Analysis
-
max time kernel
205s -
max time network
211s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/05/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
Install-GooglePlayGames-Beta.exe
Resource
win11-20240426-en
Errors
General
-
Target
Install-GooglePlayGames-Beta.exe
-
Size
10.5MB
-
MD5
bc8e5496ba1375b89ec71fc753f94a6e
-
SHA1
2f25da3a7ad038e71eeea2e8fdd945c8516769a5
-
SHA256
e0806a3d7bcce176d9cd2a5f8c6cfec4f141fed2007fefa37fc7da2e3a37d8eb
-
SHA512
fc5b139d3907e6fa65b70f32aa58645f11de729ed7df0e5db46c35bf513d747266f537211d467334b755c44e94295604b39e5b6d47d916c5cf0d19b73d5546ce
-
SSDEEP
196608:dCJBYlzkSIEc+waFvtCK4BbCSC3qzF1/goaSZzpBM:cUzkSU+FvV47Ccz/goa03
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini unregmp2.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Version = "12,0,22000,282" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\IsInstalled = "0" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Stubpath = "%SystemRoot%\\system32\\unregmp2.exe /ShowWMP" unregmp2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95} unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\DontAsk = "2" unregmp2.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 5736 netsh.exe 5644 netsh.exe 5492 netsh.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HPE-24.4.932.3-CIP.exe.log HPE-24.4.932.3-CIP.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallHypervisor.exe.log InstallHypervisor.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Applicator.exe.log Applicator.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Play Games\current\client\locales\pt-PT.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\da.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\hu.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\emulator\vccorlib140.dll 7zr.exe File created C:\Program Files\Google\Play Games\current\service\hardware_compatibility.dll 7zr.exe File created C:\Program Files\Google\Play Games\current\service\AndroidSparse.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\libsecurity.dll 7zr.exe File created C:\Program Files\Google\Play Games\current\emulator\gpu_check.exe 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\EmulatorAPI.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_zh-TW.dll GoogleUpdate.exe File created C:\Program Files\Google\Play Games\current\client\locales\ms.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\licenses\LICENSES_emulator.txt 7zr.exe File created C:\Program Files\Google\Play Games\current\service\WpfUtils.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\pss.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_id.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\it.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\emulator\libsecure_env.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdate.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_lv.dll GoogleUpdate.exe File created C:\Program Files\Google\Play Games\current\client\locales\da.pak 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\psuser_64.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\licenses\LICENSES_androidapps.txt 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\emulator\libGLESv2.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\emulator\r8Brain.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\ReleaseInfo.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_bg.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_mr.dll GoogleUpdate.exe File created C:\Program Files\Google\Play Games\current\emulator\msvcp140_1.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateCore.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_te.dll GoogleUpdate.exe File created C:\Program Files\Google\Play Games\current\client\locales\ml.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\hr.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\client\locales\fil.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\client\config\roots.pem 7zr.exe File created C:\Program Files\Google\Play Games\current\client\locales\fa.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\SQLite.Interop.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_cs.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\service\oem_db.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\StaticFlagsAPI.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\licenses\LICENSES_nuget.txt 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\Microsoft.Toolkit.Uwp.Notifications.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_it.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\am.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\client\chrome_elf.dll 7zr.exe File created C:\Program Files\Google\Play Games\current\service\gfxstream_backend.dll 7zr.exe File created C:\Program Files\Google\Play Games\current\service\Metrics.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\chrome_100_percent.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\uk.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\emulator\libEGL.dll 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\vi.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\client\locales\pl.pak 7zr.exe File created C:\Program Files\Google\Play Games\current\client\locales\lt.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\phenotype_delegate_lib.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_de.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\mr.pak 7zr.exe File opened for modification C:\Program Files\Google\Play Games\current\service\naudio.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_iw.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_uk.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_es.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_sv.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\licenses\LICENSES_native.txt 7zr.exe File created C:\Program Files\Google\Play Games\current\service\phenotype_delegate_lib.dll 7zr.exe File created C:\Program Files (x86)\Google\Update\1.3.36.351\goopdateres_nl.dll GoogleUpdate.exe File opened for modification C:\Program Files\Google\Play Games\current\client\locales\ru.pak 7zr.