Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 06:28
Behavioral task
behavioral1
Sample
2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
-
Size
5.7MB
-
MD5
6430e9ec7e8c1fb1e7a78b73932419bc
-
SHA1
b5d1b1cc515bd623f9866e1de040a2a73c753420
-
SHA256
773857db776e83d1d4cc43ebb1d9ab67b6de3e14ddb8a413c757557b4ad3dd23
-
SHA512
4243aa6ec4281ea2808bcf070fa50eb510b82fc3cc2455699a15da1b0464600acece38a67f8797aa5c8d4831ff138e05ebde0f520f687f8e48680709875b82eb
-
SSDEEP
98304:HskDP1dOcdwJeV/ztZBe91oiImuUiK9N9EGQKF9BSHLr7a3:LOtS/hwkmg4EdLrO3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation steamwebhelper.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation steamwebhelper.exe -
Executes dropped EXE 13 IoCs
pid Process 1664 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 14956 steamwebhelper.exe 14904 steamwebhelper.exe 14792 steamwebhelper.exe 7456 steamwebhelper.exe 14256 gldriverquery64.exe 14208 steamwebhelper.exe 14152 steamwebhelper.exe 13940 gldriverquery.exe 13824 vulkandriverquery64.exe 13232 vulkandriverquery.exe 8068 steamwebhelper.exe -
Loads dropped DLL 44 IoCs
pid Process 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14904 steamwebhelper.exe 14904 steamwebhelper.exe 14904 steamwebhelper.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 14792 steamwebhelper.exe 7456 steamwebhelper.exe 7456 steamwebhelper.exe 7456 steamwebhelper.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 14208 steamwebhelper.exe 14208 steamwebhelper.exe 14208 steamwebhelper.exe 14152 steamwebhelper.exe 14152 steamwebhelper.exe 14152 steamwebhelper.exe 14152 steamwebhelper.exe 8068 steamwebhelper.exe 8068 steamwebhelper.exe 8068 steamwebhelper.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe" 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HD_ls.exe = "C:\\Windows\\system32\\HD_ls.exe" 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\HD_ls.exe 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\_platform_specific\win_x64\widevinecdm.dll.sig steamwebhelper.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\_platform_specific\win_x64\widevinecdm.dll steamwebhelper.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\LICENSE steamwebhelper.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\manifest.json steamwebhelper.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\_metadata\verified_contents.json steamwebhelper.exe File created C:\Program Files\chrome_ComponentUnpacker_BeginUnzipping14956_2115015415\manifest.fingerprint steamwebhelper.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\HD_.exe 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz steamwebhelper.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 steamwebhelper.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe Token: SeShutdownPrivilege 14956 steamwebhelper.exe Token: SeCreatePagefilePrivilege 14956 steamwebhelper.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe 14956 steamwebhelper.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1664 2768 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 82 PID 2768 wrote to memory of 1664 2768 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 82 PID 2768 wrote to memory of 1664 2768 2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 82 PID 1664 wrote to memory of 15520 1664 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 96 PID 1664 wrote to memory of 15520 1664 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 96 PID 1664 wrote to memory of 15520 1664 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 96 PID 15520 wrote to memory of 14956 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 97 PID 15520 wrote to memory of 14956 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 97 PID 14956 wrote to memory of 14904 14956 steamwebhelper.exe 98 PID 14956 wrote to memory of 14904 14956 steamwebhelper.exe 98 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 14792 14956 steamwebhelper.exe 99 PID 14956 wrote to memory of 7456 14956 steamwebhelper.exe 100 PID 14956 wrote to memory of 7456 14956 steamwebhelper.exe 100 PID 15520 wrote to memory of 14256 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 102 PID 15520 wrote to memory of 14256 15520 HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe 102 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103 PID 14956 wrote to memory of 14208 14956 steamwebhelper.