Analysis

  • max time kernel
    154s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 08:35

General

  • Target

    f96f5715bb9c501cadc3040da7e5d469841b0b9f6b630976e5295cc36492f5f8.exe

  • Size

    10.9MB

  • MD5

    b7c6b657ab01d849aa76acf8c11caa7d

  • SHA1

    ada690aa7d2ee185b49d0a83ced796c79bd441d2

  • SHA256

    f96f5715bb9c501cadc3040da7e5d469841b0b9f6b630976e5295cc36492f5f8

  • SHA512

    2af6b2e4cfa3ce23fdaca965a1ed0aa568b859afb51b2f4aeea38d2e713cb76ab8cd56488aec7cde22a1913a709060ee311bbd32c15912de1b536a9eb8a565bf

  • SSDEEP

    196608:xD2eBtcom8v1NavvdvdaFjrs8X3vKcvIo0jOXE6aFJZdnlsoSsGMtmcgsWOo:4eBtco/voFvdaFns8nvVI36HaFbXsu1c

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Executes dropped EXE 18 IoCs
  • Registers COM server for autorun 1 TTPs 8 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f96f5715bb9c501cadc3040da7e5d469841b0b9f6b630976e5295cc36492f5f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f96f5715bb9c501cadc3040da7e5d469841b0b9f6b630976e5295cc36492f5f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\Avzliasqqtdg.exe
      "C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\Avzliasqqtdg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleUpdate.exe
        C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleUpdate.exe /silent /install "appguid={3a6b4dad-8745-4e03-9404-757639292ee0}&appname=ca97e14a-bac7-4f16-9993-59c249362e15&needsadmin=True&lang=en"
        3⤵
        • Executes dropped EXE
        • Sets file execution options in registry
        • Checks computer location settings
        • Loads dropped DLL
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /regsvc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:3936
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:4156
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB2ZXJzaW9uPSIxLjMuMjUuMCIgaXNtYWNoaW5lPSIxIiBzZXNzaW9uaWQ9Ins4MERCMjQ0Ny02QzUyLTQ5RjgtQjAyMy1ENTdCMDUyNDEzNzh9IiBpbnN0YWxsc291cmNlPSJvdGhlcmluc3RhbGxjbWQiIHRlc3Rzb3VyY2U9ImF1dG8iIHJlcXVlc3RpZD0ie0E3MkRBQzM1LUNCQUMtNDkwOC05RDU1LTAxQTFFMEQxRUMzNX0iPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSI2LjIiIHNwPSIiIGFyY2g9Ing2NCIvPjxhcHAgYXBwaWQ9Ins0MzBGRDREMC1CNzI5LTRGNjEtQUEzNC05MTUyNjQ4MTc5OUR9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxLjMuMjUuMCIgbGFuZz0iZW4iIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg==
          4⤵
          • Executes dropped EXE
          PID:4420
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /handoff "appguid={3a6b4dad-8745-4e03-9404-757639292ee0}&appname=ca97e14a-bac7-4f16-9993-59c249362e15&needsadmin=True&lang=en" /installsource otherinstallcmd /sessionid "{80DB2447-6C52-49F8-B023-D57B05241378}" /silent
          4⤵
          • Executes dropped EXE
          PID:4928
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-3.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-3.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        • Drops Chrome extension
