Analysis

  • max time kernel
    601s
  • max time network
    602s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-07-2022 14:20

General

  • Target

    Redline_2021_stealer-main/Panel/RedLine_20_2/Tools/Chrome.exe

  • Size

    1.1MB

  • MD5

    92cfeb7c07906eac0d4220b8a1ed65b1

  • SHA1

    882b83e903b5b4c7c75f0b1dc31bb7aa8938d8fa

  • SHA256

    38b827a431b89da0d9cdd444373364371f4f6e6bf299e7935f05b2351ca9186c

  • SHA512

    e2ee932f5b81403935a977f9d3c8e2e4f6a4c9a1967b7e1cf61229a7746a24aae486ac6b779fb570f1dff02a3ff30107044f0427ce46474b91d788c78c8fcfbf

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 64 IoCs
  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Registers COM server for autorun 1 TTPs 58 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Redline_2021_stealer-main\Panel\RedLine_20_2\Tools\Chrome.exe
    "C:\Users\Admin\AppData\Local\Temp\Redline_2021_stealer-main\Panel\RedLine_20_2\Tools\Chrome.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdate.exe
      "C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"
      2⤵
      • Executes dropped EXE
      • Sets file execution options in registry
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        PID:4700
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:4572
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:4740
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:4720
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{383B8DB5-BFAA-47AC-A151-18418926C24C}"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNC4xMSIgc2hlbGxfdmVyc2lvbj0iMS4zLjM0LjExIiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezM4M0I4REI1LUJGQUEtNDdBQy1BMTUxLTE4NDE4OTI2QzI0Q30iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins0NjY5ODE3Ny1FRkMwLTQ3QjctOEEyRS0wREY4NzVCMDJDMDd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezQzMEZENEQwLUI3MjktNEY2MS1BQTM0LTkxNTI2NDgxNzk5RH0iIHZlcnNpb249IjEuMy4zNi43MSIgbmV4dHZlcnNpb249IjEuMy4zNC4xMSIgbGFuZz0icnUiIGJyYW5kPSIiIGNsaWVudD0iIiBpaWQ9InsxNDdFMUEzMS01RTQ5LUFDRDQtNzY0Ni1FMkVFNkZBMjJCNTZ9Ij48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBpbnN0YWxsX3RpbWVfbXM9IjI4MjkiLz48L2FwcD48L3JlcXVlc3Q-
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2680
  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\103.0.5060.66_chrome_installer.exe
      "C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\103.0.5060.66_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Windows\TEMP\guiAF5F.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe
        "C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Windows\TEMP\guiAF5F.tmp"
        3⤵
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Registers COM server for autorun
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=103.0.5060.66 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff7370ab618,0x7ff7370ab628,0x7ff7370ab638
          4⤵
          • Executes dropped EXE
          PID:2288
        • C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{753729F4-28E0-460C-A0F6-745EBDD33634}\CR_1BFBD.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=103.0.5060.66 --initial-client-data=0x238,0x23c,0x240,0x220,0x244,0x7ff7370ab618,0x7ff7370ab628,0x7ff7370ab638
            5⤵
            • Executes dropped EXE
            PID:3408
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNC4xMSIgc2hlbGxfdmVyc2lvbj0iMS4zLjM0LjExIiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezM4M0I4REI1LUJGQUEtNDdBQy1BMTUxLTE4NDE4OTI2QzI0Q30iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins2NjhGNDRDMC1BNTA3LTRBMTEtODgxQi0zQ0JDODI4NTcxRkZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzQy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEwMy4wLjUwNjAuNjYiIGFwPSJ4NjQtc3RhYmxlLXN0YXRzZGVmXzEiIGxhbmc9InJ1IiBicmFuZD0iIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNzgiIGlpZD0iezE0N0UxQTMxLTVFNDktQUNENC03NjQ2LUUyRUU2RkEyMkI1Nn0iIGNvaG9ydD0iMTpndS9pMTk6IiBjb2hvcnRuYW1lPSJTdGFibGUgSW5zdGFsbHMgJmFtcDsgVmVyc2lvbiBQaW5zIj48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL2VkZ2VkbC5tZS5ndnQxLmNvbS9lZGdlZGwvcmVsZWFzZTIvY2hyb21lL2Fjc2t2dGdkZHYyM2ZvNzR0aHY2bjc1ZDdrdnFfMTAzLjAuNTA2MC42Ni8xMDMuMC41MDYwLjY2X2Nocm9tZV9pbnN0YWxsZXIuZXhlIiBkb3dubG9hZGVkPSI4NDkzNzgxNiIgdG90YWw9Ijg0OTM3ODE2IiBkb3dubG9hZF90aW1lX21zPSI1Nzk3Ii8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMzkxIiBkb3dubG9hZF90aW1lX21zPSI2OTA2IiBkb3dubG9hZGVkPSI4NDkzNzgxNiIgdG90YWw9Ijg0OTM3ODE2IiBpbnN0YWxsX3RpbWVfbXM9IjQ0MTg3Ii8-PGRhdGEgbmFtZT0iaW5zdGFsbCIgaW5kZXg9ImVtcHR5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:792
  • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateOnDemand.exe
    "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateOnDemand.exe" -Embedding
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=103.0.5060.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a1745ba8,0x7ff8a1745bb8,0x7ff8a1745bc8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4480
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:2
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1324
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4472
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1756 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3620
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=2980 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:4768
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:3180
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3640 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4224
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=4060 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:1148
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:688
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=4836 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:4652
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4984 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1768
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4936
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4648
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=5428 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:1156
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4280
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4048
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5516 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2600
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4892 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2804
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2096
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5684 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:4128
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2548
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4124 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:4536
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1056
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4848 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1848
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2664 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3748
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1068 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:4948
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:2
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:608
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5828 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1376
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3712
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3836
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5716 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:4780
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=752 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1824
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5776 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3832
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:4808
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1556 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3308
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3748 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2600
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1740 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1948
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1136 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
          4⤵
            PID:2160
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4360 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
            4⤵
              PID:1164
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1136 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
              4⤵
                PID:3000
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1040 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
                4⤵
                  PID:3868
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1816,i,10462516265075415294,8004030782453283242,131072 /prefetch:8
                  4⤵
                    PID:2620
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
              1⤵
                PID:1980
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                1⤵
                  PID:1132
                • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                  "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /c
                  1⤵
                  • Executes dropped EXE
                  PID:3020
                  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /cr
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4520
                  • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleCrashHandler.exe
                    "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleCrashHandler.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:3728
                  • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleCrashHandler64.exe
                    "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleCrashHandler64.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:2936
                  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource core
                    2⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4000
                    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /registermsihelper
                      3⤵
                      • Executes dropped EXE
                      PID:4264
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                  • Enumerates connected drives
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3700
                • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                  "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler
                  1⤵
                  • Executes dropped EXE
                  PID:4568
                • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                  "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4340
                  • C:\Program Files (x86)\Google\Update\Install\{05F803CE-F408-4CB7-AE76-82CB23EC5A08}\GoogleUpdateSetup.exe
                    "C:\Program Files (x86)\Google\Update\Install\{05F803CE-F408-4CB7-AE76-82CB23EC5A08}\GoogleUpdateSetup.exe" /update /sessionid "{FA579D30-D50A-46AF-A7C3-44CFAE0EF5C6}"
                    2⤵
                    • Drops file in Program Files directory
                    PID:2856
                    • C:\Program Files (x86)\Google\Temp\GUM2E50.tmp\GoogleUpdate.exe
                      "C:\Program Files (x86)\Google\Temp\GUM2E50.tmp\GoogleUpdate.exe" /update /sessionid "{FA579D30-D50A-46AF-A7C3-44CFAE0EF5C6}"
                      3⤵
                      • Sets file execution options in registry
                      • Drops file in Program Files directory
                      • Modifies Internet Explorer settings
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1476
                      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
                        4⤵
                        • Modifies registry class
                        PID:2752
                      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
                        4⤵
                        • Modifies registry class
                        PID:4664
                        • C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe"
                          5⤵
                          • Registers COM server for autorun
                          • Modifies registry class
                          PID:628
                        • C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe"
                          5⤵
                          • Registers COM server for autorun
                          • Modifies registry class
                          PID:2920
                        • C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Google\Update\1.3.36.132\GoogleUpdateComRegisterShell64.exe"
                          5⤵
                          • Registers COM server for autorun
                          • Modifies registry class
                          PID:3768
                      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4xMzIiIHNoZWxsX3ZlcnNpb249IjEuMy4zNC4xMSIgaXNtYWNoaW5lPSIxIiBzZXNzaW9uaWQ9IntGQTU3OUQzMC1ENTBBLTQ2QUYtQTdDMy00NENGQUUwRUY1QzZ9IiBpbnN0YWxsc291cmNlPSJzZWxmdXBkYXRlIiByZXF1ZXN0aWQ9IntGRUY4RTA2RS0zRUUxLTQ1OEItOTMzNi1BMUNGOEM2NzFCMUV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezQzMEZENEQwLUI3MjktNEY2MS1BQTM0LTkxNTI2NDgxNzk5RH0iIHZlcnNpb249IjEuMy4zNC4xMSIgbmV4dHZlcnNpb249IjEuMy4zNi4xMzIiIGxhbmc9IiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3OCIgaW5zdGFsbGRhdGU9IjU2NTYiIGNvaG9ydD0iMTo5Y286IiBjb2hvcnRuYW1lPSJFdmVyeW9uZSBFbHNlIj48ZXZlbnQgZXZlbnR0eXBlPSIzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3864
                  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48L2FwcD48L3JlcXVlc3Q-
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3720
                • C:\Program Files\Google\Chrome\Application\103.0.5060.66\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\103.0.5060.66\elevation_service.exe"
                  1⤵
                  • Drops file in Program Files directory
                  PID:2348
                  • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2348_826190682\ChromeRecovery.exe
                    "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2348_826190682\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=103.0.5060.66 --sessionid={e8b8938b-e97c-4514-bfad-0f526fcf900e} --system
                    2⤵
                      PID:4064