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exeC:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe2⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exeC:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:15520 -
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exeC:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe "-lang=en_US" "-cachedir=C:\Users\Admin\AppData\Local\Steam\htmlcache" "-steampid=15520" "-buildid=1718904662" "-steamid=0" "-logdir=C:\Users\Admin\AppData\Local\Temp\logs" "-uimode=7" "-startcount=0" "-userdatadir=C:\Users\Admin\AppData\Local\Steam\cefdata" "-steamuniverse=Public" "-realm=Global" "-clientui=C:\Users\Admin\AppData\Local\Temp\clientui" "-steampath=C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe" "-launcher=0" --valve-enable-site-isolation --enable-smooth-scrolling --enable-direct-write "--log-file=C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --disable-quick-menu "--disable-features=SpareRendererForSitePerProcess,DcheckIsFatal"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:14956 -
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exeC:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe --type=crashpad-handler /prefetch:7 --max-uploads=5 --max-db-size=20 --max-db-age=5 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\dumps "--metrics-dir=C:\Users\Admin\AppData\Local\CEF\User Data" --url=https://crash.steampowered.com/submit --annotation=platform=win64 --annotation=product=cefwebhelper --annotation=version=1718904662 --initial-client-data=0x35c,0x360,0x364,0x338,0x368,0x7ff90decee38,0x7ff90decee48,0x7ff90decee585⤵
- Executes dropped EXE
- Loads dropped DLL
PID:14904
-
-
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=gpu-process --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904662 --steamid=0 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=1488 --field-trial-handle=1736,i,8900095157188030247,18365282163345458465,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:14792
-
-
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904662 --steamid=0 --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=2196 --field-trial-handle=1736,i,8900095157188030247,18365282163345458465,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7456
-
-
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904662 --steamid=0 --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=2512 --field-trial-handle=1736,i,8900095157188030247,18365282163345458465,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:14208
-
-
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=renderer --user-agent-product="Valve Steam Client" --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904662 --steamid=0 --first-renderer-process --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1736,i,8900095157188030247,18365282163345458465,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:14152
-
-
C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe"C:\Users\Admin\AppData\Local\Temp\bin\cef\cef.win7x64\steamwebhelper.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --user-agent-product="Valve Steam Client" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Steam\cefdata" --buildid=1718904662 --steamid=0 --log-file="C:\Users\Admin\AppData\Local\Temp\logs\cef_log.txt" --mojo-platform-channel-handle=1728 --field-trial-handle=1736,i,8900095157188030247,18365282163345458465,131072 --disable-features=BackForwardCache,DcheckIsFatal,SpareRendererForSitePerProcess,WinUseBrowserSpellChecker /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8068