        • Suspicious behavior: EnumeratesProcesses
        PID:4684
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-11.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-11.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:3916
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-7.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-7.exe" /rawdata=ouOZSp26O95vPBoFCeMnsqvnHK7vn2E7ELRCPiLG+poND2vlvyRyw5ZcHEVStJJkUYUdXohRQPjA9jV3hE7krTKKm5awITgRtp6rxCcxxMKCmEXWfVR344uZR7bycsnYhtwkon2AcT9rou+f1V+t+gUQORRldnnJ9JzoRiXNDsEp9LdqQto1S+Th+zrRZu/ltLWweutChMgnH5egfP7vKWizt8LMw0pfZwC5Lpd8USV9l8MgWGPnJe5+5H2rBCf/ZG4OZfBjwFrjh52ecxH/8CnasnJ+r3f5FdO3DdQvCh+qcwvfaYuU3WFovogGMx/uB10ix1oXl+u4Byj+V70UW6Fab21bggz32pMGKUxVuqdnsrEHvt9Dkln59XIlCrdvlRDxjGPwKxKzcGuY+ItZPhl7A1WFbQOVqJ0NEmGN7vQBmTjm/l5SgCCFRnvle4S8auKjyoR2XCSzRLiX5lIwjwjyVHavZYDWRkiDX1ejwhSU1QkuPBfqjJ4Qok3O7Q/RVd+PHy3Fn8yJhItpmkcdyHD3sJHIHwPR1nr7+e/uW9g4wxMUgXMciyc/Nxz4y9W0XqhZaFhxR5Es6h5K+UmYlRFXJcVCsn3dazHZtSWqVrp7koWYGrzRKFItxEVAvJef6fCocQ4MYi+fOMVTAzE7vegxbSO61fJm2KVjLxPge1GW+To0Uphh+XyuQdUJy0ZXzDHCAanMObLPRSy5gVZKJn0XHm+Xvl4hWXcDFNw6FzZ3X0ZfJHX3bvEgEc1wmWicgrhwmjybFZw/Ccn8r0+2+yN03QFa454F7qNBO8yQ+xt1+Bm7+0ygiVTslcD/n7rFDWAqakoXThmqIIPM8FRe+LuK9+aWv9ebnIdFoViDEz4oOWs5s9miz+67qKODOyvIbZ1rvOfdfuZziGbMrAoilV790q2QOcElpILVUzLI3o1hj0soVJOhuOIk0Dq43cyDsB2ZphfcDBrcYi/UH7Y4aCpZEmiGdK0aeGHTBBivMFFybTRTW2eSNHJfbbQK3O+jTphkDKGtaEsvt2pjphc2NdUd0TZJF9NPtqdrRcjTHLeZuBCsxoo3d0LuuT8dTGgMP8JP1WS4peiAic8gQiAdnK24/l3WUJ0E/7eys2lVny/KkrnK1z3C6p2o1YkmOoeCJrqfO++Oix2pjBxlWIdgBJy7LxWhLZr/3+Mg7cUuRakhXUvSJ7FdPbCwm2BjwFUtM2irfQ2dTIAdLjFbWENOroKymQPEQn4T6TKMZXKsArQZmiPCcviBQpE3bWKeagJMVCU0rHUSUQpf2orGeNKcu78F7rp4kF4tOXPkLSgUrZq/oAmELayg1oQu21P+nCyD3C0kuNMrhhwDfBl6DW2rA6uzN23y8ADxOdULe0tVzw7CRzfR0GGDuXUfXfl2mOtvtAO2eZUF7bKsUGvg1dzluWeBjsl80B3pD6P7Lcv3PdiJiifkrhQYt5IbmPiJau6Lct6QjNj2XAbKVcSy7wT39mpSxRAr4SlK20yGBo0fAubkg087gZA2kbdFCRnaAx0lm6zFwAsqJ+1bJKdDb4ukVClUoAGMw1eeRQc8CID89aggPzC6QKos0aevxuvLy5sjGK0BudN+oPmoUsPVqass25TZopxztdhfNOFD3rQ2v1ALbB1p88CpyfPrM3ut7rITDX5llYNkLlFUbBCryAh1rOTLUAbMYwI7HTT0fesvK37GKDdQawIKTzzqFzMZw1gDGpAwwiIxjLi1XZkAe+JuGcI4LSCW4loV6RrRHw52B5w9hLsuj13XetSJRT8E3rqX1rl8wkE/zhbwiLXmCTYebIT4i3O+HfSaMcW7pxEeAGZmct1AhYR2E8TclqGbw7UTKyaJOqRn1DqDePSFRe1PfQ==
        3⤵
        • Executes dropped EXE
        PID:4632
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-7.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-7.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:1652
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-4.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-4.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:4676
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-bho.dll"
        3⤵
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:2976
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-bho64.dll"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:904