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  3
                  T1060

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  4
                  T1012

                  System Information Discovery

                  4
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleCrashHandler.exe
                    Filesize

                    287KB

                    MD5

                    a2d8bef0cca959e4beb16de982e3771c

                    SHA1

                    5713e1542a47f5dab9d6c4fb58092dea0c9bea4a

                    SHA256

                    aff4f2d3049b10893265524f4f1eeb297a60a9414f80ea3695bf1c58de2bc43d

                    SHA512

                    3df564bd32a3c5bcd91aa6b71561c79351b462a33e6a8901c3a451d706f012ed077000f6cb89017ed6014e209e81fab414e90d54cd6bb6100c4f355108e7dd2c

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleCrashHandler64.exe
                    Filesize

                    364KB

                    MD5

                    30c7cbced8e3689e30299cabad4b9ac7

                    SHA1

                    2c8f9adc1f8b6fc53c1489c59ac59034a47f552e

                    SHA256

                    296f1bc3a9e0210ada077895deafb9969aa8073189f1f3eb0736e9e87d17bb05

                    SHA512

                    6cfa66872d8db974ae21324aa12b65e5994a334121d2a33e3ce680b244813879b4a59e819ab51df27febebab303d7dac1331420ab683c6e8035473bc0ebe31cf

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdate.exe
                    Filesize

                    151KB

                    MD5

                    82f657b0aee67a6a560321cf0927f9f7

                    SHA1

                    703175455354cdbd4244668c94704fee585a9228

                    SHA256

                    794cf7644115198db451431bca7c89ff9a97550482b1e3f7f13eb7aca6120a11

                    SHA512

                    5407eac0dc840aee05265bdc0810865890fed09d7b83ff0dc3f3e4ed4a322a3716710c35208fe8a95ffb0ab2a051e5305825c3251ceb2dd7e0cde6e9cc4f97c2

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdate.exe
                    Filesize

                    151KB

                    MD5

                    82f657b0aee67a6a560321cf0927f9f7

                    SHA1

                    703175455354cdbd4244668c94704fee585a9228

                    SHA256

                    794cf7644115198db451431bca7c89ff9a97550482b1e3f7f13eb7aca6120a11

                    SHA512

                    5407eac0dc840aee05265bdc0810865890fed09d7b83ff0dc3f3e4ed4a322a3716710c35208fe8a95ffb0ab2a051e5305825c3251ceb2dd7e0cde6e9cc4f97c2