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\GUT73EA.tmp GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleCrashHandler.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_es.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_fil.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_id.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_no.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdateBroker.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdateComRegisterShell64.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_da.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_fa.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_mr.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ta.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ja.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ms.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_uk.dll GoogleUpdateSetup.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_sw.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_th.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\psmachine.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdateCore.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_es-419.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_pl.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_zh-CN.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_am.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_fr.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_pt-BR.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_pt-PT.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ro.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_cs.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_en.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ru.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_sl.dll GoogleUpdateSetup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\psmachine_64.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\psuser.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleCrashHandler64.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_gu.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_zh-TW.dll GoogleUpdateSetup.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_bn.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_de.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_el.dll GoogleUpdateSetup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_sv.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdateOnDemand.exe GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_ca.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_en-GB.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_hi.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_it.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_sr.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdate.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_hr.dll GoogleUpdateSetup.exe File opened for modification C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdateSetup.exe GoogleUpdateSetup.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\psuser_64.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_te.dll GoogleUpdateSetup.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_et.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_vi.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_lt.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_nl.dll GoogleUpdateSetup.exe File created C:\Windows\SystemTemp\GUM73E9.tmp\goopdateres_sk.dll GoogleUpdateSetup.exe -
Executes dropped EXE 24 IoCs
pid Process 4808 crashpad_handler.exe 1388 crashpad_handler.exe 988 GoogleUpdateSetup.exe 3920 GoogleUpdate.exe 3808 GoogleUpdate.exe 1904 GoogleUpdate.exe 4652 GoogleUpdateComRegisterShell64.exe 5068 GoogleUpdateComRegisterShell64.exe 4112 GoogleUpdateComRegisterShell64.exe 3756 GoogleUpdate.exe 1960 GoogleUpdateBroker.exe 3068 GoogleUpdate.exe 1100 GoogleUpdate.exe 4420 GoogleUpdate.exe 1544 HPE-24.4.932.3-CIP.exe 1232 7zr.exe 5720 Applicator.exe 2068 InstallHypervisor.exe 3592 GoogleCrashHandler.exe 1272 GoogleCrashHandler64.exe 5952 GoogleUpdate.exe 6012 Bootstrapper.exe 6068 Service.exe 3008 crashpad_handler.exe -
Loads dropped DLL 64 IoCs
pid Process 3036 Install-GooglePlayGames-Beta.exe 3036 Install-GooglePlayGames-Beta.exe 4424 Install-GooglePlayGames-Beta.exe 3920 GoogleUpdate.exe 3808 GoogleUpdate.exe 1904 GoogleUpdate.exe 4652 GoogleUpdateComRegisterShell64.exe 1904 GoogleUpdate.exe 5068 GoogleUpdateComRegisterShell64.exe 1904 GoogleUpdate.exe 4112 GoogleUpdateComRegisterShell64.exe 1904 GoogleUpdate.exe 3756 GoogleUpdate.exe 3068 GoogleUpdate.exe 1100 GoogleUpdate.exe 4420 GoogleUpdate.exe 4420 GoogleUpdate.exe 1100 GoogleUpdate.exe 3068 GoogleUpdate.exe 4424 Install-GooglePlayGames-Beta.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 2068 InstallHypervisor.exe 5952 GoogleUpdate.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6365D39F-2E73-4837-BC59-2014AAA20FA7}\InProcServer32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Applicator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Applicator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Applicator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Applicator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Applicator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Applicator.