-
-
-
C:\Users\Admin\AppData\Local\Temp\bin\gldriverquery64.exe.\bin\gldriverquery64.exe4⤵
- Executes dropped EXE
PID:14256
-
-
C:\Users\Admin\AppData\Local\Temp\bin\gldriverquery.exe.\bin\gldriverquery.exe4⤵
- Executes dropped EXE
PID:13940
-
-
C:\Users\Admin\AppData\Local\Temp\bin\vulkandriverquery64.exe.\bin\vulkandriverquery64.exe4⤵
- Executes dropped EXE
PID:13824
-
-
C:\Users\Admin\AppData\Local\Temp\bin\vulkandriverquery.exe.\bin\vulkandriverquery.exe4⤵
- Executes dropped EXE
PID:13232
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x424 0x5001⤵PID:14324
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473B
MD5f6719687bed7403612eaed0b191eb4a9
SHA1dd03919750e45507743bd089a659e8efcefa7af1
SHA256afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59
SHA512dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56
-
Filesize
1001B
MD52648d437c53db54b3ebd00e64852687e
SHA166cfe157f4c8e17bfda15325abfef40ec6d49608
SHA25668a3d7cb10f3001f40bc583b7fff0183895a61d3bd1b7a1c34e602df6f0f8806
SHA51286d5c3129bec156b17b8ebd5dec5a6258e10cb426b84dd3e4af85c9c2cd7ebf4faea01fd10dd906a18ea1042394c3f41a835eae2d83dc8146dfe4b6d71147828
-
Filesize
240B
MD55b4f750c63e59e465009dc3a925e93f1
SHA1bd5f9ec02e2e289e29c63d35b79c5eb5bbc4294d
SHA2562404687133f7f5ad1aea64b53117a51047106ad5b7e931e0b5e23be060bf8cb8
SHA512f4d4625720e741c6a35269840f8bd6c25e81ef88c7c979e006784631975cd5478e6776139c803da7c1f34cb5da63295428a796131fdb36f427f6905920ff6594
-
Filesize
48B
MD5006faa2c1cc73d2172fec191c7d3f408
SHA1fc00de93eaebb239430b5b52636499a59b5789ea
SHA25635e864a4870c143fc0908ca9de81bf7f993f9d7d82a6f947c2f32905d6b5382e
SHA51264f0cd25537070d4b1a506cef69d39db8f2540fab6f673c18a33069ab7ba9da77e868a4b650d36d744008d4f32b6374e43df2f5e406f2847734c83a3668e8f4f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
786B
MD51a9c1233c34db940cb7fae161f3bbb0b
SHA11eefe4e8ba8a0141330bc0d3e53d8fccbbb2d5d9
SHA2565cb50f381237fa927d3c0050880ee5afdcad8b3673224f151f7000a12e5b196f
SHA512faf737c77b44c18c096640de7e4baf0d0a3ba3a7358c68bd84adda52ddc166aca1c186e85e014ae9fa8a758aa88426b8cb9464d6abbb35eac506242c9712c725
-
Filesize
693B
MD5ffc6ed90a455bf311343c7734d6a0679
SHA1e9b245a64046a5cd5635b5673c3e5b35081f6ecb
SHA25659b2bee472bf1cf1e7ad0828c50f2d09ea1f08a053833bac6df0129385e9d508
SHA512d389c81eff13dc23b7ea5330b439780ab9471e070b9ad9ccc2ebe7d3df8ecf2fec8b632634d95423059966b130b12a683d21ad0895aa18fb6ba3dc516df2cb6a
-
Filesize
484B
MD51587d5ba7222884a4514a62236b458cb
SHA1bb39b3853b5b3c6fde4eab432a313ec94c4aba19
SHA256bb8ad39b6cd487f4083621c02eb33982af6c968cb176bd4b13cf62e268b9d513
SHA5128f9b95264d4b572445e0baae77cd3634fe63a08d0a65a713f80d860883fe4624bdcf8d7bb25c0a08a341a8c40a4306fb7017f7bb874e6af7fc3a22c2a4345281
-
Filesize
300B
MD5f05873dcfec8643685aad0c5d86c6ac4
SHA12e4b432395f41552a916627c2a37957d39d50efb
SHA2567e1defc6d9af62592a7f7685761f89274448389cbe868e2cc0de4d3ee8fea516
SHA51293f898fbd41d92d66d1dc538aa438640561819900fd8d132f7f3873a204f73b9fe6112fae9e138abf49ea8883832e72ab2a5b8d06abb7b3cf67443a73a3859d4
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\Temp\HD_2024-06-27_6430e9ec7e8c1fb1e7a78b73932419bc_magniber_qakbot.exe
Filesize4.2MB
MD5d2281df0fbdea076f9d1b9aa9d0770db
SHA19ee08be6e3018169c78833bd1420f5e1cd15272f
SHA2561136537945345b9516ccf3cb0a7348839445d280188ef52f25b6ecdacd8a8628
SHA5120f031aae359f3b4e4aea7a44db49a07415758ad9cceeddfbd533612e267ae293ed7a8cce28d5a47f27edac79bb0b05c6cbb48d25a0e36dea82b74804172e4cb6
-
Filesize
7.1MB
MD5d764264518e77cc546a5876c3bcebad4