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdateComRegisterShell64.exe
                    Filesize

                    179KB

                    MD5

                    396ba164448844fcd0c72dd802ac7db6

                    SHA1

                    51e738ad497fbfc289099444555180f4a123c39d

                    SHA256

                    f3ada0bb7459836ba250314ea6d417694c974445f0f7218ea8a48b60c557bb89

                    SHA512

                    e0c4b15fc23c7c4507e1b06767ba9170993f9dafd642d5c07e5693aa39dd760b8aa63ec21d694a849c70b7c2ece362e07d26983e24d90f7dc2ded8d86ff05646

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdateCore.exe
                    Filesize

                    401KB

                    MD5

                    cecfd51c91c3aa81093460598c5d02a2

                    SHA1

                    b5411b717d1fccaa166e795de6f6da0b422704b0

                    SHA256

                    a055856dcc22687bcbaa828342c851f87dd9de74dc5d647e7799d8ec4d7be0de

                    SHA512

                    a1b9e6938f4231dee231256dadeb00006c1f5d30f16f88644196a31692aa6c9ef02c32c94fc030a7c072cdc45741ed4cb89f09c14320eab63c4ad02e7ddfd880

                  • C:\Program Files (x86)\GUM6D84.tmp\GoogleUpdateHelper.msi
                    Filesize

                    40KB

                    MD5

                    202b7ec9d41cda7ecc9a5db38301ab9f

                    SHA1

                    16d3b1eb48a39d8161d0ebb54c0dfb32b9c66b60

                    SHA256

                    28280e562ea8a542551505a1944f98a723f31a18b1ba69f59431245e432d2779

                    SHA512

                    579490db7e77ee0553f3e2b4062cac1634f8ae7261e065f516e57df6fcadfdcb5b7b97296230279fad124139ba64cee7dd31b61c29b70bdef7a588974d7424bd

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdate.dll
                    Filesize

                    1.0MB

                    MD5

                    69d1bf5384cea587e6cc69ac827cc02d

                    SHA1

                    ff9895fe5ba57f1b7675c7f69ccc08365aafa02f

                    SHA256

                    d8f9c6a2e3f784e4a9c9dd714e1fbfea1883b920216dc01ad9d56700b17c0671

                    SHA512

                    3c0bbc042a6e51eeb4fc48b63a984b5e1964364fee3e94e0debd6e61ab806890bc1cdc9bfd2a672e55195d9ea1c2725792d826c1211badce6a7574760ec61df0

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdate.dll
                    Filesize

                    1.0MB

                    MD5

                    69d1bf5384cea587e6cc69ac827cc02d

                    SHA1

                    ff9895fe5ba57f1b7675c7f69ccc08365aafa02f

                    SHA256

                    d8f9c6a2e3f784e4a9c9dd714e1fbfea1883b920216dc01ad9d56700b17c0671

                    SHA512

                    3c0bbc042a6e51eeb4fc48b63a984b5e1964364fee3e94e0debd6e61ab806890bc1cdc9bfd2a672e55195d9ea1c2725792d826c1211badce6a7574760ec61df0

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_am.dll
                    Filesize

                    45KB

                    MD5

                    2e4a126b96812387b4b2287f0ac9984e

                    SHA1

                    f860ac32eb14282f9acb0beb8b17cb28c72d8ae6

                    SHA256

                    3593fb2cbdbe626f0162e2fd279f63447fb23591d68e460eed338410ea765f3c

                    SHA512

                    d7126dceb64cbc3daa42c7c1e5a4291e0d7bc61734704628c337ba150a51e1d6c5167ccd4bdca2f8a61be1e09d2cc4713641bd63a0ca7cf7a2245414e38ecdc8

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ar.dll
                    Filesize

                    44KB

                    MD5

                    73b513e081a75b2419a1e4ff96ea7a01

                    SHA1

                    3c076814f6e0d7e5ca77ca37d20b0d9f2a8ac4c5

                    SHA256

                    f2831ccdd15dedeeb7a097bcdb49ee31831274a3171f11809ea11c69b232b953

                    SHA512

                    337937733d4fafd55f5992bbba3960e5bb670f4cd87ec88e95ff28cfffc97f13d6ca18007c0fb769c1ac78ae3eb86f049a3c82f5dc69f5476c57ced894973a97

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_bg.dll
                    Filesize

                    47KB

                    MD5

                    c2ebb44d01d7a7d5b61aca6f82e16504

                    SHA1

                    e1a8e38eaf05234d9f10e055f920fdf1cd3ebe78

                    SHA256

                    d3f0fb94c9cfac96d685cc47e9456ad86d1b5bcf03bd0db11255d33a2a360adb

                    SHA512

                    df100a50dcfa4cedbc0c0fc91aa76e90dae9bc377a645fcc2e9dde18736b36016c796c5273f2bfdecc505a150edb705ec7a0016df6281f345f8a2fe1093dfeca

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_bn.dll
                    Filesize

                    47KB

                    MD5

                    685ed2907a9d297d86ba33667b760086

                    SHA1

                    e6b98c9a3980099d279ddbc2eea94b3bbe094a50

                    SHA256

                    edbaf1e2ac0c335972ede1be0d425e9c8be4c68e4987778e6ae28f046e5d0d9a

                    SHA512

                    c35557b4f91476d8daebd9b13b06ce489ffc4f2a9e47155036c29ba22724e436917fd4ca467bb870905733d3ac5be8f85c22d2d39027b13b92a0b2b4b09092b2

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ca.dll
                    Filesize

                    47KB

                    MD5

                    038ef0dee664c858cdd550e717849c9c

                    SHA1

                    33143772d5c8570e5eaa894fdc58f3ca9f992e9e

                    SHA256

                    6d682e1347068253231be39136da2774255f758a4c8dc056f06e2bf875a3bdc1

                    SHA512

                    96844cad15f8dffd024adab2657643e06bcb026334ea7c7a9940d0c2c75b69f3284f108c50afeb243e4042ee9eaa00827368a354b97edd4212046db4c977ebe7

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_cs.dll
                    Filesize