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "118" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreClass.1\ = "Google Update Core Class" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ADDF22CF-3E9B-4CD7-9139-8169EA6636E4}\ = "Google Update Policy Status Class" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ = "IAppVersionWeb" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Play unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\ = "IApp" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\NumMethods\ = "23" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{27634814-8E41-4C35-8577-980134A96544}\NumMethods\ = "12" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}\PROGID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\ = "IPackage" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\audio\shell\Enqueue\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Image\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016}\PROGID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\ = "IGoogleUpdate3WebSecurity" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ = "IPolicyStatus" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\VersionIndependentProgID\ = "GoogleUpdate.CoCreateAsync" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B3D28DBD-0DFA-40E4-8071-520767BADC7E}\LocalServer32\ = "\"C:\\Program Files (x86)\\Google\\Update\\1.3.36.351\\GoogleUpdateOnDemand.exe\"" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Audio\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA}\NumMethods\ = "8" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CredentialDialogMachine.1.0\CLSID\ = "{25461599-633D-42B1-84FB-7CD68D026E53}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\ = "&Add to Windows Media Player list" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\VersionIndependentProgID\ = "GoogleUpdate.PolicyStatusMachine" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA}\ = "IRegistrationUpdateHook" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\PROGID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\LocalServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3COMClassService\CLSID\ = "{4EB61BAC-A3B6-4760-9581-655041EF4D69}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ = "IJobObserver2" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\ = "IPolicyStatusValue" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ = "ICoCreateAsync" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.PolicyStatusSvc\ = "Google Update Policy Status Class" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{37FB52DA-F779-408D-B505-3F83CFBBFC20}\InprocHandler32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E} GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{598FE0E5-E02D-465D-9A9D-37974A28FD42}\Elevation GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods\ = "11" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\NumMethods\ = "24" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\PROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\ = "IGoogleUpdateCore" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ProxyStubClsid32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 3920 GoogleUpdate.exe 4424 Install-GooglePlayGames-Beta.exe 4424 Install-GooglePlayGames-Beta.exe 5952 GoogleUpdate.exe 5952 GoogleUpdate.exe 3036 Install-GooglePlayGames-Beta.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe 6068 Service.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3920 GoogleUpdate.exe Token: SeDebugPrivilege 3920 GoogleUpdate.exe Token: SeDebugPrivilege 3920 GoogleUpdate.exe Token: SeDebugPrivilege 3920 GoogleUpdate.exe Token: SeShutdownPrivilege 4816 unregmp2.exe Token: SeCreatePagefilePrivilege 4816 unregmp2.exe Token: SeShutdownPrivilege 4664 wmplayer.exe Token: SeCreatePagefilePrivilege 4664 wmplayer.exe Token: SeRestorePrivilege 1232 7zr.exe Token: 35 1232 7zr.exe Token: SeSecurityPrivilege 1232 7zr.exe Token: SeSecurityPrivilege 1232 7zr.exe Token: SeDebugPrivilege 3952 firefox.exe Token: SeDebugPrivilege 3952 firefox.exe Token: SeDebugPrivilege 5720 Applicator.exe Token: 33 1272 GoogleCrashHandler64.exe Token: SeIncBasePriorityPrivilege 1272 GoogleCrashHandler64.exe Token: 33 3592 GoogleCrashHandler.exe Token: SeIncBasePriorityPrivilege 3592 GoogleCrashHandler.exe Token: SeDebugPrivilege 4424 Install-GooglePlayGames-Beta.exe Token: SeDebugPrivilege 5952 GoogleUpdate.exe Token: SeDebugPrivilege 3036 Install-GooglePlayGames-Beta.exe Token: SeDebugPrivilege 6068 Service.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4664 wmplayer.exe 3952 firefox.exe 3952 firefox.exe 3952 firefox.exe 3952 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3952 firefox.exe 3952 firefox.exe 3952 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3952 firefox.exe 4464 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 4808 3036 Install-GooglePlayGames-Beta.exe 78 PID 3036 wrote to memory of 4808 3036 Install-GooglePlayGames-Beta.exe 78 PID 3036 wrote to memory of 4424 3036 Install-GooglePlayGames-Beta.exe 79 PID 3036 wrote to memory of 4424 3036 Install-GooglePlayGames-Beta.exe 79 PID 4424 wrote to memory of 1388 4424 Install-GooglePlayGames-Beta.exe 80 PID 4424 wrote to memory of 1388 4424 Install-GooglePlayGames-Beta.exe 80 PID 4424 wrote to memory of 988 4424 Install-GooglePlayGames-Beta.exe 81 PID 4424 wrote to memory of 988 4424 Install-GooglePlayGames-Beta.exe 81 PID 4424 wrote to memory of 988 4424 Install-GooglePlayGames-Beta.exe 81 PID 988 wrote to memory of 3920 988 GoogleUpdateSetup.exe 82 PID 988 wrote to memory of 3920 988 GoogleUpdateSetup.exe 82 PID 988 wrote to memory of 3920 988 GoogleUpdateSetup.exe 82 PID 3920 wrote to memory of 3808 3920 GoogleUpdate.exe 83 PID 3920 wrote to memory of 3808 3920 GoogleUpdate.exe 83 PID 3920 wrote to memory of 3808 3920 GoogleUpdate.exe 83 PID 3920 wrote to memory of 1904 3920 GoogleUpdate.exe 84 PID 3920 wrote to memory of 1904 3920 GoogleUpdate.exe 84 PID 3920 wrote to memory of 1904 3920 GoogleUpdate.exe 84 PID 1904 wrote to memory of 4652 1904 GoogleUpdate.exe 85 PID 1904 wrote to memory of 4652 1904 GoogleUpdate.exe 85 PID 1904 wrote to memory of 5068 1904 GoogleUpdate.exe 86 PID 1904 wrote to memory of 5068 1904 GoogleUpdate.exe 86 PID 1904 wrote to memory of 4112 1904 GoogleUpdate.exe 87 PID 1904 wrote to memory of 4112 1904 GoogleUpdate.exe 87 PID 3920 wrote to memory of 3756 3920 GoogleUpdate.exe 88 PID 3920 wrote to memory of 3756 3920 GoogleUpdate.exe 88 PID 3920 wrote to memory of 3756 3920 GoogleUpdate.exe 88 PID 1960 wrote to memory of 3068 1960 GoogleUpdateBroker.exe 90 PID 1960 wrote to memory of 3068 1960 GoogleUpdateBroker.exe 90 PID 1960 wrote to memory of 3068 1960 GoogleUpdateBroker.exe 90 PID 2388 wrote to memory of 424 2388 wmplayer.exe 105 PID 2388 wrote to memory of 424 2388 wmplayer.exe 105 PID 2388 wrote to memory of 424 2388 wmplayer.exe 105 PID 2388 wrote to memory of 4536 2388 wmplayer.exe 106 PID 2388 wrote to memory of 4536 2388 wmplayer.exe 106 PID 2388 wrote to memory of 4536 2388 wmplayer.exe 106 PID 4536 wrote to