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-bho64.dll"
          4⤵
          • Registers COM server for autorun
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:4700
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-codedownloader.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-codedownloader.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:260
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-codedownloader.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-codedownloader.exe" /rawdata=NdV+3Pt2O0s8TBxfAnTqG7O3JZ4Jumq9W+tbSBPt8yrPcK4P0Y2Y2dI1Kcv8pIoE1C1ryWRJrKdderKvxVw3wSXK5mBFnExDcDipx1MIxy7GjkV1QjHANL/OCyYtLPu6ICFEXwvUU2vBafD+eSwjn+yvfWqX9xLPIKidLoDNQI1kaWeK0yEvlpc2DOu+/FkldbISrGsexAldVGxJ+uOV5/zRkhgwnTDLAWinpr8mYc8rwsC6RZyFSLpn9knNZ6Wm+5p7RX6+uqYG+uqD+dE70Gy1pb7pKiordV8pYzbVjOrxtEPR14VSp7ypwl8AWCHo+W26KBa5maxx/iXpRwG0bYI1iDHpji2SQkcU5XUs81TjRRHMkHJek7geOmT/IJPO/4Sxj49ZCcNBb9JpIAgFnMWQ6wNWlFQfTBVHTixqGi1NsAGUBaA39vnX/qomGzdlrsGHjM07qTr3qKuFb7xnWjyZXpMguzUIraeTOC+hFbOjfq2eSbPM+6oO6YBbokA/ABVCNYNVRWOKQR/nDyzPJFCxHNLIf2Ky8oRk2BT+bOLjCps3sDYdO0h3nbgYYVSP5k/Kus/h0j9muHxkPMvsZscr6mH1WZ4PQqjSICN6XhoZtWcmOuo6xQ4wFNfxgtEV9E4iR4GuBOC/xy44oUN5WQy6OZGrG3pxF4NU1Qj/mZMVMurPggonbpoRDw+53ZSugpru9JWmSqaP/kBpqDic5hKCQj1uKOvLrH8Apq/yEBLR592urSrksmvxPPVUmUHXy/nzv4BUOFGE4E45ruqF/O5Iut29uDEHD0OMBTqF0963ff3uGGkEcx9tqZmW6uQhfKslk3jj2WHWeKRUJolbMqLovWnB4oM6ylqyFE+sijLCiQZIqlTtpFL2Z9LSwY4wL2MwHudbgPc/oQ1QR0RWz4ORM3yUMuxeNlnRni1Oj9O/W+3SCkZyJbxWPFebcEmywGY5oIp9oiIBeIq4NsRgsoIEdwO2KYC8oxYnEMX+sjNLcO0Oj7gRgc+InVEjAV+GMwOhQmOfqm9t+yEHyH/TfawjjAQttp9qQDrx33zKeucAWBLMcMiXwQYChXvuf1vxbMvVsmqx05LNDR1S1MbSwMc23FoPZyidcNUc6yNWaw46+HCX1w4jQDqUYGUJef8oVYwP/yQAXjVShaLRv5YvkWOFrXOpXVeeJm9hG70eFy+wPM4SoEZJwsM50cyEMlPVVxZ5SunOGNhIFUBUzLNxD8TZA2X5GOR4WYLz9+gX92NrGANAdtFYv7RmQnHKbLV+BplbOqJ64oYdqRvDCqygImDC+VJacD+RIIGYAWvd6dVm2nbrQKRImzGMOQO//0ZfD2z+QIvT11GbHsKHYm/HlAzSSDU24Nq7hSpkLlPoZthl1uRhVCftFeRK/CRgXYMVV4lnY5l42SK/NuDo3vp1VmMQah6J+y99X68a5fk6R0qaLMr4gwtZr7qUbPA+COLEDXEbizcAQk3QlH07ecEX75amy6Y7ZCz5gRhib31De/dpjET1RaV6MauSIvcXPyBs
        3⤵
        • Executes dropped EXE
        PID:5028
      • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-bg.exe
        "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\HQ Pro Video 1.6V04.11-bg.exe" /executebg /externallog='C:\Users\Admin\AppData\Local\Temp\HQ Pro Video 1.6V04.11Installer_1669296320.log'
        3⤵
        • Executes dropped EXE
        PID:4232
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2316
  • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjQ4MDkiIGV4dHJhY29kZTE9IjI2ODQzNTQ1OSIvPjwvYXBwPjwvcmVxdWVzdD4=
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1640
  • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-6.exe