                    46KB

                    MD5

                    ce1dd611a19e30291631a9657afd96b3

                    SHA1

                    af7f28802081381b4fd8c707151d0664cdaefc39

                    SHA256

                    0a8166e3963bd3e754487c1b57e84a429e1c1ec483d273da5ef2cc5e3a6115de

                    SHA512

                    5b0d5b2732a14a08fb4509408142a481c23e323adea6cdd90d8fe70c0dc58b48c46d47387409129a4e6be83a76733041a98d30fa749bd0544e3d88694a6d3b61

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_da.dll
                    Filesize

                    46KB

                    MD5

                    db5b3a59d09111bcd39c20f626b474bd

                    SHA1

                    fd3e35d9d00f14b99b8aba065d71e8261a6d5fe1

                    SHA256

                    79ffd7f3efccf614f7a1ed8ffdb49623694bc1b179c6f435ca56464a0526c57c

                    SHA512

                    bd0e2556183824efc610b248fe595b6f1e34d194fc0bc652f29fa7f07443121f9580d025e8b5088f91b18c771d1c63c1a93a72707fc228e70ac1a2e5dd0c3ea1

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_de.dll
                    Filesize

                    48KB

                    MD5

                    53a1f85365b0a7e9f9b28171c44a057e

                    SHA1

                    3ec8c9ec9ba32c5acb120175bd0fc876695d9583

                    SHA256

                    9e3a8acf0bf2655af754add6cc10e12cfa10a68da256e93192644a4fe3c8c7c9

                    SHA512

                    6db953a72dd346aa491bf21afe8d5537e773abdbf2e8e99d8c0b4d07635119016b07db52228322a7e72b29781cbdb7234bff018d4b5786a00f4b3f1f2b37a6c1

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_el.dll
                    Filesize

                    48KB

                    MD5

                    d052cadd807c25c72886906a9efbc86e

                    SHA1

                    c56bd5d490c1b6997ab884cd8dc2cb18659eee40

                    SHA256

                    47fd4fa0a2ef55bf44d00f9abe231dcc053972a04b09e9ac005f37f7926498cb

                    SHA512

                    37371289e77233f2a225a8ffc3e36800e5416bd7a02d4f826e8fc117264bb2157a67d7425b05c8eb60365e3a93307c28fd1c00279d89d9e42e51474585c9d507

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_en-GB.dll
                    Filesize

                    45KB

                    MD5

                    4281d3c6a33aae2ace4fdd78ac7b6b33

                    SHA1

                    85a291be91118fec09a84572375b2a2dc255d47b

                    SHA256

                    ebd5c1b6f76eb41a59b1118a16a45db8fb45b32a0dabe5f919c5d209f1e4cf85

                    SHA512

                    df2c45ac7afad9ff9e7bda93a6760b8e014c8d5411b664eb0aa711ca2f35baae72b791224ec1cee7bf2a3fe2e604278abf2a32584a2cf05a1299ccf1cf975cab

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_en.dll
                    Filesize

                    45KB

                    MD5

                    5473d86e3d71ecbea1ece30abf01cd8f

                    SHA1

                    f5df20dd87ff904b279ab4949f25b72bbcd4a7ee

                    SHA256

                    b036bcb285a4eac4fe744b88c03a2e553132c9896d784ce95effb437973134ae

                    SHA512

                    be4590f12c5c9f83ff19a1f248616ca0eb0206af55adb8f326f3b70922718e804dfcfa32e8afaadc42113e0c57642a0d0db8c3de72df2b844eb54aa2e03691ab

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_es-419.dll
                    Filesize

                    47KB

                    MD5

                    babcc3d7ac72bb5fcbf504b960b7a233

                    SHA1

                    33d6338b41cf7908ef589c9c27902dbb2c8f7186

                    SHA256

                    fce66f6407d801d0a8b6d47c7286622cb5d800d7520f5c14ac162fa3145dbfc1

                    SHA512

                    2bf865df175033a33756cc4ed7681930049808b2ee61068142eed07e1c68e4581a81dd4238d7d2ebca27b33d7d45f4000bb342637c14a7275c8fa87684438073

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_es.dll
                    Filesize

                    48KB

                    MD5

                    c6b78770986dcdcf2e873059a33fd64b

                    SHA1

                    3dbf01d0b5288d1b54195b4c62ca8831bbc5f089

                    SHA256

                    69f67cc945fdd476b6d43f213da7a6cb35ac9194efaa50ee8a1c5fbfacac7c7f

                    SHA512

                    ba83afcc2e04277e25787634e07adf4d11199b400fc491fe1d1b556657b648cb5a0857b37a9f9f0096db9ef949a0971a55ea4f8900adc24fbe652a9c96fe2b3f

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_et.dll
                    Filesize

                    46KB

                    MD5

                    b1583b0eb3b3c938f5f16cfae1022601

                    SHA1

                    96df2af0f594d3bd101cd13d8b08ad5c30a52744

                    SHA256

                    82a6a6d661093a2310660e49a171b2bbcea4ad2d2485074b82c6969eeefd825d

                    SHA512

                    e56f02313351bc8aedb93e34784fd9a0d2f92c7c31c6e21d898027eeab6c15cda17a839f2313174627f88051bd306dd60bbb58b40ffb67ac7159400a73c7d177

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_fa.dll
                    Filesize

                    45KB

                    MD5

                    54649821e243e218ffa10802191055b6

                    SHA1

                    b5b74efe139ba8418b1c56c7a3241d395aa0a499

                    SHA256

                    5a397ab4774fd5a7f0d7e0d4871812fa92e2f9e5f595e94a4b652fecc29674ae

                    SHA512

                    e31f81434fd90d2b9aa5f7832052236ca56b836362ea35088e03397510523c8ff0d19345d71767a649f42ef1808f05335fd9b27020c3fb5a2ac33cea456e9851

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_fi.dll
                    Filesize

                    46KB

                    MD5

                    8f20a78be087a95b80f1162ceba79b46

                    SHA1

                    c76e0616b18b6f86d25cc2ad05e2ad04fb07f090

                    SHA256

                    ba9494dec1273c3a5f629e4cd0990beea6f35168ab940693fe179f111cfa9a9b

                    SHA512

                    a289c1c7b11b0272cf12004ea5190d2344ec044585fcaf0967e80f66af0c6d0f9208e5ed935b006ae875b4f876ff993be19a702bece3610e748f342ad492ffed

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_fil.dll
                    Filesize

