.26 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2bc,0x2f8,0x6d9b8538,0x6d9b8548,0x6d9b85546⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056
-
-
-
-
C:\Users\Admin\Pictures\x66lhFodRN0shx3mmoWoAfBb.exe"C:\Users\Admin\Pictures\x66lhFodRN0shx3mmoWoAfBb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\is-J6C56.tmp\x66lhFodRN0shx3mmoWoAfBb.tmp"C:\Users\Admin\AppData\Local\Temp\is-J6C56.tmp\x66lhFodRN0shx3mmoWoAfBb.tmp" /SL5="$E01DC,922170,832512,C:\Users\Admin\Pictures\x66lhFodRN0shx3mmoWoAfBb.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3284
-
-
-
C:\Users\Admin\Pictures\1ChTAMoUXeFUxDdpw4XCG6Bb.exe"C:\Users\Admin\Pictures\1ChTAMoUXeFUxDdpw4XCG6Bb.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=53334⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140
-
-
C:\Users\Admin\Pictures\mJphSwvJUrHpRtKrYNF8U8op.exe"C:\Users\Admin\Pictures\mJphSwvJUrHpRtKrYNF8U8op.exe"4⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\7zSE848.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
PID:5252 -
C:\Users\Admin\AppData\Local\Temp\7zSEA6B.tmp\Install.exe.\Install.exe /dcCcdidRiisJ "385118" /S6⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:5424 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:4988
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:1580
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:232
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:5652
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:5588
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:5300
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:3256
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGOsgSyNi" /SC once /ST 01:41:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:4872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGOsgSyNi"7⤵PID:3684
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1364
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3952
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5344
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5544
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5924
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:6060
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:5528
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5552
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:5176
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\is-BHMIM.tmp\1ChTAMoUXeFUxDdpw4XCG6Bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-BHMIM.tmp\1ChTAMoUXeFUxDdpw4XCG6Bb.tmp" /SL5="$F022A,5025136,832512,C:\Users\Admin\Pictures\1ChTAMoUXeFUxDdpw4XCG6Bb.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=53331⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\is-JPTET.tmp\_isetup\_setup64.tmphelper 105 0x4402⤵
- Executes dropped EXE
PID:4108
-
-
C:\Windows\system32\schtasks.exe"schtasks" /Query /TN "DigitalPulseUpdateTask"2⤵PID:320
-
-
C:\Windows\system32\schtasks.exe"schtasks" /Create /TN "DigitalPulseUpdateTask" /SC HOURLY /TR "C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseUpdate.exe"2⤵
- Creates scheduled task(s)
PID:5352
-
-
C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe"C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe" 5333:::clickId=:::srcId=2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5556
-
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵
- Executes dropped EXE
PID:2428
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5836
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵
- Executes dropped EXE
PID:2708
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:2188
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5f8c7c7d63fe2d74fa007ace2598ff9cb