SHA1ea17d45b396fa193a851bfd345e2b2c20ad60e12
SHA256e78492de0ab575add50b925bfd44216d224d09904a9b14c17087a92fdcbc15cd
SHA5127cf132ea5254a55c08186ffcf5e47360ef5ddd57d03d7051171f6753b22e3925304d183c2037bfd320ad56c08e079f9b2c4640db8cb3dbd38ff500c7a39e997f
-
Filesize
226KB
MD5a09c5fa842fa4456a0b53b46f1050225
SHA19e4677f19e77bf55e7d0e2e82d8c27f79dbbd78e
SHA2563d7ba6fedfdfd6e751693d718a21438304690b754d1c5d13c847a829b2423b8b
SHA51271c962da6ed6894209891513bf9f0132a5eab6c65a5d9ba334efcaf73463be5625665a060863a106d59fad1949f6191f641aa4c59ddb0e825701bef08ef9b5a5
-
Filesize
177KB
MD51f2d6a54ee20a1fc3e421f4617e11fee
SHA18faacf81b34ff7eb54c70520a15b53954ad27565
SHA2568683b6868f2fa1f29aa4d800a11b8cf628cda3b3651575c147b1e51e89a19309
SHA5124f52fa530755fd3dc775861f880729e9ca9a892408707e816d89f25f1ec03b17779945b3ebda228ca83a320c167523a9801afdcb526420b314df6861b9f97f06
-
Filesize
1.9MB
MD5bb75f1052411f83aae98b4242bfc5d83
SHA100384e09572f8952da0d891d7cfb416b0494acb2
SHA25695a5f33ff16d89c8ffa1e4f8aea8cafcd55c1a5e66af7624b5052d0ebb8bc97d
SHA512fffd47a594a8202d2b65169067f1d6dbc3de1d6aa31a34374d757ec7d13ac9df34eefb7740ec0b6897bea3b7da9733db8a7e83fdea36c6ff56554a45d8d03e80
-
Filesize
23KB
MD54cbad862a3ff6e7ac0f33a904d247536
SHA157ed831d8f3739aee41735fce679641862c36076
SHA25632a70082cf3496745580c0e4b7d1bdbe925013300f0573ccef466e7a1915a51c
SHA512355e5f5081588c2460b6c21818172eea17b18f6d94a958902db57a585409c8a2231a2666bc12548316a041bfce8a2eeeef2e4759a9e38900550b6a7c96d7ed2a
-
Filesize
23KB
MD5f9bf7d30ea5a945b77910a06151ff620
SHA13158c9ab3fd9b6fed40e77abe39eb53234151977
SHA256b4ff5467266a4f8e5d8998525a8948b8b86d51a23c2f4f7023c505c8db341802
SHA51207e01ebde7c80fa3937f2169da9dc496f0a5efbbbc9c305e7772e28e334906054c14747fe10cca0ac1f1f275d95a08801ae7c44ca1cbddae1c1e008bf428d1a4
-
Filesize
23KB
MD5e763390e8aebf15cb2b9b5b8c9cc4e9e
SHA10f9f6544903700fa26c8892ff7e4881c56238282
SHA2565963b1cdb894ce297e52844741047f74f8d86fa7e97437e26d9bc8f0094e1003
SHA5124c8089029c0d97ef1a1570dc47a8eda08f2071332521cdb54b5b52786d078c19bf0324fa43b9d1c49b942f8eedf7a6dab606b25a3913a80f6c8d7bb97d28a768
-
Filesize
23KB
MD5df9e90a38a99d1f609ba721a3d329195
SHA1ad8859c5ec7f591800c0d4b6453eb10167ae142d
SHA256ba17d3a66e3df85fbf8b82b500f1360f8598cd48a814fda3e552cdd995e6f449
SHA512e41ba10d2c679754627c348232bd8124a01eceedfe30c88b6f7ed257895a7b59e5149d448a68415c4d2cc1a5c2c32a575f032b764a14a2330d62f08ccb87de85
-
Filesize
23KB
MD5649e3b7d4b114213383aebd2dda0308d
SHA1ba1ba5acb362cbab817c5e1a3126d6ebf600740b
SHA256b15dd0c332b261d62a0b37b8981980a15e47b4682e6985e26f155a85f19e1466
SHA512e667462ba457d44982337edda451a5d78eb4b6eab2e6a696ca333bdcd6688873e2c50b45e464e333ecf9f5b07dc35412bc746ff187b99e8139f9b8ef0456849c
-
Filesize
23KB
MD5b72dcda47e269f98aa6998df1b27b3e5
SHA18a68318787497d2ed4ee6d981de825c874bcb603
SHA256b9aefe9709a17fcaf8b85168c68f42e2b57f8214e7456a82c74495b815dc5bfe
SHA51217b00481db67db8bf8f07035c760eb7adff65d59c532711d918bb1f2bbdbb6230cd0c583f3418102b80b6a085d45d3e3efe9a641e7dfa821c8a18505e9bb1420
-
Filesize
27KB
MD5d218fcedc1bee50c45f4e786c6d60564
SHA1c4371579afbfae000e5b9a0ce07472be17badc9f
SHA25613266c9674e9c663252ff2dc1a014a86cbaa42801d210f408269bd1dff681440
SHA512efc30d116515ee000084db671a4c2d68551035b5512e7117c3c53d6ceb2b0418ee2ccdb5f76fa267be48e37d21a950e20423f95fc4e1c4d2c9e5fb47b692c882
-
Filesize
23KB
MD52bfcd1d1b70eef1a10c939a4eeab5403
SHA112656ee086124eaf205a9eb470a78bc5e3d2512e
SHA256b0919c80eb88d5d6aeb7a6eb42344f40ebf6bf0914a45045d9606e2469f15132
SHA5129143ffd7e00f4168f78f72e9e08e6a901ffc57a1bdc07531d73f0d4fc59ae2a114d939bf2a60313ac34aa835e6c297168f255685cbd795c748fe9c8906d2215c
-
Filesize
23KB
MD5b3a3f902a5fe7b70c988aebd0e523d53
SHA16fb07024c76cd0c4e07c3d0efa088b74998d59b1
SHA25661365671b9fccbc10c06ccc0d4c8875dd98ca51e8d3eb77e91069b1bd11e4a96
SHA5123bc057781870932f9703561bed8f786af9306a6a237582551edd12220e95521b8433a507ce702fa929654e930d0cba976eb0fc72fbe567d44620232e18390ce9