                    47KB

                    MD5

                    f230b256bb15dc4d6c3c70895185bb0b

                    SHA1

                    5ea5242bc95c294a4d6ac7904ac3538998c175b4

                    SHA256

                    abb5511af0c804210152ade4e3d140e586932aa078db535f3f240f2ad8bf3c45

                    SHA512

                    eb9fdddd86825fa463858fea9a1ff8adae3fa6d67a27ff34a4704a9d503baa52ec2713d51b474a84dca6e69b0204d44fbfb452082d10a33a84ffff3e93066245

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_fr.dll
                    Filesize

                    48KB

                    MD5

                    77fd989107f16f1749b4160c1f0339f4

                    SHA1

                    c0897a9b5cedccd68ca9466623b73b58777ddf97

                    SHA256

                    816361339757f2f9bbef560c902d4207ce6328a3506570e9b1df1e65f77f989c

                    SHA512

                    1ec841b2f9d54ad9d9f6dbb5ddbe3a97d17b23b3f4ea45707803a1b61876b79f793bf649da5c0db4264bf2adfa32395962f91e8c2aeae4bf664d4b57b0cb1ccb

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_gu.dll
                    Filesize

                    48KB

                    MD5

                    f42aad7002e1a4ac1d455fa51852b32c

                    SHA1

                    5ddf112b7a9afc2baf26e3d6168458875efdb327

                    SHA256

                    215c700fac5caed6e5073e10cd5a07e0409cf0107903476e9a52dc5494ff6389

                    SHA512

                    73bcb19f50cc1a9f56ca1e759a3362cad150cb9e2bae75563429f611987c82c2e6fde56d847161f84fd6db071def3a8ad996a553a5d7061162ce34be2a05d4e8

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_hi.dll
                    Filesize

                    46KB

                    MD5

                    a5a40fde77ce0330572603819f7eab1a

                    SHA1

                    83bb3a9f1daf58a1d3e4a213837bbf9b996ad11a

                    SHA256

                    1e19516dacf3e895e632cfa6e863d4896a5847281602c16cf3995c107860888e

                    SHA512

                    90d46291506bdc47968d771194039472e318d1c6600bee8c71846080419d88a3fb96e8abcae4b7b0001a1eec7d91b03b0edd68641ce77e9417de3dd19af14309

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_hr.dll
                    Filesize

                    47KB

                    MD5

                    41b96846b3e594d215e049bc6e44e7d5

                    SHA1

                    1e607f3285feade41c0c5c124dc2cf00423007c5

                    SHA256

                    f53fa99736059d03ca35499f15d39be942d6f3633d47942e98a79d423aeccacd

                    SHA512

                    c2fd0106cfafad09f3f456e3248ae0afdc57649ccf7950efa2b5c371f948982f17041c0c25870e9a597fa9d5ce4f18f4ed9685af501db6290c4828bb4792788b

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_hu.dll
                    Filesize

                    47KB

                    MD5

                    3b8977206e495c4c64273009e5a57f9b

                    SHA1

                    b63baf9e295dfdce61e4668ffcb131a846346d9c

                    SHA256

                    d815413523556b0d5a872c5a8a62a80bfb939e52c9d319054ef8b54a68928bdb

                    SHA512

                    6427ab789f87c213977de0844ab0162f4c11f1fcec464d5451ef3e7bd69389045b1c9c93900ff2387bd255e800884d2cd2b914740c50ad46a6947a6455fd1fef

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_id.dll
                    Filesize

                    46KB

                    MD5

                    0abb138c12fdf76e83704895273ba314

                    SHA1

                    82bcf40e6b03dae0c18c17fb16a48da2c9b7a90a

                    SHA256

                    7e676cf463cdc3f7f8ab3e41edc5dab966a86681ec4989ecc74d460cd1d56b60

                    SHA512

                    90dbd5bf06d597dc909eb28061b0975b7b8d8f95dac5582e924fcdb645d9e48d5580be718b76ac860dd1793a19e868844341762fea6ab1dfd0d89fffbb3a96c7

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_is.dll
                    Filesize

                    46KB

                    MD5

                    4c954e97257e899d5941e190fcef8ca9

                    SHA1

                    ba48b1400694a9db0248c9b4d7deef01185cd1d2

                    SHA256

                    c14d1ce67e2a671feb5cfab3176cb0c73b31585ba32d40d9f21b1a892c1b2e20

                    SHA512

                    5a635abb9834b83f77d8703ef7ac2450b23a0c08a853db9f3c23addc881c5a6c9f091910c2e8a5e57e777e58c50a316e2c7c0793e01d5129f4ff8a87ef7e216a

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_it.dll
                    Filesize

                    48KB

                    MD5

                    e476d68395afc1f1468ea27e7d801eab

                    SHA1

                    a227eac261c10ea4e1c6ca2ba739050c0ed33375

                    SHA256

                    44bab1dc2526c25560493fbd4d5dbb8c0cfdf53f99cbb6b9ed0ba765fb39bcab

                    SHA512

                    8687e25fb9711a7575da95fc0673b5bba9600bf2c08491c94d9d3bc2b44bee91abb2f082e1b5988226e1a603b132ad0bd29a8d2175bf01aae005b0bc174cb508

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_iw.dll
                    Filesize

                    44KB

                    MD5

                    0da881f72338a4fb295a3fb837a696e5

                    SHA1

                    adb1f526e96528f38e56ca514588927cc747e91d

                    SHA256

                    8c7a9d6f96d007d9557eea5009ce20b7d1be0334aa7d8168d79c9867a733a932

                    SHA512

                    2a04569abc10e8a5acacb5411a008cf0a60223033e188be55def796c063e7c652690f0119e454d65e0f3ef464e3143d392d58aa8fdf6405bff72e88d353d7eca

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ja.dll
                    Filesize

                    43KB

                    MD5

                    9a2fc61130b68ee41476d63f415447f1

                    SHA1

                    504bfce2ff3bb536324f77d959675c98ee6fbb28

                    SHA256

                    a3a60744f7c4853eb7e44b1840a6d3def05f3bbc53dbfec0c64b0de5e8bb5e2c

                    SHA512

                    22fe7827b113f8c2834b9ca3e25ae62029fa57c84c037cccbe2f019007d5cdc5dce3f7df0367fce99dda2315689f5a2975e8b029041c735dbadf6e7a0689d885