memory of 4816 4536 unregmp2.exe 107 PID 4536 wrote to memory of 4816 4536 unregmp2.exe 107 PID 424 wrote to memory of 1564 424 setup_wm.exe 108 PID 424 wrote to memory of 1564 424 setup_wm.exe 108 PID 424 wrote to memory of 1564 424 setup_wm.exe 108 PID 1564 wrote to memory of 4056 1564 unregmp2.exe 109 PID 1564 wrote to memory of 4056 1564 unregmp2.exe 109 PID 424 wrote to memory of 4664 424 setup_wm.exe 110 PID 424 wrote to memory of 4664 424 setup_wm.exe 110 PID 424 wrote to memory of 4664 424 setup_wm.exe 110 PID 4420 wrote to memory of 1544 4420 GoogleUpdate.exe 113 PID 4420 wrote to memory of 1544 4420 GoogleUpdate.exe 113 PID 1544 wrote to memory of 2712 1544 HPE-24.4.932.3-CIP.exe 115 PID 1544 wrote to memory of 2712 1544 HPE-24.4.932.3-CIP.exe 115 PID 1544 wrote to memory of 4304 1544 HPE-24.4.932.3-CIP.exe 117 PID 1544 wrote to memory of 4304 1544 HPE-24.4.932.3-CIP.exe 117 PID 1544 wrote to memory of 1232 1544 HPE-24.4.932.3-CIP.exe 119 PID 1544 wrote to memory of 1232 1544 HPE-24.4.932.3-CIP.exe 119 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 PID 2672 wrote to memory of 3952 2672 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe"C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\crashpad_handler.exeC:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Local\Google\Play Games\CrashReporting\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Battlestar --annotation=ver=24.1.1687.0 --initial-client-data=0x698,0x69c,0x6a0,0x694,0x6a4,0x7ffa318652c8,0x7ffa318652d8,0x7ffa318652e82⤵
- Executes dropped EXE
PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe"C:\Users\Admin\AppData\Local\Temp\Install-GooglePlayGames-Beta.exe" -install gpg_install_97fa0229-8c05-4074-9b74-bf3b40dc2656 "C:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\crashpad_handler.exeC:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Local\Google\Play Games\CrashReporting\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Battlestar --annotation=ver=24.1.1687.0 --initial-client-data=0x3c4,0x3c8,0x3cc,0x39c,0x3d0,0x7ffa318652c8,0x7ffa318652d8,0x7ffa318652e83⤵
- Executes dropped EXE
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\GoogleUpdateSetup.exe"C:\Users\Admin\AppData\Local\Temp\15xpiryf.fxj\GoogleUpdateSetup.exe" /install "runtime=true&needsadmin=true" /silent3⤵
- Drops file in Windows directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdate.exeC:\Windows\SystemTemp\GUM73E9.tmp\GoogleUpdate.exe /install "runtime=true&needsadmin=true" /silent4⤵
- Sets file execution options in registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3808
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4652
-
-
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5068
-
-
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4112
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4zNTEiIHNoZWxsX3ZlcnNpb249IjEuMy4zNi4zNTEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OUM4NDBFQzMtQjZFOS00MTdCLThGQzktOUE0MDdFN0Y1MjY0fSIgdXNlcmlkPSJ7RjlEREEwRDYtQjFEMC00OTYzLUIzNjQtRjlBQkU2MzU5RDM2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyMUE2RDk0MS00MzRCLTQ5QzMtOTNENi0yRkMyMjczMkMzQzh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiLz48YXBwIGFwcGlkPSJ7NDMwRkQ0RDAtQjcyOS00RjYxLUFBMzQtOTE1MjY0ODE3OTlEfSIgdmVyc2lvbj0iMS4zLjM2LjE1MSIgbmV4dHZlcnNpb249IjEuMy4zNi4zNTEiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iMTEyNiIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3756
-
-
-
-
-
C:\Program Files\Google\Play Games\Bootstrapper.exe"C:\Program Files\Google\Play Games\Bootstrapper.exe"2⤵
- Executes dropped EXE
PID:6012 -
C:\Program Files\Google\Play Games\current\service\Service.exe"C:\Program Files\Google\Play Games\current\service\Service.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Program Files\Google\Play Games\current\emulator\crashpad_handler.exe"C:\Program Files\Google\Play Games\current\emulator\crashpad_handler.exe" --no-rate-limit "--database=C:\Users\Admin\AppData\Local\Google\Play Games\CrashReporting\Crashpad" --url=https://clients2.google.com/cr/report --annotation=bss_session=501d7c84-d5dd-4ada-a1d8-cd00112605f0 --annotation=channel=Beta "--annotation=cpu=Intel Core Processor (Broadwell)" --annotation=gpu_hw_scheduler=False --annotation=prod=Battlestar "--annotation=system=BOCHS_ BXPC____" --annotation=ver=24.4.932.3 --annotation=whpx=False "--attachment=C:\Users\Admin\AppData\Local\Google\Play Games\Logs\emulator_logs\vk_abort_mem_info.log" --initial-client-data=0xbf8,0xbfc,0xc04,0xbd4,0xc08,0x7ffa2ff982c0,0x7ffa2ff982d0,0x7ffa2ff982e04⤵
- Executes dropped EXE
PID:3008
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateBroker.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleUpdateBroker.exe" -Embedding1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /broker2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /medsvc1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Google\Update\Install\{A5FFC916-9D3E-4339-937D-C567CF86859B}\HPE-24.4.932.3-CIP.exe"C:\Program Files (x86)\Google\Update\Install\{A5FFC916-9D3E-4339-937D-C567CF86859B}\HPE-24.4.932.3-CIP.exe" /o{47B07D71-505D-4665-AFD4-4972A30C6530} /l1518 /noui2⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C dir /s /-c "C:\Windows\TEMP\Google\Play Games\0xera2ne.5h4"3⤵PID:2712
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C dir /s /-c "C:\Program Files\Google"3⤵PID:4304
-
-
C:\Windows\TEMP\Google\Play Games\0xera2ne.5h4\7zr.exe"C:\Windows\TEMP\Google\Play Games\0xera2ne.5h4\7zr.exe" x "-oC:\Program Files\Google\Play Games\current" -y -bso0 -bsp1 "C:\Windows\TEMP\Google\Play Games\0xera2ne.5h4\archive.7z"3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule "Google Play Games Service"3⤵
- Modifies Windows Firewall
PID:5736
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule dir=in action=allow enable=yes profile=domain,private,public protocol=tcp "description=Google Play Games Service" "name=Google Play Games Service" "program=C:\Program Files\Google\Play Games\current\emulator\crosvm.exe"3⤵
- Modifies Windows Firewall
PID:5644
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule dir=in action=allow enable=yes profile=domain,private,public protocol=udp "description=Google Play Games Service" "name=Google Play Games Service" "program=C:\Program Files\Google\Play Games\current\emulator\crosvm.exe"3⤵