-
Filesize
23KB
MD5a6c34ff1ecc9abc954922c5e569d7912
SHA1910709fc703f559d37ea6d7d75ee13b62cbb4290
SHA256b71658e60bfa69f0bbcafbc8df40b118e9fc5df747e2069db0ac18b66aaab818
SHA512c0612a7cfe143c22d9945e287a4be0378b808e974a845ba762bbff028080eb6149bf5451d1f7aa0c2cea74499b82007dc730ad51b0b2db4b0f8fc11c03f8e20d
-
Filesize
23KB
MD51b292e0f2b2d1a67d2032b5414c280a7
SHA13f42ab6ad2c6fc52d11d677c1287c58bee3d0a37
SHA25660fa39cc05a21ce16a8651331445da1dd0e5e6c0194de819b4fa6a245f517396
SHA512b9f6da412491d9919cb8a33483147c608d30cfa9651f326aceb96c85cf5163dd85a434ed8421cbe9a6d355df650564252cbae46a4b340459bb3d30f616e244ed
-
Filesize
23KB
MD564350026ead6e66e58759314ab2b2c8d
SHA1e81696c0cdd81af0af47c696806e745283538c94
SHA256f30dff7c389fc5143475a99945eaf9f2e36f2f50709e256c990b10459e32b8be
SHA5126f55429adaa2107680c9d67a15b8094346b5bf295603ec7b2cbde7698d1e1f18436b6b2303b08b83f0177c77f877a33c16cd88cad13681616c0f9c3d751eb7bc
-
Filesize
23KB
MD5f51c295b1f6d6845be84a53ac650e0bc
SHA1edf0d80ea2c7de134af5d1da1f07f7cd33d9d972
SHA2566d85722c07e91050b89692e647c8c9c6fec8c39a998286e0084a4a20619d956e
SHA512f84224a40bf12cc61ee47607fb3d367135205d7f26667de6ac930e7fda064d8322c0279fe2d67da92d8e017b9ede8a14ff26c050c35347112052e9fa840c5c3e
-
Filesize
23KB
MD5b20db974fdaf13d7a6c518c8cc4d124e
SHA13939b029019a583c3a65ae0e3bc2926f0889cc11
SHA256c7253d57e123911ca6a0cdc8c74f103fc048399224393e97bf5a2a993cc13fdc
SHA5125dde8bc5f30b69c98eec6d4d279bf1b1747ae119b8ddf8e96515d503c7937154e74bb88d7a01ebcb2b15b0f3fc2e74344c8f0df7add45af944028e3b3cba8245
-
Filesize
23KB
MD5c5c07cce6b571f4d566fbb2dfcfb009f
SHA14379f23072f145b3c31631faebba76321713e454
SHA256dfcea447a3436a3b36287becb215633e73760de7d1df88dd24ce0f998aadf597
SHA512d7d53c04459d373659056ed8535982ad6c558cac6239e9fef51074e8479b8777eb2dbdbf63678868f5902b6414a446b46d9d9acb9d70f3bd3dba5cba9512d982
-
Filesize
23KB
MD538949794f4b5ed88fc604583ae0c9b1a
SHA1ffe2baaa0dcf56b56a726e314795e70d23149fe5
SHA2562dcec9017298d32b92223c0b9125ecf15cf330973414b3e181a9dbbbd74145d4
SHA512001f460d03b71f52cda97f5305b15c5fc40c1abe8c6deb429ecbd15d06a4ed26f7bc8cc491629cea14492cf13e22c1817312978b6095ee06b1592004a361818f
-
Filesize
23KB
MD53d9d3eaad4d1f94fd099877e3c3574ee
SHA13dc985619b35e8d8bda17bbffe3fb9d73c697998
SHA2560986c9945e4db6c7e5bf42556f28ae54afafe5d991573590bffb9c494deaebdb
SHA5125fa46bbd7eb1df2f5c233c70f5a4adc316b24e1de7e91c608d52f537a1ffa6d5cc8b1b4c6b4880b33acefb8236d7676ef50527b737ac23be968e5bdbdcd2f368
-
Filesize
23KB
MD5fbb8d74d5ca41920f285ed9d4634d501
SHA1b1157ff444075b76bc3533b036793bda4afd96e4
SHA2567748f69d1f67fb4afa2ebb9712687d0b9235346d35909fee80dd5cb776ce7638
SHA512a7d6ca4666eeedc5c4bb3db07919c4d08efa67638d0cbde7cbaaa5f40a59f2c61745fc129e882d47a39a561ea78aa7ff309286921945d940ef26d121bc865cf1
-
Filesize
23KB
MD52da80fbfb025423ba529e0ed5d396caa
SHA194eddff83c93411c0fb48101177b238f2cbabdb6
SHA256a074cc02be4cfa314ddd7223c288b1a71fe74143c3229c7cd30fb309419d7aa6
SHA512c23e38776c826f1f2c9bec5ba2b0fd0366d1afdb06b805749814472a362f0fffaa5231bd678af17ecd7640333c5af4f2607d976521f649053ea3d24c8e7e9c9d
-
Filesize
23KB
MD5724d2fe0b0268b30e7db9a7488f2b306
SHA16cccc9bab72e205f18bb5485619dd3ccfe58202e
SHA256074a6052a889456895d4eb8d592088b1d3858d3f6cecb884c528e74400710079
SHA51237e6f1ddb7d57aea23da10d13a3690740babbd3634d2966a3377c59248e75982a7fe2ed5197c1ba97d7d77906235c87d78067a3430c6d45dc8a4e5fa4d7e6409
-
Filesize
23KB
MD5189af34aa567cd8ca0d18c1dededd39a
SHA10f6d013f294b267a0aa082ec3d422cf7eec2ba96
SHA256bb2576e861a0c507db9ab2a29577803d7258eff03e52dc5f36faa51249c892d2
SHA512e294e462cde5f099f2b3b6ac14b3771ada2ca1ec26ef485712698a98e5f4c4298a4ffed2e8cb99dfb096adf48e368ef50f30d7a5652a67fa16b250c7653d8580
-
Filesize
23KB
MD56e55ff194d5bc03a8ebe89c7b237e10e
SHA1fec152c0e14bdcee73ce234be9b5bb1608b85fd1