SHA123412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA5120dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258
-
Filesize
1.0MB
MD5f8c7c7d63fe2d74fa007ace2598ff9cb
SHA123412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA5120dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258
-
Filesize
1.0MB
MD5f8c7c7d63fe2d74fa007ace2598ff9cb
SHA123412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA5120dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5e1ea111feece60aecacd3b9afb098cf9
SHA1f6ea904496ef067b1cd7cf3135ace29700c8d1b6
SHA2561b81f2185733d670e07a88b82e246fc293107dad45718bfa0934e2d206cf966a
SHA5128364787c49ae548b22179816e30854e438d413c942cedb91d83ee8466ef1248e2f595d436fc7091651077f3a244d654451d4eac219d3d648b5deee56c0c52ba2
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310131443421\opera_package
Filesize5.8MB
MD53990af0a80b4ae23993bb61eef194323
SHA165c3af1fcd6fd3157249fe77c2e4b0cf25324566
SHA25615b8104ea269c31ff21e1d4ef8431a8ca6e8bcf4fe3b9975c55c5b9065337e65
SHA51234c7c66a5bc465783574f12882c8d3a50e90eb75d94ad1822545026c746c2d110a62197fc33df1fe32ea5041738c16e02950a97bebb992d40f267362343521d9
-
Filesize
80KB
MD5eff49bcdd6658529f042adbcff4f5672
SHA1f0de65927e9159843361ece241c6191886de74fd
SHA256431637d25ae1dbd02d723aa42729e255e453a2dd7db3b2efcea256bae6f89f28
SHA5120c596a5021d915ae6e7996b627404b1c23d17da1d6436850fa25a841cf953ace07d3c32b839c313f6eb3ea210008dfd8430915b9fc5b09b9e9ff0134fab5e3aa
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
527KB
MD5b25ef28b296dd3f6188fb58d73ee607d
SHA1eb52c1f6c3c3d9e7070ea1ed774d0aef7e8f9f8f
SHA25629c26b08adfded2c33606359f0b1e91b0ce90c4b31da1d7de0ad7ca992eb1703
SHA512608b4afb2396517defa072c8503f31d5a0f4a3026fef0bf6308dade96d8906b242fa6d7dcae36e8ce6f4e50b6a3dc07ec321462def68f42a5ac1e4dd36d997d9
-
Filesize
527KB
MD5b25ef28b296dd3f6188fb58d73ee607d
SHA1eb52c1f6c3c3d9e7070ea1ed774d0aef7e8f9f8f
SHA25629c26b08adfded2c33606359f0b1e91b0ce90c4b31da1d7de0ad7ca992eb1703
SHA512608b4afb2396517defa072c8503f31d5a0f4a3026fef0bf6308dade96d8906b242fa6d7dcae36e8ce6f4e50b6a3dc07ec321462def68f42a5ac1e4dd36d997d9
-
Filesize
527KB
MD5b25ef28b296dd3f6188fb58d73ee607d
SHA1eb52c1f6c3c3d9e7070ea1ed774d0aef7e8f9f8f
SHA25629c26b08adfded2c33606359f0b1e91b0ce90c4b31da1d7de0ad7ca992eb1703
SHA512608b4afb2396517defa072c8503f31d5a0f4a3026fef0bf6308dade96d8906b242fa6d7dcae36e8ce6f4e50b6a3dc07ec321462def68f42a5ac1e4dd36d997d9
-
Filesize
424KB
MD53eb3f0304c19c5b70f00e35142032655
SHA126644413b48020600e81d5dfae718fdf0dbc5c98
SHA256e4b5d1f2bb8a5a36e4ffd0af94187398768c6c326a553fda18f61275a44edba9
SHA512bea7ef9ff419e783b89cd79ed93a9c10eb73693adf373b1c9f9cf7f8e7505df913b93b6e213b287e253931f88d20d048afdfb8590f5096bd5ff3887a41d44391
-
Filesize
424KB
MD53eb3f0304c19c5b70f00e35142032655
SHA126644413b48020600e81d5dfae718fdf0dbc5c98
SHA256e4b5d1f2bb8a5a36e4ffd0af94187398768c6c326a553fda18f61275a44edba9
SHA512bea7ef9ff419e783b89cd79ed93a9c10eb73693adf373b1c9f9cf7f8e7505df913b93b6e213b287e253931f88d20d048afdfb8590f5096bd5ff3887a41d44391
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
694KB
MD57bf46cc89fa0ea81ece9fc0eb9d38807
SHA1803040acb0d2dda44091c23416586aaeeed04e4a
SHA25631793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649
SHA512371c053ae2e4a0ab530b597c5cb9e07a35b9b391b79afa06b9c7bc3b4c172e8ffbd83aefd931c5eb39c9a4e8c991f74dfff94eb9014be5cb9af3edef7a335d41
-
Filesize
3.1MB
MD5ebec033f87337532b23d9398f649eec9
SHA1c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA25682fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA5123875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11
-
Filesize
3.1MB
MD5ebec033f87337532b23d9398f649eec9