- Modifies Windows Firewall
PID:5492
-
-
C:\Program Files\Google\Play Games\current\Applicator.exe"C:\Program Files\Google\Play Games\current\Applicator.exe" "anv" "24.4.932.3" "Admin" "C:\Users\Admin\AppData\Local"3⤵
- Drops file in System32 directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Program Files\Google\Play Games\current\service\InstallHypervisor.exe"C:\Program Files\Google\Play Games\current\service\InstallHypervisor.exe" --ghaxm --update-or-install --driver-dir "C:\Program Files\Google\Play Games\current\service" --install-dir "C:\Program Files\Google\Play Games\current" --version "24.4.932.3" --log-source "1518"4⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
PID:2068
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleCrashHandler.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleCrashHandler64.exe"C:\Program Files (x86)\Google\Update\1.3.36.351\GoogleCrashHandler64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4zNTEiIHNoZWxsX3ZlcnNpb249IjEuMy4zNi4zNTEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUJCOEQ1ODUtOTI4Mi00NkRBLUIxRjgtMzFEOTg0ODA4NzkzfSIgdXNlcmlkPSJ7RjlEREEwRDYtQjFEMC00OTYzLUIzNjQtRjlBQkU2MzU5RDM2fSIgaW5zdGFsbHNvdXJjZT0idXBkYXRlM3dlYi1uZXdhcHBzIiByZXF1ZXN0aWQ9IntDNzIxNDdCOC00RDQyLTQ2OTEtODhFMC1CMzY2MjhBNDhFNzJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiLz48YXBwIGFwcGlkPSJ7NDdCMDdENzEtNTA1RC00NjY1LUFGRDQtNDk3MkEzMEM2NTMwfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMjQuNC45MzIuMyIgYXA9ImJldGEsYjJpMmUsQ2o0SUFoSVpiM0puWVc1cFl5MXRhV055YjNOcGRHVXRkMmx1Wkc5M2N4b2FhSFIwY0hNNkx5OXpkWEJ3YjNKMExtZHZiMmRzWlM1amIyMG9rYkhUQ1JnQiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSIgY29ob3J0PSIxOjExNmw6MmU0eEAwLjAxLDJlNTNAMC4wMTAxIiBjb2hvcnRuYW1lPSJQdWJsaWNfQmV0YSI-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-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI3NzQiIGRvd25sb2FkX3RpbWVfbXM9Ijk2MTIxIiBkb3dubG9hZGVkPSI4MTU0ODc0NTYiIHRvdGFsPSI4MTU0ODc0NTYiIGluc3RhbGxfdGltZV9tcz0iMzQ3MjgiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3808
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2304
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4580
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\unregmp2.exeC:\Windows\system32\unregmp2.exe /ShowWMP /SetShowState /CreateMediaLibrary3⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /ShowWMP /SetShowState /CreateMediaLibrary /REENTRANT4⤵
- Drops desktop.ini file(s)
- Modifies Installed Components in the registry
- Modifies registry class
PID:4056
-
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\PopSwitch.midi3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4664
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:1584
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3952 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.0.1126029679\2087721429" -parentBuildID 20230214051806 -prefsHandle 1716 -prefMapHandle 1708 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5a33341-e942-42d2-b509-b74b9b3e5bd0} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 1812 13564509758 gpu3⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.1.1024338493\195493193" -parentBuildID 20230214051806 -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 22110 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf0f3568-31d7-4389-997f-c351e78b36b6} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 2372 13557787e58 socket3⤵
- Checks processor information in registry
PID:4248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.2.1436725956\260081407" -childID 1 -isForBrowser -prefsHandle 3016 -prefMapHandle 3012 -prefsLen 22148 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a072811-2e24-4ba2-94d0-2e3c82c865b4} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 3024 13566df3458 tab3⤵PID:800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.3.230763007\1266835564" -childID 2 -isForBrowser -prefsHandle 3568 -prefMapHandle 3564 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7c0a50a-a12f-424d-b3ac-c180c2305d4b} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 3580 13557776958 tab3⤵PID:784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.4.898864383\830021272" -childID 3 -isForBrowser -prefsHandle 5108 -prefMapHandle 5104 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21972acf-b064-4c9b-af50-815c482988df} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 5116 1356c2ee158 tab3⤵PID:5292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.5.2126136848\1226788527" -childID 4 -isForBrowser -prefsHandle 5220 -prefMapHandle 5224 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b092d6d-324b-4a9c-8eb0-889d401fcc89} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 5208 1356c2fd658 tab3⤵PID:5300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3952.6.1831395825\948110564" -childID 5 -isForBrowser -prefsHandle 5404 -prefMapHandle 5408 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {714d2f38-28e4-4f50-9e8c-2cbb1d4e3987} 3952 "\\.\pipe\gecko-crash-server-pipe.3952" 5048 1356c2fca58 tab3⤵PID:5308
-
-
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5280
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:4720
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39db055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD55b802cdb25029a5049761d395abbc5b2
SHA1c509ae222c2f84cec9338e74c515386f841140f3
SHA256c6f13494190682572b2b6e0d8cfdfe3baa7645c4190e256e11b31c264843e969
SHA512a354280f88b9c12cb8298b405b3e9e1460b6301a6add3d2acb97f41fef31579ed7062b0399bdb793b438c2e5ba2072b922cc76040c671150532ecd9d28daa2e4
-
Filesize
40B
MD5b8aac287533cc2f5ee79ea7f64895d71
SHA1944bea3a777a8959fe423d6d1624a628e3d7b4c5
SHA2560e6d28882802cd15ce28f4de7ae49e8633a1f9cab2930c656d7dc7e76b1331e6
SHA5126c8c5c137f7403de5f60937fa1152125c07839920f706bba5325c54d7c1dc409497942ed0e221fadce802d110b04313b69a032dca666b8812416cab0a8adbc40
-
Filesize
946B
MD563ec84066bfce9edd45f035b75e01b7e
SHA1a8fbc6257fdb27abc33d48d286f06e115507e7ec
SHA256790697b56b24557bb0805835f16fa13b317cf3d1d742e109d85b9ab7a2051467
SHA5121ae226c873ca9331ac35f4bcf5a44b97ac2c195fc3613d82b3d5178e2255ff842743716480054caec50e0634b6bf482cffccfc07eddf8cc0a1ba26f86140ef16