SHA2569f3a2d40be41b0c47fb03df21c4f7e4120cbb348553b642c5c80b92c64b3b357
SHA51218d8353f171a34e29674dcbff59f4db7e74857c3bb2155215d4179c7c94be7d85d43552f256b002d0e72fcfc3f9d9c4999ae83bf4599c4e68c808419e1618d8a
-
Filesize
23KB
MD594eb94712d2eca213b446f17c62380f3
SHA190a32ddb5c5c3e8757670ebc75ffc237de12f2bc
SHA256902ae18339560e5142c87f97e9574864b518a0ca4572298b418acadecd8ac6ad
SHA512a9d68a3f68532f8b3e698ad6aa7303ad9c5fb838bd61444f415e20537c76f463d849d3b458f5fdd8f133e46083a3dff93ec6bf48d77495beea27ce342b1f84dc
-
Filesize
23KB
MD5747bedc394cb41b6a0e1b94b6ea8693e
SHA1e6388ae7dcd0df0396e6cfabe65be85789bf72db
SHA256ac30c50dc71795c7e0419389f15bf7676718e23f4b786da2ccd4103f24198656
SHA51215814d5a904fd9d8fba2eb451b27c0f15d892afe98edca36e3adf55fd2df5d516012eb104035aaff0885c5dacc784c44a1f2df3f8a59324483bcb86c8b213bf0
-
Filesize
23KB
MD5d2716cd25fd6ac67580982c8efb5629a
SHA1199c6b5208331881e9425904e345feaf1af45b82
SHA256329149e3a2360b9e4231ebae9fc3c467d3c560195fc3bc5d2fd31c6a5fd65da5
SHA512cfca74a6b909bb7d1e20487c4c3bb8e20e9970b49b14fe9d693c5b75fc4b83d8dcfa4ac085fc8db4ed76382266c934939b4e41a70d4ec5308fd8c7f065ccd95a
-
Filesize
23KB
MD5b4bfb5cd23ca6f9ef9dfd43f70e8bba7
SHA12ad09fc7c204d74b4c3c67710a72e10b699d7345
SHA256e3d05dd8f99995cb289b3f86eaaadd99a0b1ca2e12f0a0db22feec335a938111
SHA512023d892f449f578c68074a77b46f7fabc4688a276fb0ced6b1eb6c91037f296776e2ddfd81e71c4f8976285b2e1d5d35bad2fe0ee93ff661b78d45fd34cdf476
-
Filesize
23KB
MD527262395d098572d6babe49373d357cf
SHA1b6c3bcecc99ad8d03a4b8672422a5aa5199eb297
SHA2568b2197d96a4a01465e0062d5854a940232734123536ebd3c4f4116efae772688
SHA51242e1b4ae70cd97a50b6459ba0f9375de0e1586930c8b9cc12884794de1da905fc7d766811785a98f81f13dc77cf8ba6aaa5ad8592cab4a5b873df9027fbccc82
-
Filesize
23KB
MD509a4172deab1aab62c3eabfe126b2cd1
SHA15ecfb94c505258be83a471a22979f7f85960bb02
SHA25656fb8c7b7d12814ab0f5fc2eb69dfe98c3e9d00dc554a5e00f2ffdf9fc8728d8
SHA512e31adafece4e16a76e1cb54d92d82edf441e5c5e3a9c8c68d63bda6f9014705b3a9eee4502bb492b09e3384029878ebb28b82e5c9caf95f8fcae8347aba6dadf
-
Filesize
27KB
MD575f7dd0261c0a7e89abe0971a6f7fad1
SHA1a657010c0896034178caac01093430a9b550745b
SHA256d8f04afab237a0177bc3062c6508c57f884c23013985d3c48af26b7c25028949
SHA51207960af507910ed1366feb86487b3eb0d942f638eaeba85e1fb1bcf1dba09359c95ca93488cde969259b7e0b78df8a418e62848f49f40d3cceb8cd5f52bd5760
-
Filesize
23KB
MD5c1da1a8ee38c89a989b8a892edf48099
SHA10a65c36944a2c2e210d96ca394f5065dae34f665
SHA256f2d19e04a9fe1a382fe5c492501236a0cadc9f106036af8496a8f24457a3feb2
SHA512085acf718846bed78e73908481aa61b3bc64ff8dd7117baa556a535b5f32d304a2f6d20cae06b0c43ecb5c934bcff4758095a0638aac428a98036e91d3047908
-
Filesize
23KB
MD5d2b88081e89aa26e825b04c15ed158e4
SHA13d6073d8ca42ef7fd671856cbe7eec20bd78da23
SHA2569da16f7fb466e63a5ccc24eb7ee95a80ed4216e925545a59fd6fb5d7236211f3
SHA5124544ee07592758723947b039e7f4712c0658ef40942355e3424838aab6382c110366c9013cbd042a605bfca73b6535cedcd146db8a6e850bdb5a50f4132135a5
-
Filesize
23KB
MD5295a7f69076e8e789860bb3d566caa0c
SHA14d7ee1025ac08ce85f95c620949f9af9a0b8ad3d
SHA256516dc0852025a741cf5cfc6be3e4ad791d4a5aa692fa35498ba7b5f146d54a1e
SHA512959d1171c77a0c7267d69737c781c0e66cd9f513a6267e8e5c986677aaec4facae8e024bdd0a3a6ed4905df116e5d80f706d51da0a3cf26cafda2b13bcd86c14
-
Filesize
23KB
MD574add032773802678bbfec4d07c2f95a
SHA1f30cd5da7d9768696d0d57cde1ba7141804ffb0d
SHA256f55be8b606d5715e54cb795b822aa295c4e0e92170359fedf0f72c1fe07057f1
SHA5127f2e74a2d158588aff68ea5a23237f5a08d75ee1dfc72c2b8ba4c1a172cfa826eb71ed3dafe524dc6ca4eb4d96e2d1fffc6a39e85caff5aeb3925af761623da9
-
Filesize
31KB
MD58f8dbf4eafbef6a3c488bfca1529e06d
SHA1a8c916c20326aa6960e46608daaa39fe09fa8138
SHA256f1d44a0a83fa84f5fc9a05008f57174930d42db834ddadb3e9df7650042961fc
SHA512ebcff256e4f9a6035a02b05dd6ba6d1c652151d76a5b553495925b692496c18663677dbf39a7d7827af9d13cdb81c4064d9e21b0fc0123a65e0432736192c3e4
-
Filesize