    "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-6.exe" /rawdata=cvBvEyAfV9gPCn35XDVDewEp9Gr52/I77FDg2xo/HPuHj8MmytIa6CL3hd5dJnMqd2KJPqfwPg4mXglPJisIkFJRyWv4rM1PvbTpYa70RHeinlmJbHMn5sjKjmnfQYg7ZNo4g+rEarKSLTgPphX5MwxhVmWgEZkgPob47zyJqgARBBW8X99KQEzDIeApHmztsfW6uSkjrgYVcKQYLf9Zfyg/BXw/1cTrqd4H3NmPWk9P99B5ZbW/M+d1jmZHxZX0cdEPnH+VmrpWONq7iWfScF0JkcqXAQkMoHe/Sx+QY5RYmIW5Q+DaD/FeqN6qj4MQ2U6aaGrGleyUycPiHPkHTMACLfiWfZ6CzYtHSU8LIDIGKmLUPyAPlipZkOU9XIWlS4EO+n5xcyhUDOxtjugZwW88DJwDnOYdJ+Yg24qvaCmMXpnRYG2W4jUddK1UNz8nvnBR3+hTd6fDBtv5tAL7OkUizY+YD/Rly7qaaJXBW8A61y9VadcusxU5ArNmuW7SgIaMXcTvxNYNi3/dJ+MDIz3glfZbzUD+Gc1eXhCjlFwfFuKnZMG5BP6/zls1sRF5RU0Pnom5LJJ+PJtg2HoTIMJBu6Wxh7XJeiCiE3N4sBLgsWQm03q3XZRspSPknLsNfx2pwUmwjSbeBiu5crZsWUJDOKUgpltI0v9gIi8ZxUelgz6aNlzXqRSMAbxFVDZGBzcYo78QIpxjJyQRAcLsL4guqpmJsWvtxMD3l35vJIXtQAJeHVzTLtR+5witf5RLBa8Nj4F67qLQNmQ0Aor115VVNhKZjzv1IIEPxZN1a2nL/Qy3rHICAPT+wvM8X8+/GCQ/J25iwFmERf5cxxrS5WpjnULjYCFHRgYOFxjyYZACcjrn69JGK98Yl+2kmbzQD+OQNkV0KlDAVoAwmWkTrUvSTSWo1gBJS+zjWVlv/GlVcDrrJ81LlTkzT8jCC1oXq6rjF7lnyqCujsniNERvkG49PVYijr0GHEmVluSs2ZQEALgJgVJefzEckh6og9GmSYabeb3UesBJXK5cyFPTy8xymGRK21shVqhtfVnIxGm4gBs9UWi5iXUAn+PjycAFTQZDJuCTS77BNYQa4SANfXvEghYGM4aTrnk5KnWCbvkyjfVh7nSasDpgwh7m+rh/oR+MQMsxK34xw11BuC3p0/QqfgcMe9FURC6VN6IyMFuX9G6y4VDb7c7aEBle8hAM3EJLCZw3Gjv+oYeCiWyK1lKqmHwZFz0J7UZ+6Rqd6uekwOEm/Ds7rv0TpHr2zeGQRu1wkwd5qQS85gRDjfUz6Ybdpkwv8dpSdbW9NysNFp6TupybJykP9sIeWWhgSaTjwgBidOUIhpOlrAj1IsTURijjehoYBPXLkELjWYEu3GGgGnBkwoZ9Gj53dkUGzYfgbrmjGjN3JCPrLuE1un8SYGQpx9ViR24Kj4mY+8dEDQmU4IV418osJ0djnN+8rrAQ33Q3n4m9VTQA+FcdxamdhSFEEf/TW7DxIRRNzXGGZ4VKtGSNtYUg0cL7Vr0jvgBi
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:804
  • C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-2.exe
    "C:\Program Files (x86)\HQ Pro Video 1.6V04.11\9ed06b8f-15bf-4448-82e7-c5f92d92e33c-2.exe" /rawdata=H9fd/KXcmxUlNxFLlY/FGZ/t3xAAplnPfZe6wDSghLPfi5us5mW032SPBM474jvYVfVocqyK7uJTEgBo9i8qQ8uaNr35IMhH6rCp2k7C3tWvZ9ocqNw9bjKTNGU/+Cm5ox74zpFxI6fnf6/YK0mXTRwdgQk+fKwrC65j40ry+Z6Lg2dinXhXDYM9gLlH9EJmEZ6nBbtIVi9jpKTNDIKf/X6I8+NOtVC38TRdCJSqiiY2chuHxhfobt+tdU1qwZOjoC2j9TX6GK5gOWBAR9iHjfMa7PEyJjQbH2Y8SJXj7fkekBSpvKuUeLCUv+nWkYFaI6HfAb9P+InZYOeiyIYbM7xbm+tMAlQbRMX2v+TmkZrpTiR3fwq5tr+I3AZbQtq0BhiXBUDrWAGFZymq1rFTMNy6UGpMcgdTMriw54e2V36yR0kfURay2aSSIBXXYHJw2pXiPXabJg5CSMaoEHn4Bipa0bHGTg83NBThLi8YGARDUTQqyl6cMWQUWOd1tLWsEL/2c4pgGDFz6Dk1Hpx7VjiO7QI/KVuiw+KE+Y3baMHSrUJ/zIVNi68QMGJJI2BX7dbrlJji4zvDBKIN+MeRFfkogwN8LU1+v+VScC2JEl7FY2UbPTvORFLUOi19uXUaLMUjvlZ+DYmu5SauOhYL+IacGk1KS25Dph72ShwgPEhAlF1mDxcqTp/IzEuG4kwB00yjELYwPYvuNtyBpql0PF7zO0+NcrpzuBKZAWoNKZ1hkMt2TJB2GbwK7D+xmzBnoiGpTECEFVAHtwKIL1XVaMktfx47fvMRzMO7CWoXnCCmsUP8iTNbNxvggK2C6GwJ7S6FAOk9136mdTTkl/rHwRtFjC+EWoIhtRyCA8U3WMmoJflWobZ15TDPAfgQYS90Q/OqbpafeeZv2LGW/Rn2bgmGtl9LZN6FSCZtJsXeJolveeX50xE59vDiJEF51/yRY+4PFfnWpixudPUal6UCeGR9/JU1KSdvYhGaL2FX8uagLaJfpVaQ3gC9pU/mCsi6
    1⤵
    • Executes dropped EXE
    • Modifies Internet Explorer settings
    • System policy modification
    PID:1152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleCrashHandler.exe