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_kn.dll
                    Filesize

                    48KB

                    MD5

                    072f51e42208a3d311105ef2fd72a883

                    SHA1

                    75ffea6e1d95c0806b04e3f16dc5976f19ab2b78

                    SHA256

                    77d6d93944a212f7efb2455f46db20277e0a5a4fada9a04a0d7392c5aa30cc22

                    SHA512

                    33755458ca0f3dcd36dc02a6ae781d3dbb0e9042a77159ad101c50b19444adf6979a73c3222cb804b7dc111a6b6f30ea707da00b1a7fc21ec15ca9dec05fbbbb

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ko.dll
                    Filesize

                    42KB

                    MD5

                    33a88023facdd939c6c14cb692cd55e7

                    SHA1

                    d05c983d49667360d06926011b0f8095e5c2cba7

                    SHA256

                    5b5feaa8f9f9621c63fdedba977c24c4a4519b3966e2d6e445a0ec9b2caa8a54

                    SHA512

                    f846aef7a6882c8ccdce3cf5d641d67e2637e44dcb055597c29f8e8bc360807129f7a0d828f0a8f03cfdc5bb27f6b6c3f0a2e194308e0a9e21fab5f3583968d9

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_lt.dll
                    Filesize

                    46KB

                    MD5

                    de7fd22ca9efb8f45842bef8b0ddd8b1

                    SHA1

                    f9593b2d031a8976117ae31a5d2cccf1bd859baf

                    SHA256

                    e0bc1b946e50ad5aa24c016524da2e251530062704178ae0f51f9af02a89e1fc

                    SHA512

                    2f3b299efb513e6faf8e361cbcaff90652ae08bac138a1662996c33f0b299a65c50fc3570ae0b1cce0a2b131a19e7ba06839dd819ff7bdb1e6a687d5022bd7e8

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_lv.dll
                    Filesize

                    47KB

                    MD5

                    bcc3f87f93fa8c9ff8efbca84abd4f20

                    SHA1

                    72f26fdc4c1eb80f19d70fe3da883874fe1b3eb8

                    SHA256

                    fc52bcaa4081a8bf597b6cdca4981c9b29b59bac40f8307fa334a3485d2009d9

                    SHA512

                    6e170a630255f5921c5de6f1e159f2c1a9d10acde461798151406e2e560f29b86f118486e3c99567fe0a637e0f3d347496042485e8061ff4875d5fc8b049d649

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ml.dll
                    Filesize

                    49KB

                    MD5

                    c75102b45b2086b3508b6c1258ddb604

                    SHA1

                    50047a285bbd90c20a8ac11eaf041469446da5f1

                    SHA256

                    8dd0d64d6883c721087e0f58b5c195893f0fb2451468fe5eccc7a9f44f3d1537

                    SHA512

                    56de8616b579cc5e2204d5e0c52441812424fa9f1703a237e221e5e0495dd2c09436c9fab713f01471ee6ee3aa52b0a1c3175affd552cb004fcf2cb07928560a

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_mr.dll
                    Filesize

                    47KB

                    MD5

                    28d4751e027905c336b515ae1f3aa180

                    SHA1

                    07eb485efc3c132835cd281ee69362c2827c9c21

                    SHA256

                    3c7a123cd8bf4515b7289692571de55f2b40c5fe6962b748e276af3906199442

                    SHA512

                    98aa17583e46051164d851fbc6f9b474a626920dbfdbd2117b9d41e142577c05256d9c0eab001311af1d376441455fda43309cf66c50a75529b50829e9b05eec

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ms.dll
                    Filesize

                    46KB

                    MD5

                    867d3bd67091a1475a5c4fe054d82fe5

                    SHA1

                    33f495238c94ef6842bcf3f0dc53bbb9d8dc7080

                    SHA256

                    3cd843128bfa0053aee3c6db136e146b0671a6908e3b7c8403d262a168e81922

                    SHA512

                    5af3e8adede786575b5aac54300df82a399cdd6f9103bb8b15e59b5d8db03e6602d06e21dc8fbee5cf599c51a537dc6707f79094081fb0034263d63da8bbd63a

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_nl.dll
                    Filesize

                    47KB

                    MD5

                    215ca7776e35f174224c07596b91ef73

                    SHA1

                    ff5d1524082ee947a2a05dad454b0d6c5ee5025b

                    SHA256

                    a2264b70bf36805f4ce1c9faabb52863f445d4ec30bb9b0517f6c24f94c833d0

                    SHA512

                    ff9ebb9123eaa5670ad9178894664872bc2f2d290fed76431c56cc92f227dbef4beac3574d385061ede6546565b800839d97cb8f9507ca8b19f0fbdd7fa7af29

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_no.dll
                    Filesize

                    46KB

                    MD5

                    dcf2797b1d7a5554b2b133d0484e8b08

                    SHA1

                    a543a0bf5d3bb13ccbf47b0f399431a85f3eb215

                    SHA256

                    178736becebb2d2e1081f0a6345fff39b6c47a52f0f87a61f3c32827e7957e18

                    SHA512

                    3cefbc4f384156794776a92b5c4e7a5a51f01e14dfeb411abecbc9ebf1dfbc803401210409431b764629e040a32cae7ef2eafedcff776c01a11dbc625d11be35

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_pl.dll
                    Filesize

                    47KB

                    MD5

                    16767444bef259c44868446eb88bdea2

                    SHA1

                    6ff62515f34b5cc0bd369f3d272c6ef66c063d8e

                    SHA256

                    1e12db31f943e5fbcf44c408ab1dea16347eab61eb5851e673857842ca4f9ce2

                    SHA512

                    1640e2eadc19ac35429753abbb52f871810c18e42b2e149b1577164f78e0c22164552837931f5ede87cbcab487a363576bff27466bbd69e0c35b809838346665

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_pt-BR.dll
                    Filesize

                    46KB

                    MD5

                    87cf92508e25a76a073b0a016805f994

                    SHA1

                    fbcc75d7bcb5f588637a7b6b762bfaaef231faee

                    SHA256

                    e1ec02f7cc5c625d4b5dde602b66f2648c19b953ff3648867d90153f6be8c845

                    SHA512

                    b15a5c9c78b0fe9e8c82c88661fcb3146f6a4a1dd5c9092c08597e070445dfac0c233353acad86348ef24901b9dea43ba4e97082c1e582ad96a2393c44acf41d