31KB
MD5d099dba2a0c6e5a6e53bd09c4d09a23d
SHA1e925991619eefffbef71fef5374cb4f29c0c046f
SHA2563b6f668eaa9efcdb8b36d57747666fe76aa4f3b7873ae83bece0099f105bc145
SHA5120c73c00a134895bbc563676f9314ab2190fed2db9b02d5c9500b0f735dcd37b46c262920550eb6959324499dc9d0337fde731e1221f8d1185023737401d51745
-
Filesize
75KB
MD59a786144e410dfa13579eb73a375d918
SHA1811d783ea1d4b799e6ad51ec5720fa9e9b60f158
SHA256c9dd515e999f64af123f396d3deddc49012011060c843e5edb4223345143b0c5
SHA5123877ebbfc62ea741f77ac1ef04e969855af17ccaa2e3df9a18895b794ac6a3dc2bb4ebb8b46aae5cfc5bc032741f3dcb8a6df8631bf169ef7457b13c8b277620
-
Filesize
23KB
MD539cd364433575b3811f032005c229e5c
SHA16f8789d3191cd227375395b3d47837cc21d2baa0
SHA25617394645fbccf060d02902c9aa9522626383437c1dd83554e3ac564e50f62716
SHA5120fc2e80f5656624c2bdd7d847a4eba23cff81e47313d97da09ef76e9287ca96cbc60809232417957cd2c3078b87f8da353ba11c62a37df3a2d17369cd8d7ddec
-
Filesize
27KB
MD5af184e36ef33584a5af2e23ce8d90c91
SHA15b518eb0bb17d45e5c7e2cb3ae16d5cf981a54ce
SHA256b350748aa75d4f06e11c228161e1e94019b38aab9f5b59ca84db27acac00442d
SHA5124190753f181c24592839bc52427ef65237ee8ed21c58d04dc9d5d4c52f0f9a00bc98443e1608ea665cf0fbf9dbec5b9be7c1d174c687b0ef8c47541605b2bff0
-
Filesize
27KB
MD5977d803ac9d935b15fbb8d96f920bf3b
SHA1558ae5c0bb4daa27e4e97a0e07a729c379777181
SHA256509e51146b6a3e77b82cb786e17d4d52e398064446c469a45ad0c087ac5df270
SHA51203237327bc1e9534c9d82671938d3f019be7785f8727772d901cf03a3175b0118d6952c32ce49bd2b12160077e997e41ff140b848199bbf24051d5299a6ad74c
-
Filesize
27KB
MD54eb2c6779a43c3be314c37f4ce88c647
SHA1d6a30623bddc2436cfbd56b003146f98a4bd36a3
SHA2569b05a59ea3bb4365385b718be93faee0f4d8470f244bf32ee21a4fa23b738076
SHA5121fa95a9d690e94ca630ad9c9e7bbee441e3ab48c2b0022ce3d324b5f0275aaf718750d988de83ef751105f7a0663633b4a8f632d95eceeb81e9d5b394f555a17
-
Filesize
23KB
MD56f44147a91b963156f9dea1c98716aee
SHA1008013027a74b8d01a8919ec6cf87523e0f4c195
SHA2565b631c6ad94a3c4324441218a56e40e787f42b1b4dfeabc62219108e1f94f909
SHA512ebe7ac4124a7c73964c3e6f83f7d6e500b406c8b986fea3f07f8f2fd715cc3fd4a2415a4d5944e72c12f88209d262427809be41849afa7f0ab5924a76da09378
-
Filesize
23KB
MD55a7d13e6bba89541eec057d688873fe3
SHA106a2e58128cd5546307e1f460b541a279c93be02
SHA256342c302523d87300f0681385079d43910b955dfbfa9cbcc0294e9d7082737845
SHA5128a2417797f99111b0126a69e061378ba0b8402e86a41d20798f974cab3b7c996553e5b0d3152a7ae369f945844a99f965e6fdfffd0483999174ffd79662d6268
-
Filesize
27KB
MD5860c422073ff7fb5ef9b2981a29b1d7f
SHA1b62651108a60afb5836a158d977fb4a60bb7d950
SHA256661624d83863560b6631e61bb059ce12e4a81c264b278c924b0fedb64f531a91
SHA51258af3c15d7f9fe401c0fa2d4571920227cc790d2458153b04beefb9054c13b06c9c3c8af4c6ecc0298b94802e6cb7a1f69c170be540b8d2e83ee03d0f4b54096
-
Filesize
23KB
MD59d49b90f5f2576331cd4a8e341150b00
SHA1da0e87790579dc685f37c9e7cec96b5f3e4668cf
SHA2569115fe3d50b3002921f4e4d00454b671ef5f632e13efecb145ee179d46ee9ef0
SHA5124c1ebcf0c1522dc806ee2c9f6889eaf075a57665025132d4a5d18a266a0c037e306c13f5a4bfd361a8e90f4df4cd7885dd6792ce77a7ab727f50d6e670f1e04e
-
Filesize
1.4MB
MD5d1a09e0f93f67fd004c8bd8b27a0a9d7
SHA14882f2c4d31516b024007a316fcb095223c9d662
SHA256b859852cef9d62d7b82d5e2db18e98c33361a308223051f72cfa77a29aaab557
SHA5120778a4547cef5598af335ae683daddf980f6043c401381dd753a57655de34ab7066e2ae21f873b69d487121605950644ee9569a9bffca2fe3bd5a7627382f9b5
-
Filesize
4.7MB
MD5129a6a5b439700c7992caaaa1913c3ee
SHA1658b02bec515977a0bc2218e7ada2e55d917f43b
SHA256e52b155fb6c915d1db04d48ed8dd7025514f81e33d0d86d5f0d71bd1ad92cfc8
SHA5120f85412f9ecd2aabc7243e8bac805e68e84e044fdab4f5cefff3fcef79f31e5ce0db3edffb05de8179898992b80a27497dff7b5421d9ce07dec14ee7eadf1b7c
-
Filesize
469KB
MD5a5fd94ff62f8da64198c565906f24f33
SHA127bf7c895e9e6ac3dcbc89bbca913f6324042e92
SHA256e0c1cc83d6f0e0bb228993e7a46f026b5a904aca03d5fa237e1a4c00c00c7a8b