    Filesize

    71KB

    MD5

    03114dadbd9977fc823f95b21fb987e7

    SHA1

    0e7cc420b0be38296ef8516dc3786361119f1f5f

    SHA256

    9ee9cfe293a8c2aa59ac8b65ba93f47c5ed4134793bc0f8102870d63cbb7a68b

    SHA512

    dcd85d7ee439a00827fba3cb2d5c8c24a5a508dd359699a43178c6cfa122d0128659392a29283945757ba8853a0e6a270a2aee003424973c3e4d598cd7635d3f

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleUpdate.exe

    Filesize

    67KB

    MD5

    d858ba2ee718b1db1ced20646e641d08

    SHA1

    01c53fbc0030066fe9032fec431d9ea26b5811cc

    SHA256

    9e63f6d3ab97d53924b975ed233cf595efaedca94ab513398cb892684c8027f1

    SHA512

    08bd015cf63062be24878026a01d07562a5ba5f4eb4f06f2674e13b92d24c31d38580974f23713f67f713c9098c1847b5b1cc49bb89c1c93d8fad2c73d237a4c

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleUpdate.exe

    Filesize

    67KB

    MD5

    d858ba2ee718b1db1ced20646e641d08

    SHA1

    01c53fbc0030066fe9032fec431d9ea26b5811cc

    SHA256

    9e63f6d3ab97d53924b975ed233cf595efaedca94ab513398cb892684c8027f1

    SHA512

    08bd015cf63062be24878026a01d07562a5ba5f4eb4f06f2674e13b92d24c31d38580974f23713f67f713c9098c1847b5b1cc49bb89c1c93d8fad2c73d237a4c

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\GoogleUpdateHelper.msi

    Filesize

    140KB

    MD5

    fc7a2f466f7a0f3e873077505719c1a1

    SHA1

    f729c4cdf49744729357319e10da2514ec40cb03

    SHA256

    5588dfe6fbe9eed8fd7e207cf91cf355979788360e1e27bfc0f0e3208ebeedb4

    SHA512

    43cbbd39e6f02dec5a0df026ba38953587a1c16e2a7a7e898c6ac508ff94fa127264c45ab9e3aaeadbd270666591306970d7718f03a8898bd5f2e6f83cd7f96d

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\goopdate.dll

    Filesize

    744KB

    MD5

    df79cc3703a3cf702262cd863b8dc1fc

    SHA1

    c5561c1ab699c4b06658fbad1846f10c333cc40b

    SHA256

    2e2ad32ff77e115c3cc80da09d164673eeb3f943a9b4c460d94609d4327d2dbe

    SHA512

    384c96ef2c61db9235cf57afde2ae4a581b2c726ab91e53dc339ebda0373283cae6b4d42f2d3aaec80f26d1c7b976a952c7fc5e3780936ed2bf6986df1b274f8