SHA1c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA25682fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA5123875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
3.1MB
MD5043c1777165a5c13e0cf5b856674aac5
SHA14a8f6d2a940cfa8ce4cbc196462761b4397eca65
SHA2563167b1c96c355c6d39590c11cedad9d0a151d6a7c602d57895f3a5bb2b6ed487
SHA512745e8cd92be33c939f4e9066163ed2fe715e89a9414ceb87f5451600ec5198a0c6da8baab0645069fc4cb6a2f4b539fee2f23e3df189a69e7e8f9983a5d8e89e
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
1.0MB
MD583827c13d95750c766e5bd293469a7f8
SHA1d21b45e9c672d0f85b8b451ee0e824567bb23f91
SHA2568bd7e6b4a6be9f3887ac6439e97d3d3c8aaa27211d02ecbd925ab1df39afe7ae
SHA512cdbdd93fc637772b12bdedb59c4fb72a291da61e8c6b0061ad2f9448e8c949543f003646b1f5ce3e1e3aebc12de27409ddd76d3874b8f4f098163a1ff328b6f0
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
40B
MD5201c03fb5c48cd84bdda6e5f1a6f7879
SHA12a1aea58c452f322ad07c4cc7dbcb44be2df8398
SHA25622a2816d87b21e563771c3386fd966dcb0b9fb49fbf8432fb0ec749bbfeec661
SHA512d7c75a0c82b269e9223a3eba1033687cefa1dd973ea8c84780d2e610e2177fc8958b490256649125c6d5836e6c2768c3b1b298839b9c00cfb80e954f0fe2a36f
-
Filesize
40B
MD5201c03fb5c48cd84bdda6e5f1a6f7879
SHA12a1aea58c452f322ad07c4cc7dbcb44be2df8398
SHA25622a2816d87b21e563771c3386fd966dcb0b9fb49fbf8432fb0ec749bbfeec661
SHA512d7c75a0c82b269e9223a3eba1033687cefa1dd973ea8c84780d2e610e2177fc8958b490256649125c6d5836e6c2768c3b1b298839b9c00cfb80e954f0fe2a36f
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
5.6MB
MD5fe469d9ce18f3bd33de41b8fd8701c4d
SHA199411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA5125b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9
-
Filesize
5.6MB
MD5fe469d9ce18f3bd33de41b8fd8701c4d
SHA199411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA5125b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9
-
Filesize
5.6MB
MD5fe469d9ce18f3bd33de41b8fd8701c4d
SHA199411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA5125b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9
-
Filesize
4.1MB
MD55748f765c996e09c86416e2fb39a2b6b
SHA1d3af243979f14004fece32bf795b451982260c9f
SHA25692e77b32c6eb8b9609f0659e6c5fe2b4b3d99574ebcc2ef1d2aedf5471a984fb
SHA51200cbcd287b77877c3e1446b44cf275895794f87d246e21733df498517d3a9db4c4a60dc134843d2b0dc3a3cb5792bfd21eb3eaabd9311286f1a12791f1779c16
-
Filesize
4.1MB
MD55748f765c996e09c86416e2fb39a2b6b
SHA1d3af243979f14004fece32bf795b451982260c9f
SHA25692e77b32c6eb8b9609f0659e6c5fe2b4b3d99574ebcc2ef1d2aedf5471a984fb
SHA51200cbcd287b77877c3e1446b44cf275895794f87d246e21733df498517d3a9db4c4a60dc134843d2b0dc3a3cb5792bfd21eb3eaabd9311286f1a12791f1779c16
-
Filesize
4.1MB
MD55748f765c996e09c86416e2fb39a2b6b
SHA1d3af243979f14004fece32bf795b451982260c9f
SHA25692e77b32c6eb8b9609f0659e6c5fe2b4b3d99574ebcc2ef1d2aedf5471a984fb
SHA51200cbcd287b77877c3e1446b44cf275895794f87d246e21733df498517d3a9db4c4a60dc134843d2b0dc3a3cb5792bfd21eb3eaabd9311286f1a12791f1779c16
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
4.1MB
MD53d4b55ae69752c913bcc4719b88a5e9d
SHA1bf76431d792eda57d1322a5da8111b9ed147a0a9
SHA2562a4384f7cadd3ac88c6d4447c16d744734e4150337cba404eec74edb0c826502
SHA5128b9a969bc40bcba40d90701b75a7f57ed196031a9cb2c059d20f3be5f6721d292585997a6c999ec9b9375d346f361a00c8de539ef6cdd47a96faf2c69cc4ee7b
-
Filesize
4.1MB
MD53d4b55ae69752c913bcc4719b88a5e9d
SHA1bf76431d792eda57d1322a5da8111b9ed147a0a9
SHA2562a4384f7cadd3ac88c6d4447c16d744734e4150337cba404eec74edb0c826502
SHA5128b9a969bc40bcba40d90701b75a7f57ed196031a9cb2c059d20f3be5f6721d292585997a6c999ec9b9375d346f361a00c8de539ef6cdd47a96faf2c69cc4ee7b
-
Filesize
4.1MB
MD53d4b55ae69752c913bcc4719b88a5e9d
SHA1bf76431d792eda57d1322a5da8111b9ed147a0a9