-
Filesize
640KB
MD5a49738017437934fbe92997c4272af56
SHA1cf8227be08b2fb598585251756fad49829443e8a
SHA2568f0bad9b0a008185f06e8d55e16564fe3b894563eb725cc5ff4df9f7c3a1a71b
SHA512b0acbfc8faface74e67422f18b3cd200d51560cd2b1baf052a3ee1845202bedbb42e0621a9376e176ab8a4a2dad3d43a2d9fb0c71bf525f3d9570a41f03f3c6b
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6t7awfwd.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD54dfbecf26f43a7d273f573587b538c0b
SHA1cac5c9cdb9eafa5b4100cf7418767634b7a75a11
SHA2569cb241d994947f931587d585e045d3edcbc80b7f83214282cc11e71f25a81d3d
SHA512b900c80764c6fd2567e4b47d89985a345bb6c94e1b7e09da135ce2da9fc2c2d3b070dbbd2d65071cd83744af8a93f11929b53f2119930601c2c08f0f858460d6
-
Filesize
961KB
MD57b3f74266ca7cc7329eac63f8368db65
SHA1db49159afcdf3676d6a6bc791f8f7c26ceeeb145
SHA2569335fe5ed02defb1395ab3e02926edbf90205c40d2e8bfb6247df102307ba557
SHA512930c4f1eeba8b1daf62ea3a29458dbcdd58c30c924d4e5ed5dc16073fafa7a8e2887c2e9627f970d197f848637f58b8cca6bd298a066e78c5d8eab7e0995bbb1
-
Filesize
1.3MB
MD56350a2dda4b9651cd3820cead9c1d0ad
SHA181ee28f9992861f1fca795c6c15ece91c353b58e
SHA25669110434f3990b28394ab382c7ec3eb23ce9aabbe441053909bc2f4b16e8d614
SHA5125094919c83ced46023eaa5c6dd1b2453dba5d257f41d37bbb58be7c1cb1544140cbe094508df73b11015139ed58c56157717815ebdbae96ef3bcb59ae157566f
-
Filesize
1.1MB
MD5168e890d04cfee8b8420c90d1d229364
SHA1442f93cb1272b93cc3073f8eeb0732a3c60bc5c9
SHA256f37ed95b97a9c6d6d48c2675defaa53e68b487d271e78294d1af3a431ac25b91
SHA51229d4d3d3a880c70c8c44ea1496f09f4ca1bcbe071dd81e8c700a53d070d8240d0d819a9fe356f175554075a089f6945d7f6390fb1dcf4a152c064a71df3fa48a
-
Filesize
4.5MB
MD528f06bc35021d85a98539a035b2c9a71
SHA18d36ecb2b9e5270c1c5ac81bcd9bf858e9f61a8c
SHA256231014af8dbc27ac20b222a00a2c3dfda4e0aa111fb710d7315b5b19e47a2f57
SHA512cfec5eadc5cca9bc48006a80bca181ecf7949a2b9582ff5ca3ea577ec5892a10a8d4897fbc3e6eeb5b4a1b2de3d42d703cd2dae4c982668f93968e2de2e8599e
-
Filesize
6KB
MD5bb14c04814335157a1be5dfa2174cb41
SHA1dafccaff2cfa3df41cc92cc62f0a6abe60f933af
SHA256af45a094ddd64fc8889c8328c546c48baa4da344757819f171e7ad8683739450
SHA51297008af69e613192f8028fa6317fc3cd1cb989d82ad969de9fcc653970582a3b23f98af98e0afa970b9c053af212959d4ad3e4d63ba6a1cad34217b1964ff220
-
Filesize
6KB
MD5cc5feda397d37508e39ea5d8e022df80
SHA162d6cc43ef3ad0f03f2a1ab33e48eeaf1f1216d9
SHA256858ff5d5fa779ac98637e204c832b838d5c9d44e7dd59bafb0e5d2f12b9cc8ee
SHA51272eead885894092d14cfee5f0a0b92294e0629d79a097884edb620f387098ff5fc6db04ab79ece3b90417a8254bb319bb2e0fd0d8a34298e88b56289c86c96f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6t7awfwd.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5e6c20f53d6714067f2b49d0e9ba8030e
SHA1f516dc1084cdd8302b3e7f7167b905e603b6f04f
SHA25650a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092
SHA512462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6t7awfwd.default-release\sessionstore.jsonlz4
Filesize906B
MD5a9809400ceba7fecf04405adef5a3fa4
SHA1e21a6a112812fe50d53d847207566465f5ea6414
SHA2567fe46318c532097f857f10d6136b45261a1ba31b51a6db0c0b35ebcd426a7d56
SHA512d0a8b3b5c7498f178f1315bba5a345ac5cf53b5d20b172bbc7e41713c5b593c3302678f184d96762ebe71ead5f5b829c40ac710056242a18c61305f82834ce81
-
Filesize
294KB
MD58eb5a3bca26acb6688a0cd7b35cfdad9
SHA1209c79d6b18a00f378efa75c7a3e44686f1850a1
SHA25624dfdf400d8514d3fbfc5f4aa5dd2143f38b160ad142417bbf83e4d2e425dd0c
SHA5129dc20a43174f103ace495986cda9870ed4b899c74fe85cfd941fe2cc312e883caf9d0f8835fc59f8a7fd82ee350e479896fb31c7d0cd170ff6932fd9e24a0417
-
Filesize
392KB
MD515c1cadd3729ae6a4c1f8fa08d61bdc6
SHA11486f4eaa1b41b0f2101559ea24630d002bc2d25
SHA256ce1dd1ba63273aacc0d1ef4e25d8338577d612e88f27d29466168099d3548342
SHA51270eb764a53647d178278c743f964e03671bd445cc121f8e5a5b17441483b8b150ddf0d91316b8da1a7e289f6d6ebaf7f4952c8745530a700d21269309807f341
-
Filesize
158KB
MD5bfb045ceef93ef6ab1cef922a95a630e
SHA14a89fc0aa79757f4986b83f15b8780285db86fb6
SHA2561f6b69d11a3066e21c40002a25986c44e24a66f023a40e5f49eecaea33f5576d
SHA5129c1bfa88b5b5533ede94158fa3169b9e0458f1ceae04dae0e74f4c23a899ce27d9109bd298a2053fb698e2ed403f51a9b828ee9fa9d66b54a18cd0d969edc194
-
Filesize
181KB
MD54b0bf7525348fd3b55b189c42f90633c
SHA13861f8dad235032ff0d68065fde4082b379f02b2
SHA256f318deb222e9f635f3a7b7de3202169732ebdb4ccf0be5fa8bb94e2e83913b74
SHA512ae87acaf33c4cc1a1368b427128432b94a8030f8837490ecaf6a394a5e2e5a9340e243f436b894fa269a8bec3d22da93b9e480d33911938e995055c3e7a8cb76
-
Filesize
217KB
MD5e0e328e353efdfccf4aba39bed38ae5c
SHA135388f3a1d5f30b913e5ec442ccee88a03df11bd
SHA256b8ca3d7d6f8f875b88128f9968d7ad2718300115c1bf455fcc3d128c923b2c14
SHA51232af8dcb139f1c0dc0e23641ad8f87e9cda2071c001405db6a44fce2226a189217dcd5aa47f260eaa3d482aa8bd20f797fc7cb48b3e9195be9e0dd94e79651b5
-
Filesize
1.9MB
MD5edfa8bd2f0c16e230f330eafb3a6e460
SHA1a82891330547bb25032c28a28991ca015c68cfd6
SHA256f5b71fee076ccb6564f52cd709f0a30f5a32f7737a4560dcc8f02b264bfd6a9e
SHA5123fab3b4ad4bb23d01649fd67f285abb5a688abc62f58b8f18ff3f8d36a19c865043c3b216708ad038c32368d0a87f34162df37c8d9941960e35d31917fee1e2e
-
Filesize
42KB
MD5418b407c7b15a719c6f5a142669110f5
SHA1dae34b810d7c99496fe0468f211db9227405f1c7
SHA256daf07770a79c900af6aa696bc8ec89393380c52435223922ca2b3d3559f10340
SHA512bf259b3d1970f8dd3a30718385f8dc984e83ac24aed9e0c10aa6a4dbd8af102b84745b897256c3ce269b73abb6852af9f47e80f36df39a671ccc6a117c6d9f76
-
Filesize
41KB
MD58ed294671fc284dce63d0d5a9d83b526
SHA1a6547da3072ee04ac0a078ebde4509556e2e1fc4
SHA2568048cd3ebe28e7458af073032cb435ba59e671bffc9ca142380c302ed7e93107
SHA512318d782bab83fdc5df39fa8d941e33b3c51b3cce9eec3e585a7a54735e57f646d5dd89608d1d87804b35757c3120f4efb43cc67537fac6ca0d8a14f01c0f8dc0
-
Filesize
44KB
MD5c715cc99f0fd8a65cf6e6fdb4b4d1529
SHA1856c40d9a4ffe0494cc26bd935f8bf3862e1743c
SHA2563e61e27a8a9cfa94d7bdf0efb289bb7758f02bc07d0f52f17a965b6871b94a6e
SHA5120bd4374ba94ff725ad43911260948f595a0ea8dd04d5a0f92306099eede90c306f786a5827648899f0da762d1b2599ce0eb3fa91c04dc0bb363cd288d64695ec
-
Filesize
44KB
MD56e8f8ed14c3b47252a72ff6239dbe75e
SHA1dead9a7befb31ad9bf53c65dec9875b503dff06b
SHA256aadaec6f8e64d76ead1d67c1d14d7c72e6c9743351fefec5be9cab06f2536c56
SHA5121e0835cce0c5e32bc500ae1c84697c84165d672e336efbf88ba2481e1d539fdc3eea5b8451eb103f917c680bf0558d879b75d4eea2c053dc274d4fa13322dee0