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\goopdate.dll

    Filesize

    744KB

    MD5

    df79cc3703a3cf702262cd863b8dc1fc

    SHA1

    c5561c1ab699c4b06658fbad1846f10c333cc40b

    SHA256

    2e2ad32ff77e115c3cc80da09d164673eeb3f943a9b4c460d94609d4327d2dbe

    SHA512

    384c96ef2c61db9235cf57afde2ae4a581b2c726ab91e53dc339ebda0373283cae6b4d42f2d3aaec80f26d1c7b976a952c7fc5e3780936ed2bf6986df1b274f8

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\goopdateres_en.dll

    Filesize

    26KB

    MD5

    86fcbacf4f6ffd6a68d8b2feb9e5609d

    SHA1

    583b9c12bf4b3a485079cbe088b382907a29a67d

    SHA256

    e64dbbd92b456c2d6f0217165c54da904aa028c23cf98f0ba31cb72cb98380f6

    SHA512

    b3f54036bb8a54817f451c0fdb345933da62fdbc02ce30ffc8c1539f310c7fa17b264741eee90003dd6ccf88f6bf66d3f530a976ee8d03fe50967529aa541002

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\psmachine.dll

    Filesize

    152KB

    MD5

    fefef2f226fd6be184bc4a3378b02aaf

    SHA1

    edb4a6c7e75e18acb805418effd78267bb2f37c4

    SHA256

    126c7a3934655730e4173fb80103fbd40426a3dc4667cb56073072ac62e56bbb

    SHA512

    b5ed060d491b049b7eba60f01531ee174383d81a001d57ad246b274d2ea32f0b43559bd1fd8fc74358c3d36c4e826d3bfdb569932be375037497ff956a163870

  • C:\Users\Admin\AppData\Local\Temp\comh.220005\psuser.dll

    Filesize

    152KB

    MD5

    8d90bb3a36521b50d0e512a781e36871

    SHA1

    399ce73fbd27eabb303fd899656e3c66c55b3f29

    SHA256

    9901c1fb64c2b0c23f60b754f8d6a57a257a694ea880a7e36836c2043dde214d

    SHA512

    62478dab27233e1180cee87eccf3b74bd48d5b2fe022f83a03a131341621f311666397dd6fc75db72c9bda75b80ad391bb40d12141e8380d899731625978b711

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils.dll

    Filesize

    819KB

    MD5

    165c01bb7e4c54fa786a9873dd49b686

    SHA1

    5c307d9b09ef33fdb6c0ada73313a0f6edb9d1ad

    SHA256

    1cfc1a8c7031e4a62f97711dd863e6c895ce3f471285fb1b02e3d2d907a9e955

    SHA512

    b4f3d6dd21040f9e65e3423b95de920e8a06aadaf5f0f7c9e12dab4e1344bd97a49546f986ee6dc726f7ef148dc7e8ac3a79b4cdb4d417f5cb7894cb7683b16f

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\InstallerUtils2.dll

    Filesize

    108KB

    MD5

    a871c6ff1fc691fb47511ae95f16d10f

    SHA1

    4794000cfa9475d4f9cefd1b81d24f082caee45e

    SHA256

    3443e8d900e5fa0ba4e9d0dc83d05118d842c60109ad69ae92650fe16bf5b42a

    SHA512

    faff6d1b94650aa48386900231b4a9e8e4ad2e94efc5be1eb90da1ca8c5554d3791baea75d6baf8466b8b04964cb41a2bc6eb30b94a3ad52e501ee121579c0f8

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\inetc.dll

    Filesize

    20KB

    MD5

    4c01fdfd2b57b32046b3b3635a4f4df8

    SHA1

    e0af8e418cbe2b2783b5de93279a3b5dcb73490e

    SHA256

    b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014

    SHA512

    cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\inetc.dll

    Filesize

    20KB

    MD5

    4c01fdfd2b57b32046b3b3635a4f4df8

    SHA1

    e0af8e418cbe2b2783b5de93279a3b5dcb73490e

    SHA256

    b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014

    SHA512

    cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • C:\Users\Admin\AppData\Local\Temp\nsm4B34.tmp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\Avzliasqqtdg.exe