SHA2562a4384f7cadd3ac88c6d4447c16d744734e4150337cba404eec74edb0c826502
SHA5128b9a969bc40bcba40d90701b75a7f57ed196031a9cb2c059d20f3be5f6721d292585997a6c999ec9b9375d346f361a00c8de539ef6cdd47a96faf2c69cc4ee7b
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
2.8MB
MD5b129bb998c125b1b189d9537c43e49ef
SHA1152b5803f7f58875e5b97e0b9d1e75823ecd3079
SHA256da669632e69dc599a19550fff95f5c4997a83e0fd26b221c1700a35a391308f2
SHA5121818b51da07e9b4a06e331e49a9cb9f04fde2d87456379cc47d0d631cc862ccfdfc949e8b51eb270680c6d8a4ec84c1de44a1fa57b2cd984d8711cc851d181b1
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
745KB
MD54fa9fda2063ccb724a5a9f14acc9df2c
SHA1293c717291ac825ea7497f6435803c4cb05c2c0f
SHA2564ab05d3ff11b80c622d6b75ae5710f7ec3011ecadfcb7ebe10642a4dade0b54e
SHA5125cab041a05dee245134697be52bbfa5aa07282d24f1c80b947af4b9f705a7631b620532d837cd04c7dd982634a914aada96a200d0589cd17ac0ba142ed9345ce
-
Filesize
745KB
MD54fa9fda2063ccb724a5a9f14acc9df2c
SHA1293c717291ac825ea7497f6435803c4cb05c2c0f
SHA2564ab05d3ff11b80c622d6b75ae5710f7ec3011ecadfcb7ebe10642a4dade0b54e
SHA5125cab041a05dee245134697be52bbfa5aa07282d24f1c80b947af4b9f705a7631b620532d837cd04c7dd982634a914aada96a200d0589cd17ac0ba142ed9345ce
-
Filesize
745KB
MD54fa9fda2063ccb724a5a9f14acc9df2c
SHA1293c717291ac825ea7497f6435803c4cb05c2c0f
SHA2564ab05d3ff11b80c622d6b75ae5710f7ec3011ecadfcb7ebe10642a4dade0b54e
SHA5125cab041a05dee245134697be52bbfa5aa07282d24f1c80b947af4b9f705a7631b620532d837cd04c7dd982634a914aada96a200d0589cd17ac0ba142ed9345ce
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
316KB
MD58aa5f0e927ffd98dd426aade722184ec
SHA1cb2d927e48cbe739dbe4c0f103a31dfd854002d9
SHA256c0c0bf8e1b66ef64300f2a04b5fbcad1e68a6be7a7711b2276f661cbb8dcd31f
SHA512da99e9db038720e963894ec82def0c951058c0cfa872c261903078e6e15e2f0b22e69b30af45fa654697aaaa079f5556553c60d8226c21be194bef33f6a0de3f
-
Filesize
316KB
MD58aa5f0e927ffd98dd426aade722184ec
SHA1cb2d927e48cbe739dbe4c0f103a31dfd854002d9
SHA256c0c0bf8e1b66ef64300f2a04b5fbcad1e68a6be7a7711b2276f661cbb8dcd31f
SHA512da99e9db038720e963894ec82def0c951058c0cfa872c261903078e6e15e2f0b22e69b30af45fa654697aaaa079f5556553c60d8226c21be194bef33f6a0de3f
-
Filesize
316KB
MD58aa5f0e927ffd98dd426aade722184ec
SHA1cb2d927e48cbe739dbe4c0f103a31dfd854002d9
SHA256c0c0bf8e1b66ef64300f2a04b5fbcad1e68a6be7a7711b2276f661cbb8dcd31f
SHA512da99e9db038720e963894ec82def0c951058c0cfa872c261903078e6e15e2f0b22e69b30af45fa654697aaaa079f5556553c60d8226c21be194bef33f6a0de3f
-
Filesize
7B
MD524fe48030f7d3097d5882535b04c3fa8
SHA1a689a999a5e62055bda8c21b1dbe92c119308def
SHA256424a2551d356754c882d04ac16c63e6b50b80b159549d23231001f629455756e
SHA51245a842447d5e9c10822f7d5db1192a0e8e7917e6546dab6aebe2542b5a82bedc26aa8d96e3e99de82e2d0b662fcac70d6914248371af034b763f5dd85dab0c51
-
Filesize
1.7MB
MD53079d3c0d24006dda2dcf360c5670334
SHA190cb2293ebc3e68c1de95b8cb546c1e13e0e122e
SHA2563d59d1f3e33d530ddf6e9093664a171d0ceb0bab6fad277b0a814caa125ff5f8
SHA512b43273da79708d234f4361fb3e8c3f6807534575fa3f33f8069776dc9fd4f2baab6644032b698f4ad5074c7ee549fa86f984729192f2aabbbb0a323ac0b0a74c
-
Filesize
1.7MB
MD53079d3c0d24006dda2dcf360c5670334
SHA190cb2293ebc3e68c1de95b8cb546c1e13e0e122e
SHA2563d59d1f3e33d530ddf6e9093664a171d0ceb0bab6fad277b0a814caa125ff5f8
SHA512b43273da79708d234f4361fb3e8c3f6807534575fa3f33f8069776dc9fd4f2baab6644032b698f4ad5074c7ee549fa86f984729192f2aabbbb0a323ac0b0a74c
-
Filesize
1.7MB
MD53079d3c0d24006dda2dcf360c5670334
SHA190cb2293ebc3e68c1de95b8cb546c1e13e0e122e
SHA2563d59d1f3e33d530ddf6e9093664a171d0ceb0bab6fad277b0a814caa125ff5f8
SHA512b43273da79708d234f4361fb3e8c3f6807534575fa3f33f8069776dc9fd4f2baab6644032b698f4ad5074c7ee549fa86f984729192f2aabbbb0a323ac0b0a74c