-
Filesize
44KB
MD5d69ed8225e072d108b0cb723f25d745c
SHA1bd9cf36f9cf49fecc742d8b95a425cf0cfadf22a
SHA25615cb0374dfbf66c413bfdbc69da477c28cda0694f279bfc1011de99687fbf0b8
SHA512dcdb98c0c5fa9c0cb7e746401f9523048cfc8801376aadb16ed6e2d22d64f2fb944f9220f921151a61e4983bf4293d18fad6dc010ae69841aad449bfc40fd40b
-
Filesize
43KB
MD51a2b18db01c22e2ef828dd0b5140f4c1
SHA1d376329e5e1048db8224d4c786e7d5c7b668be95
SHA256ef43254f63d1384b44ea2d0b02bcc176c6e67a20ed815c1e028a0c4c0f7268ce
SHA512525176002934c494ac542ed5a6bdec5dbce75c92b7eb161fc13676c91e2e7172973786544f912fd6c731186559d0817bded29e0539a2c3a9f514db2390158462
-
Filesize
43KB
MD5fe98be1fe919aca4f759e21dc79eefbc
SHA1ffa501ea34544b08c51d7a1150309491b3ed3dd9
SHA256730d76fb5f00e34a1760b4c8814d8ff4be7de0710ca6321a79000dab001cfd46
SHA51276e98c8f06ed9e38b383678f93ef38753f5c8ec20edd31e68e9abcf44640e6ab2ba89cdb8bf97a914a3b5c280c6abc2012f0237ea7a3d8b652b1aec2e55c81d8
-
Filesize
45KB
MD5dcccbe27e366292aa7f5796ba44d0cf2
SHA176cffe494d0847f7d9aeeee48c7f6c687a849993
SHA256c5af4b1f0e63896ea32954b12757f5cee73b866a6572e592e2d0a1f8e8114def
SHA51261e2655ab819960fa4157131a400fecdd812a2821927fdc9f1757b599ca0eb5fd3087e259d2e0746b867197a099b540780a6066509dc63deb62f9ee1f5a231e6
-
Filesize
44KB
MD5b049895c8da7a192546057f435107e66
SHA17f1938b0464b8da2a8164837dbe4826d2a0a7a50
SHA2564f91bd2780e8a07f7f293e1d133af79070e8eacf988c9aef402057d5688b1ec0
SHA512a2874a858d3d7c8219d3bb3a21210b007cf3148b6ae606805ba3a42edeb9357433e73505f1e13c7fb96994fcc1133a7cdc7dc0b7502d025ff726813b0731cf76
-
Filesize
42KB
MD569d31e43a6a0182bd7e1dcecc754558f
SHA1b4f712f563518acf6f1d2353e03aff2981d009b8
SHA2567aa2ce26d8e21eb4774202534f132193c5dbd8c693efb7e7e86effe54892d09d
SHA5125c471a1aed7193404fb9eaccb2157a01d333ee4ef9be99f4604f049a8ea0b18f6ebd5523f346cb4bd97efa35dfa7309abe2771e4a154f2d45827a791c9665685
-
Filesize
42KB
MD5ddc8a827afa27984c03d10cada39327e
SHA1d089c4131c030e52b5cd7b4643392a4d9cc66935
SHA25650f5336a87755a029e56b21d5719a36250aa58c5429a1387e0c365e334bd4a4b
SHA512e924c8ada788a90cec3caebcaea90aae1e1021b5ae79e9aa4a0db7ce3d9bdaf2a4f21676b7100b73a7b792c646954f58de55b03f075f408bfc72d078219f2632
-
Filesize
43KB
MD58d3f863d40503167df5c5a47bc12f7cf
SHA1471bf2c2c7ce76eada842f96ccbabcbe602ba769
SHA256c97c7610318387907716bc813d3ce2298aff7b35b3d03504b208f3ae2d0c90c2
SHA5126b658a92a54a7514c0f8318df024921cf03d85884ae393cd6f604ba08d973b5abc4100b6edc596d29f2882a858ae384596fa24a624464d1547efb921eac83dde
-
Filesize
45KB
MD574a36fcea1e1ad6c07fcbde535198c74
SHA148e51247a553d2babcd4b84920fdc31e81559e98
SHA256d0d79d998b1963369ceec1e90a4f820460028dabc6e82d0a0bf4dbb4e84155f1
SHA5126bfe5fd01bd230a2c5227635385d0765c51aa1941d5bebdff6aa66135873a375643f5069baf1e72dfd27a1769530e398d0bd8fe11183eb75f00ca23de8e08cfc
-
Filesize
42KB
MD5a79ddde77ec7e218eea098cdf254d97d
SHA10c751b2b5a30162d9270c83d4e65995191da1369
SHA25660e0e6b193c3729aa9bb33099820e9540f2c4331534355d18da922d8d653e9fb
SHA512b94f11b9b7372acaea4ac172f8393fbe4c274c7c69cc58f672b02a3f141200d415a093ab88afaf632aa5a1f6e1c87a911dd8e9f3159e68e44ef3b03376a0ac73
-
Filesize
42KB
MD5b3dfe146311d95d9eac5e74e3b723a0d
SHA1002ec7a189ab0f5a9265c587006c1eaf51538881
SHA256f96751c4f1b6dbe5c694c5edc962a9f8ae31acc8ffe49c449d9f978c93e80710
SHA51293760f5310672684ac2df6275762b7268e38fe8b8b588673fe1a64b97b3af78b85664a23fce1abb682c1c421f62133ca1fdf803dd4b98aa9071f992fa1b4bc77
-
Filesize
43KB
MD50d56238cfb345199ef170ade32fb060d
SHA1f54795d4c0370a0ff8134edefbdcd25adc973e78
SHA25640e43508fa6f3314487c768b0d17be723e5493710613f9aec0759444070e1e31
SHA512dfe21dd9ac6eba7cafaa10d3247378b6dd65e90a521962cbdd35ba6960fc9552a90a03c606445402237cc8e5cac54f85e59d31ed13ae329d867dc3e513fecb9d
-
Filesize
44KB
MD5488f70652a950be945b28b9667e1cd23
SHA17fe910247cc239164f75ac01cf0febee7311605a
SHA2568d47a73610ef517005e7bf50fcadb9994e1ec23d89ac5cbe17a826c4fb1d4e52
SHA512a9d908769d6b2b8d0849dd0857a005f444b1795a01eb97e2ed6c276cf9343e71fbd8240552a1e46a23bc7cbaa2a06f19c3e321fafeb52285e176c7ed6a36f1d2
-
Filesize
44KB
MD5e758129a3520d9d5d8b5e2fbc017852b
SHA1df0e9ef617301a6441a64600cbe799c3ec251f2b
SHA2568d3de1fd33da715c63eb1ce8c237f1d5b43dbbebe8bd844a8b7be5673566f486
SHA512ae7b6be0dba6bff00461527f2e9a00a850e3114172c66f3363d25726250869d6ab490c1be04573c0858920f90add06b54a7e21e5d5033ff8611d43639853fa25
-
Filesize
44KB
MD56c548cd39dc7da1bfbd2dab1a9d614dd
SHA19461ef67c9d7f2066fbf3c2b6db80a9397026196
SHA256299b22085e3ab0cd813bd6a226763dd7e8f83f46c72aff82d27a5aaf66bbddb5
SHA51297939b4040712e07af5876ee753a405ace6cd373ff5dae882750640114ddbb9b08e1ede5327f09ac88644baced8ada4129e9c563015cea0d36bb31276343c7d4
-
Filesize
43KB
MD5ae97b0884025bb6526dd1e0aeb4e26c4
SHA19d89dc1a5ff310a38b1a1ad0bedbe6abd9956619
SHA2567135d984bb602943c0545c628e8dd55b8c8309ba2ad5c9408b4290efa718d521
SHA51214c370a17973bbc2b89653ee4215601cf28c480502d51507626fdfbf5a32363a56a1a290b7fc2efa611166512a225f4fc7c4fc21720e6a7d3c760017f8120534
-
Filesize
43KB
MD55927d2da6e75c35314f2cb814de0ea6d
SHA165d5c5fad9c6718566e057ce6615287cf383d2a0
SHA256c6e1d126af9c781f37c9ff958cdd003e8f4097c7c0bbba19cabf69d1b9ce898a
SHA512996fff42b0c443ffe25294991e9425972e57e663a8159c183ba088f0b55b6534c95417a29fca04cfe3528df7e970c0f5f9cb72823202d6729c6ceebe8c5f3b70
-
Filesize
43KB
MD540bbad8fbea40e5bfb9161c5aa8c70ed
SHA1f65f31086333f1b7fbe443037abbad202550175a
SHA2565e223e560ec266011afa68fc298d2bbadf3eb5b16cee33cf2129cbb69c5fbc57
SHA512b54031c97b59b4426345f8600827102915daeafe33c023f7478839ea0a3f159f35c878e749fc248d4cbd7ae62b19ae668ac797672c5642bbdc55ef6e5af4989d
-
Filesize
42KB
MD50aa670bc2dd150fa5123b83bccf5fe12
SHA14870a864fe6143eb5222e8d8e73f5fda56e287ad
SHA256ede96cb0ccb194ded60e47d1e5267e7d9b4be17486d6815dd83b9e113a9d461d
SHA51254c35d31972956dabe61dff647671f3c35f7ce89460577b4131050498760320ced266fe06f1a6b885562213e59352db52918e742433ec834f65c0853fa73516f
-
Filesize
42KB
MD5aef60779077e9f87af913004cb60ecfd
SHA1d6f2d022bdccce977629242a1d96ad0ae07265fb
SHA256abf4ca30494eadc3b1f5840ffb0ccd2f7edba3b1f2e6798709ec2f05133ad050
SHA512c82f5a4e51d7c64bf73d5f7b596797f84743c66304f5b9fad1301571b3949efa7da75b35551c517cfd92b109fbc005695b12d5d34ee30700af5ecf8baf5d8c83
-
Filesize
44KB
MD5232b8861fdad435fd31e125056aadc95
SHA1fa85b685c0a376b08c5858294cc25a2d0d236a00