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_pt-PT.dll
                    Filesize

                    47KB

                    MD5

                    5a45a26a54f413fc9ae3010432ac28cf

                    SHA1

                    79285198fe7d0f71397817f75190fd54c2c2e4a5

                    SHA256

                    d2ed2b685d8c5352cca042ec2df9c9ac9b3dc1129d3e0a4c09c31956cd0ae105

                    SHA512

                    1fc3f559b3324613acb0ee920bfe432728354efb7c2c59459ee44a6b14b48987b5b1173b4a7c34ee3a0eef970506b4517ec7aba25976459795292d0f44823a7c

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ro.dll
                    Filesize

                    47KB

                    MD5

                    427d15f9015a3a16170aa4ed86f9c8e6

                    SHA1

                    6ee82448c93a2f916d4cfd193510e0c745b7ee46

                    SHA256

                    dc9b3d58d2ee1ba9eac47ef0c3e91edfb749fd6b6c7395b16f61d334f95833e1

                    SHA512

                    7374ff2ad04bcaeb273d1ce6a2d8efd7ee47d235f9ebbe75166c69801dcebd7310ce46f1cd795ebeb231ba4ba902e58ad5cffaef0818f291382db50ef2f1278b

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ru.dll
                    Filesize

                    46KB

                    MD5

                    af3349f27fc5996c634bcc5545108a55

                    SHA1

                    46d0a57a2925ce027e7d84f78dc1592496bb4842

                    SHA256

                    5aac683af9938cc98996f153bdfbed7319fc08a406ef801119e3a64f77ec6942

                    SHA512

                    7ccfb2955b1dd40f9ca26e37af130e367a0fc11e87d97f54d57655785e7130ea060e67cff31d6161cb13cc9349c655cacf73b7f7dbd63edc71a1e60fbed04ce1

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_sk.dll
                    Filesize

                    46KB

                    MD5

                    5e41887a7a732dcddc9589840bcc9402

                    SHA1

                    df0913bbb0d3233f4724a3f175c6d91d7aa29ea7

                    SHA256

                    22e6c17f2c519dd9d0c878175b609205f4690c386d70e2636d4b83f55f31b419

                    SHA512

                    d38b72a72c595604880698f7db96459525a6929182f2d6682138b86217fec22757f427efa7d0038655de6e22e6329be53ffd24762199ec515f547cbe1c32cd4b

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_sl.dll
                    Filesize

                    47KB

                    MD5

                    c337b1203f9293549ba29e5be5dcccff

                    SHA1

                    9bb3b158ef3850e2b108aa6660e6f668b66db8e4

                    SHA256

                    e2991885badc9d7f2737e61fc6421e80b7adcd6e9dab439728200333393f9a55

                    SHA512

                    c6a6703609c36af7c9f3b891786260f146d2609122d77e41f8cf94541f3044a9bff6e0047f1bd0c4f74eec806dad50fe52c30e66e0c18874ccdcac4f6904db1d

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_sr.dll
                    Filesize

                    46KB

                    MD5

                    964bdde2f1023e01412898233d72ea9d

                    SHA1

                    7d4ab12b3e02e57b7b54caa6fe3fa253620cef60

                    SHA256

                    b8d502c1edaeb2a9250c0d3ed6ab180500be1a7e57cf20848fefc3b8048bda45

                    SHA512

                    6e1e4cec5786262ad264de7b2275aaba3b7f90152d77e2554c34a1423885c6a2a2b7e95985d02176b110047da90f94e9c8fc58509c384962aa440ccb13c0539c

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_sv.dll
                    Filesize

                    46KB

                    MD5

                    cb51bc64dc2e3f1976af760830389773

                    SHA1

                    ce709b7ed52f1aa44dec05f59bcca2d531ed6af1

                    SHA256

                    0eb33c5e897c3bd154e1688574a8bc4f876146306f71bc25dbd13d52b966bd3a

                    SHA512

                    1d3eadfc1414db49cfb92ba2bd5260a1a0f24d1419d87e826d5a0b348b00fd8a2328701ffd2e6b2164670d870d44db3b9c43ff5361bf4bb8e07cb331d36ac94d

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_sw.dll
                    Filesize

                    48KB

                    MD5

                    15a7db5d784745f4c8f06ad17c062bb0

                    SHA1

                    57b74b49067320b5a5f4370af91a62bc3b494ca9

                    SHA256

                    51fea2ef842076e85df77fc809330805574c19cf4f9723a09ae9ce24a92591d8

                    SHA512

                    67541058fa530c9903f5c73232758914e1d690bff46170528b406f8d80936b236476d02f0983130d3ccab1f8ce88e6f285bd1b14c15cd4078f74732cbfb3f4af

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ta.dll
                    Filesize

                    48KB

                    MD5

                    36c0dee9d410cef6dd3178d7fc405810

                    SHA1

                    2b983aca4501b218e4c8de285cdd51f5c9adc2d6

                    SHA256

                    0df14319ce6648a457185c5214eda3595da1001cd495d90743498435ff1348ee

                    SHA512

                    9088e940a4452a0dd6f46a3f91e4e6ba25bc9aa6a035c1ee79b22483081749983351745e33a9a025b199cbc26f7e993b7477c9fae7e850b29e4ffff517afcf8e

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_te.dll
                    Filesize

                    48KB

                    MD5

                    572cd004b77c2314d1cb46465b9d4688

                    SHA1

                    eb53f76aa2d451d8af39f52fcb39c6a7e55db0cb

                    SHA256

                    75df260b8fd23e411fbc3a5bfb968a7ff794c0aa46d566107fe2c17caddd8cfb

                    SHA512

                    72d754be1bf6c3e3ed151b5ea24e3f7bb6163d7cb5a16bc648317aeeedcb62d49080dac9e5f78ff498cd02af6353d8e55bbfe8eed1b951d77c53506c35819d2a

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_th.dll
                    Filesize