    Filesize

    10.8MB

    MD5

    361288ecb03532162ac48e8e91738a15

    SHA1

    fd73f7d040d71e7b2dec860eb273447bfbed6d39

    SHA256

    f527db2c8fdee9c82e09e2c7aad73b95673398dabb370effa48dbf1da04d9274

    SHA512

    2a48a78795ac1bb371686ac50eaa70bfd59db9dbb7db815612209f020690ecb3ad31fe5de4b8a120b18bfd23a51f53ad956308d034ae9c8d464faf248123344c

  • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\Avzliasqqtdg.exe

    Filesize

    10.8MB

    MD5

    361288ecb03532162ac48e8e91738a15

    SHA1

    fd73f7d040d71e7b2dec860eb273447bfbed6d39

    SHA256

    f527db2c8fdee9c82e09e2c7aad73b95673398dabb370effa48dbf1da04d9274

    SHA512

    2a48a78795ac1bb371686ac50eaa70bfd59db9dbb7db815612209f020690ecb3ad31fe5de4b8a120b18bfd23a51f53ad956308d034ae9c8d464faf248123344c

  • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsxF468.tmp\WrapperUtils.dll

    Filesize

    58KB

    MD5

    4f4dc393d6830c4dbdd88d88e695ffe9

    SHA1

    0e8204505c7680cbb2ef05a0352fbec877a27951

    SHA256

    0d5dc9bf0c1891311da4732989c2e5d4cbbe1761cc26bcfe1576d2835b4f10f5

    SHA512

    36f690d07ecebff4dd85a96ca7e181a1ae739ff70f9922bbbab4e9d099f4d2a24d059742afa3d383aefdd0027805c975bf1d76f751142b7d206c4ae0b160fcb7

  • memory/260-253-0x0000000000000000-mapping.dmp

  • memory/904-251-0x0000000000000000-mapping.dmp

  • memory/1264-167-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-246-0x0000000006BB0000-0x0000000006CCF000-memory.dmp

    Filesize

    1.1MB

  • memory/1264-135-0x0000000000000000-mapping.dmp

  • memory/1264-168-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-166-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-165-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-161-0x0000000004C91000-0x0000000004C94000-memory.dmp

    Filesize

    12KB

  • memory/1264-154-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-155-0x00000000013E0000-0x00000000013E9000-memory.dmp

    Filesize

    36KB

  • memory/1264-245-0x0000000006BB1000-0x0000000006C67000-memory.dmp

    Filesize

    728KB

  • memory/1264-238-0x0000000006A80000-0x0000000006C07000-memory.dmp

    Filesize

    1.5MB

  • memory/1264-210-0x0000000005E40000-0x0000000005FCE000-memory.dmp

    Filesize

    1.6MB

  • memory/1264-235-0x0000000006A81000-0x0000000006B91000-memory.dmp

    Filesize

    1.1MB

  • memory/1264-230-0x0000000006A80000-0x0000000006B9F000-memory.dmp

    Filesize

    1.1MB

  • memory/1264-227-0x0000000006A81000-0x0000000006B37000-memory.dmp

    Filesize

    728KB

  • memory/1264-217-0x0000000006A81000-0x0000000006B98000-memory.dmp

    Filesize

    1.1MB

  • memory/1264-218-0x0000000006A80000-0x0000000006C0E000-memory.dmp

    Filesize

    1.6MB

  • memory/1264-222-0x0000000006310000-0x000000000642F000-memory.dmp

    Filesize

    1.1MB

  • memory/1640-215-0x0000000000000000-mapping.dmp

  • memory/1652-233-0x0000000000000000-mapping.dmp

  • memory/2976-250-0x0000000000000000-mapping.dmp

  • memory/3220-193-0x0000000000000000-mapping.dmp

  • memory/3916-216-0x0000000000000000-mapping.dmp

  • memory/3936-205-0x0000000000000000-mapping.dmp

  • memory/4156-207-0x0000000000000000-mapping.dmp

  • memory/4232-255-0x0000000000000000-mapping.dmp

  • memory/4420-208-0x0000000000000000-mapping.dmp

  • memory/4632-232-0x0000000000000000-mapping.dmp

  • memory/4676-234-0x0000000000000000-mapping.dmp

  • memory/4684-206-0x0000000000000000-mapping.dmp

  • memory/4700-252-0x0000000000000000-mapping.dmp

  • memory/4928-209-0x0000000000000000-mapping.dmp

  • memory/5028-254-0x0000000000000000-mapping.dmp