SHA256b71afc27c4c6ce8759595f4a4ca3045f8348020fee8f9fb84458f98b9da7a004
SHA512cd364c636ec62784d6829284247a72f07f5c1250fc28416a320c779424c9df85b698f13c8cfbb4b060b2da32487f4c6df42ce178d1a4f6c6a03f8defaf1388ba
-
Filesize
40KB
MD56d04e00145390e4d125c6ce37e0e7c0a
SHA11d9a191462c4927d84fc10a4b657abefc8862a24
SHA256b406ef6c77fbbab2b722df7ac3cbde3aca8a73f3d4f4745a48ca11ca6af53198
SHA51288bcfe01b0de70d91f63d2888cf24782cfe2960124dc455a669fae2001b5aab4c1999446d2fd3115c6c4e660780f6fb9fc39044c4a1936cbc47914d75e87617c
-
Filesize
39KB
MD5ca6d439a8ff4f33b7b18a2e0aa69d09e
SHA12ce96633bbc013d5418894af9a02b0243f56e89f
SHA2564bfecde36d9851a0c7c2bcac76b8ba103261b2c66d409dffd756e1ec3ed6668d
SHA5121514f0d469dc0a8c5ff75d4b5eab4378c7ff8fe84307004c6d9028716eb62bcc230cc0e99d33558f847821a844a022da79e0e60e5e3593d4932dc7c7f6d9c825
-
Filesize
44KB
MD5f0b14a9d80eea1f6def5c27590069708
SHA14521f35d60730b57196edb6186aae7c9e4f8ef7e
SHA25683d621aabe3120ea87ce6c45a099ceb0b4ba2b61f810d549e5e73b59f39a2be2
SHA512f8326580b12eede8017f3cbfb3732b383dc0c5ebf9ef35f20a2575f17a132af2a7e03d4bd53e0c13398492a3c648cca8c228bbb4e0c5024bbefed3c000d39968
-
Filesize
38KB
MD58a65732d96bc6ba596e6114a82270cd1
SHA148640a6b313294f5c6a82a5ccc5c4e981d0ae5f1
SHA256022e8b4c03ea94797df3bc315112eccbe913f15f32e3ce22479b421062441b3e
SHA512c6a65988e31bc24ce75050b77c74d807c7367ad30af635c0769513ea7e068c26bfa2dcad0a5084b2ca72a7bebe300bdfe79b99d3f298be4c133fd93fb2f96c8c
-
Filesize
42KB
MD5ee1e1ba70e4c75ac786d1815f9e8903e
SHA12f7d4bd9ef18a6ed26bb0bafcdd0510e2e4a91f2
SHA256926681fdd9a0b9554bee09e4edc1cdfd451943e51df17f713c5705f36d4f6a01
SHA5123f13fec7c244b25746312c9cc9cd234b196d8c52822fea534c13cfb215cdd6892a5325371d1baaa7219bdf9e3fa50211396fb51ea9f34df10caf597ca641d7b4
-
Filesize
43KB
MD53e4fd166c0650897190690cc649a3277
SHA109e3ac95e54901de4cdf089b17ac823f7d304153
SHA256693322193a570d82f6ec2cb44c1b5aa35304d2276942d04a857148a1b99a0931
SHA5121436905284bbb50796ccdbb556d789c8b79e2eb621b8be92485361aa63158b03e61054c3c371fa7403fdee9ef25a009e8e1665e8bb933ebe1f8b0acd324692e5
-
Filesize
46KB
MD5d306f4020bb3b59573394a4b8bbda5ad
SHA12d3db5163817293f9379aa1bd26d37729c331cfe
SHA256d2a71290a4bdf815e8d91613bc83f7d6300e0203a1c7dda1dc28fe2bd2266f7b
SHA5125e8adbeac1ee6ce78f990b07f82ece85f270166991124af36f27e6ec7962c1cf02a98de8f4cf3b21462c2a9680e418947f42204457942fc314116bc8e24a63d7
-
Filesize
44KB
MD5f7ce1d1130f8f9752b95bc1b05913385
SHA17f3734c7569ad96bb37ed6194f7ff30b30c607d4
SHA256907adf05f6bbe26470bfbefa47b50d804fb786dd750ce53c2287423d22eeba0f
SHA512fc53e8a1f5f1843860a092f8f8b8d99b786d2f479fdc674000c0c8f8ada40485f1829320b60863ee6586e20b2a09f6d790fc77c428e6e4aa34a91c71a25d58e5
-
Filesize
42KB
MD56942a314b45262a5ff1cd44b583397be
SHA1b414898cac368f99d94392fa719e8b755be292e5
SHA256211c235db5eeb1285d7aeecccda1eae5b9548de4a8943b3b296260165a616a38
SHA512de277ca55fcfb8c72336fa09e98df22bbd2b7400d4327dfd59f73aea240184e30dd9daa2295ee1c1418a39c1036ed752b6f9a8bd4559579a219ccae657e105db
-
Filesize
44KB
MD58525224a91c6a2f629db261ddbfbc286
SHA167518c812ef4a8b2bcf12d25b8fd6bc1b18b4872
SHA256ae5f51786484b02a133b05fc68d7a804b4a9246f7bd53ab5cd79a5e8ea5e02fe
SHA5126c512d269937019f4c8d94d36619571fe14ec560841e4f8ea5d492c21d884d95109f4a4e7a66d0d3e094d8f6781f39f62e4d27282e0beefb910d49ff2a9f4139
-
Filesize
43KB
MD5a95352e72502961c5f7bdcbfe4a69551
SHA1e515f94853bf011689b5c1b6f36924ca312ff099
SHA256c4380ee11a274085aa496454d005470810531ce0055ae742b1ff0e23186aea90
SHA5120d78b56120bbd1ed1eeb8f3206ed8bb7778f8d2c62f67b0d88e163884b2cf5bfcc2e502cc698ba597ad8a84305e9ac1db8b9b78455b19d7a9583638ff624ebe6
-
Filesize
43KB
MD5fa40196b6861837f55e428ce83bb3634
SHA139e62e20d87346f77e45a1b193f4b1b7f31b127f
SHA2565e7884cceaadecb4635bfe32efbcb79bf6592c2ef4b5015d5a40854a9d137e49
SHA512a999fd22b91943970859fee2141ac0c2a185e82104a4980bd29d74326089bf0ca65bdcefe7b344bd6ca1b733f37e395f3171ab2bd4b5137d8521ff7eb5421969
-
Filesize
43KB
MD537fef520ec91a3f9311dc6e23a8ab9bb
SHA13838c3ea89598ceb20ec67895250a1a4528dcab9
SHA256900c30ff375dc10b250ab32266b0154393581e0ee428fef80d83cdcf60ee91a3
SHA5122ca2a88dbcf319e8fd0c8b45cbdb639b650a13001d4f3ea6dc16f516099abe3ea81fc5302f53f129e7fbb359bc3901dd2dba012ac4d6e9ace3e6942ca8e42495
-
Filesize
43KB
MD5262734cf3e4efa687a737c0955a766b8
SHA1415fad5ad780798852e31d72e04834a007a421db
SHA2567d5aa88074903adaa4b8cc4788269b616d591080f73aee63603ee0c0ebac60e2
SHA5123a168fb720c149c021b6aed69ed019571b37ffe642aae450c2a4daa48105d8a1727f9016aa7d30c417740abe09585ab57ff2a70a0ff197f88262be6ef8e55dec
-
Filesize
43KB
MD56a652a2781d2d7fda7792d7fbf8c90db
SHA192d12c87e2a1919bfb0021c61f2b2f84298ba1d0
SHA256070e59922583b36807f907e6cd579ea089e2b0b44321ea3fd25827234b12fe9b
SHA512048ec65c970a9bc508581a925fa3b4d64919c75770dc4d39762024fa1cd1fcabfca4bd68951b2d2ab38885b8f5ff29e3408dcd55deb7523ff2283818aad79f5f
-
Filesize
42KB
MD576aa3153f078bb5c4951911a3601a2b4
SHA1e3f8a01ef1ed42a2e250cbec08ab9a5ee97e59dd
SHA25604028a3875bd25f62ee9c003a72ac56b148a0317447442398d94f8c3d7334c39
SHA512aa7d744fa4a1fe5be14ddc3de90d748ef03a77c7ddc3a518a98096ddc6ca96c95310e5a7d21476d475ae6fbc40abb5f4a4ce2393acdd9be443c44d68979c7c74
-
Filesize
43KB
MD5352d9b2b10353a6108035d42bf397c65
SHA137f0468b9650daba7ad8d8194c2e5d9ebc4f105a
SHA256c236a03f43539943e8766d871b98ff7a696fcd4baa2a6db33b1e6fa80aafa9ed
SHA512f95d23849236e1c77804698781e0a654eeb0ccb618edc3c5b2f8026355a8ba16535d5f7b6cf323aea7d4deca7296095945c29bc3954a63cea2d1fed609a9a331
-
Filesize
43KB
MD5e1bc06bf23d731b666e5f42b787b2b98
SHA15dedcfc1f7d79d6b6d1e20d43c27281eef267cea
SHA256ae8f83502ce30b31cf462003c6eea63635d865d747d3c3c0d29fa1f603584f21
SHA512e84c8866b014a55e72e6fa9a17a08ae2063d253962a5c608c0737f5672e3df84c5f37c53d7246d17d847d4192fe988425fdfa4855f594d9a73565f7e1fa05544
-
Filesize
43KB
MD5301101a45a861cc17c9713ee0315a2cc
SHA19c153142ccb9d8f2797ec98435686315f91af6bc
SHA2568559a01db09ecf7ad9ab1059123af7471685a3d36387bcbf9874dee030011be0
SHA512d00fccfa7afb6cac94b744a855f8bc28837bedcbafb164383e2d47a2a19e4281ad295e910f37ee24c7091cefebe10e60ac5e69722f718d1540bb074beca9ce3d
-
Filesize
43KB
MD5157e114596bca18c385c31630d6bf897
SHA1b68d289a1aaf43d32e024167f1982a1182fd5d64
SHA25693ef6771b4e97c531e3c836765af22750fdbd049dbec71eee1dfd0b30ccd9bf0
SHA512ed6fb2032194bd9fca19311a3f84b581fb0866d16dacc5045c16a7eea83b63bb0f116a5d4d2bfbdbbccc17a51eaf6ccc366f6809f9dc0428d8b4cd189b7dd22e