                    45KB

                    MD5

                    8b8efafaf5c073c6be9603695c66bcf2

                    SHA1

                    cdd5e44f807924d740391460d82d10d67af706c1

                    SHA256

                    f143cf5135dd81fae72cc9f061b1320a059ab9a20b263d1e9612b37d029f61b7

                    SHA512

                    855ea7968838b8f3268a78216d201b3ba02ed90361cc9eb278bc9dc43563cf4e54db3b996b00f61a21f56bb9beeb801ce95cdcb51d3ab562c966d9183f8a2818

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_tr.dll
                    Filesize

                    46KB

                    MD5

                    015f150b0ad7dc922ea562e3baeb27ff

                    SHA1

                    95c21f3fd767cd9671edaa58f1fe72e9cb43a748

                    SHA256

                    48a5de95d4db906a4f7ec74a1c30c9fa4311113931438c9df9c72fb8f7260e64

                    SHA512

                    0d83511eb4e4cd8d5f69be04419d5209490c44690cdab57392f87adc47d392d1519c4cd139952da85c06fcf2b2b5bde24abc3249ed1aa123fac20f849dcb872a

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_uk.dll
                    Filesize

                    46KB

                    MD5

                    1704be0e60765c931b5a2aed62ed2ed3

                    SHA1

                    e7faa3ae38bd5a47604326a2e627ec0bb61b8b90

                    SHA256

                    b8027ca5e88df6fbf11705cc312a63d5659d2abb0d826dcc21255b72efbfc681

                    SHA512

                    6d7c4e42892068b9eca01369b26530063a7a6eb58b9a7d70ae7f213c7471ff781d374494bc6c3794587ec1ef9397cc0a412a86d4a5c7c89dca7a9c906d57a2a2

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_ur.dll
                    Filesize

                    46KB

                    MD5

                    002e1990162182adc8b81a7e5f1a85e5

                    SHA1

                    efc017a7378b9bbb30e8afb12decf6f398d8d00a

                    SHA256

                    8d476b5e01268c462d994c0799ea4bdd01cbeeefeb546eacc8b51e2c1ddda438

                    SHA512

                    527a060d167e8423c7ee3d3135a2488ef39bbffe855ddf5e1079e541a967a9f9b161311579c865edfe65a826890b869ac4180e76cc50510e1ed1dfea597402a8

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_vi.dll
                    Filesize

                    46KB

                    MD5

                    9660f97192873e3aafb6e1fb0277a2e6

                    SHA1

                    16599e467ae5d46e68061e8bae6ac6938ea0a34c

                    SHA256

                    0dc040171aca029892b70963216071ca51caa5c3dc4d6372eb447414b0a00689

                    SHA512

                    6fd430cf62197cbb61135fb80f575a79661fed4f5fd8660883bc59332948b3a7501a19816438b90930e26c1f60205efdc6f6870704188b6710bc9c95083a4666

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_zh-CN.dll
                    Filesize

                    40KB

                    MD5

                    0ffb741c8ae9d5925427f6825ba73759

                    SHA1

                    47076a6cece60f54e9e6198ea020bcc24b8613d9

                    SHA256

                    9ac0f7c55ff2ee4ca31d00f2a3d4ec30c53ab94c189f7d4228982f01893dce69

                    SHA512

                    bda1dd1a835b8e418868654c7f336851d59e0304dab2866d9026936393f9dd75b29997d69e99e3bb4ce58944fb46782a9fbfae1c34d32355b8a00b7695402822

                  • C:\Program Files (x86)\GUM6D84.tmp\goopdateres_zh-TW.dll
                    Filesize

                    40KB

                    MD5

                    8b78d5f5ecdd454911bef4c211f12875

                    SHA1

                    75ff9eeaf3a4f49fe16ad8473f18ab927e8e1501

                    SHA256

                    fb8f75752260ac1718ce82eb6e69ecbfd5623555ef9bbf32cb20076d23719405

                    SHA512

                    c72e831746234702d3cef0a2dcefcff4dd2aeb57df56529fb5394b433b3329c72b5e66a9721a98573d89f1bcd1864cefb342f656eff403f835bd39eab7f4a587

                  • memory/628-221-0x0000000000000000-mapping.dmp
                  • memory/792-208-0x0000000000000000-mapping.dmp
                  • memory/1132-210-0x0000017DCFF40000-0x0000017DCFF50000-memory.dmp
                    Filesize

                    64KB

                  • memory/1132-209-0x0000017DCFE40000-0x0000017DCFE50000-memory.dmp
                    Filesize

                    64KB

                  • memory/1476-218-0x0000000000000000-mapping.dmp
                  • memory/1516-205-0x0000000000000000-mapping.dmp
                  • memory/1776-207-0x0000000000000000-mapping.dmp
                  • memory/2288-204-0x0000000000000000-mapping.dmp
                  • memory/2308-203-0x0000000000000000-mapping.dmp
                  • memory/2680-200-0x0000000000000000-mapping.dmp
                  • memory/2752-219-0x0000000000000000-mapping.dmp
                  • memory/2856-216-0x0000000000000000-mapping.dmp
                  • memory/2920-222-0x0000000000000000-mapping.dmp
                  • memory/2936-213-0x0000000000000000-mapping.dmp
                  • memory/3112-130-0x0000000000000000-mapping.dmp
                  • memory/3324-202-0x0000000000000000-mapping.dmp
                  • memory/3408-206-0x0000000000000000-mapping.dmp
                  • memory/3720-217-0x0000000000000000-mapping.dmp
                  • memory/3728-212-0x0000000000000000-mapping.dmp
                  • memory/3768-223-0x0000000000000000-mapping.dmp
                  • memory/3864-224-0x0000000000000000-mapping.dmp
                  • memory/4000-214-0x0000000000000000-mapping.dmp
                  • memory/4064-225-0x0000000000000000-mapping.dmp
                  • memory/4264-215-0x0000000000000000-mapping.dmp
                  • memory/4520-211-0x0000000000000000-mapping.dmp
                  • memory/4572-197-0x0000000000000000-mapping.dmp
                  • memory/4664-220-0x0000000000000000-mapping.dmp
                  • memory/4668-196-0x0000000000000000-mapping.dmp
                  • memory/4700-195-0x0000000000000000-mapping.dmp
                  • memory/4720-199-0x0000000000000000-mapping.dmp
                  • memory/4740-198-0x0000000000000000-mapping.dmp
                  • memory/4748-201-0x0000000000000000-mapping.dmp