SHA512b98cad6d884d2971ffc267055f5cad83c122f7828e20d899b09c399bfc7577ed6a4b8f90c38d0f6b3e4000f895a5238d521e82700cb0aa610ebc8bcec31ee822
-
Filesize
7.1MB
MD5bd25190140be582a0eadec4ea303794c
SHA174869deaeb7c3c8b5948bf561ff34fc2eb45f8f8
SHA256f4523a293f4a4f8b656e7db31f0b7ccf01a83d62e4665f00abd3c290d564ea01
SHA512c60bfd0b25c2c8986f443b01affb7e6c1a1a1dc59bdd2ac094542d98a36105f723573acdfbe76ecec8c5c8669a2b7448ee5211285074d80c4fce456ea9a948bd
-
Filesize
555KB
MD5a0b8c3ce44339ae58b4124ea54b8c942
SHA168467b3bbf03aaefef39b5ba006fae83cbc48f57
SHA256e84e94e230782a971a121103861db6d6877d2bce1308182650177cc251d08eb2
SHA5124000356f858d0951884158f62bfc229854973ab72831cb30a9bc20874fb68451e8b22750f23d6a397fe32de85c3afe9df0917760478c9784b54b2a7bd717c0a5
-
Filesize
806KB
MD54398179b668c70f4464ce9448fa0bac3
SHA1a12848d2488fbd31a2481922664a2875f162bbdd
SHA2560ba4d3049449403e1966cf8922ac5c2e6130fabe72c0cc6b3218da82f9110ac9
SHA51298db440b4c220a9e71b60104c819c402bd88b6c10b9ed518660e8550884fa518e165bf20ec2d85a4bb5c379a28e9524d4b69dd25dc599e062498670fe8f28bc5
-
Filesize
361KB
MD59734b8f1dbde2e34f012deaad3d0cd54
SHA1ab2498ba3976fc5f1b1debf1861a49bb5d31458a
SHA256b0878682d846a4a3d8b953f237304a43961fda731f063b39c01c95bada04a091
SHA5127deb0cd1192111ae92f2b2c624ba23db4e5821d305b08e9839120a874c83cb2ca6c48bca85ec2b91300dcc0145472dbf54345c6b6457a84fc62ae9f635282f21
-
Filesize
10KB
MD56687a9536e501b61f26fd6f63d744ad8
SHA14af2186269c7c9baf29fd9036d33cd1cec0d8ea8
SHA256df34985d178446b32a9627e3cb227082b578247e367238dea40c968b6e34a05b
SHA512a02d3584b54bbe602e94b229da178879ec59130e002b9c099c4e3fb33a6540c5ecf03d5efaf6fe30d322c06153feaac0f0bc2e24d0ddbf73f8e54a1b446a3d13
-
Filesize
2KB
MD571e57f83cf8ae6ed35942e6280e7bb6b
SHA1a8a3a02c7d6ff20bdd7dc8e4b42e1ec141fede7c
SHA256d21bca93c464e992fe5b4a5cef5335e340d8572be887e0feac732fed92a534d3
SHA512c9d9d66a2c27166b93beaff852e6b0b9a69abc5653f4a09d81e4ca963250ded1815b2752cbfcb3619d161fae82a27eec4ed9a012d785b9755cdc3b24612ef3b7
-
Filesize
465KB
MD52e7a43d569c43a958b03da23d0951ad3
SHA158e257768573074380e479920c9c6dfc8052ea7a
SHA2566ebb9c7979384493df39adc7360e623ddddc48fe4bd588a63db256b2e2884800
SHA5129a31b517b251d40c20cda4460fba71b7f327c7931f507b1641d5b20c704d4484575bd4cb83be3bd2dd9f60bc5fbda5b0a8e50701996bff42a41ccea9b6fbc3db
-
Filesize
9KB
MD5c1b0eb2527f93eb50c9307c7992a6892
SHA12b208a9af9e0de3537bef137a7f2bed01c9d814b
SHA256919e50219d0d8fcff77805d4029a77b8e71912ab05684dca287545de3835a288
SHA5121c60d3a523d764a74ab35c5e9c4874291288c5570410f8c6e1c4ca8ed9149b001008ee0c361be4160f057bc725447aa94f9e3100ef7ebac9e29152d102190b37
-
C:\Users\Admin\AppData\Local\Temp\package\tmp\graphics\[email protected]_
Filesize15KB
MD5577b7286c7b05cecde9bea0a0d39740e
SHA1144d97afe83738177a2dbe43994f14ec11e44b53
SHA256983aa3928f15f5154266be7063a75e1fce87238bbe81a910219dea01d5376824
SHA5128cd55264a6e973bb6683c6f376672b74a263b48b087240df8296735fd7ae6274ee688fdb16d7febad14288a866ea47e78b114c357a9b03471b1e72df053ebcb0
-
Filesize
20KB
MD500bf35778a90f9dfa68ce0d1a032d9b5
SHA1de6a3d102de9a186e1585be14b49390dcb9605d6
SHA256cab3a68b64d8bf22c44080f12d7eab5b281102a8761f804224074ab1f6130fe2
SHA512342c9732ef4185dee691c9c8657a56f577f9c90fc43a4330bdc173536750cee1c40af4adac4f47ac5aca6b80ab347ebe2d31d38ea540245b38ab72ee8718a041
-
Filesize
23B
MD5836dd6b25a8902af48cd52738b675e4b
SHA1449347c06a872bedf311046bca8d316bfba3830b
SHA2566feb83ca306745d634903cf09274b7baf0ac38e43c6b3fab1a608be344c3ef64
SHA5126ab1e4a7fa9da6d33cee104344ba2ccb3e85cd2d013ba3e4c6790fd7fd482c85f5f76e9ae38c5190cdbbe246a48dae775501f7414bec4f6682a05685994e6b80
-
Filesize
4KB
MD5da6cd2483ad8a21e8356e63d036df55b
SHA10e808a400facec559e6fbab960a7bdfaab4c6b04
SHA256ebececd3f691ac20e5b73e5c81861a01531203df3cf2baa9e1b6d004733a42a6
SHA51206145861eb4803c9813a88cd715769a4baa0bab0e87b28f59aa242d4369817789f4c85114e8d0ceb502e080ec3ec03400385924ec7537e7b04f724ba7f17b925