Analysis

  • max time kernel
    154s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 12:11

General

  • Target

    34cc9d3bb444786898b4a21a298a66e0d88cbd551caec83c2e34b28b51d81fd3.exe

  • Size

    11.2MB

  • MD5

    ca28de04fa510b0fbd6d11c15bbafa75

  • SHA1

    123da97059b31e390738800e9b70da1485ca4014

  • SHA256

    34cc9d3bb444786898b4a21a298a66e0d88cbd551caec83c2e34b28b51d81fd3

  • SHA512

    8024cba327c1f551b2be3aa69a710fd9fabda5e496ab6f9bcd0f98b77f902dd0c9704de867982ba228694bd093b77f99a6f4cde3af53a3c8a16f4adbf96f2be8

  • SSDEEP

    196608:7147FJg8So17a5edtjIRTSNmcUtyxoOgDbBO0C++hIk+gSwfvlGc3dm6Llo7W:ahW8So1TdtjcTSNmcUUxoc9+DiZoK

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Executes dropped EXE 18 IoCs
  • Registers COM server for autorun 1 TTPs 8 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 42 IoCs
  • Drops file in Windows directory 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34cc9d3bb444786898b4a21a298a66e0d88cbd551caec83c2e34b28b51d81fd3.exe
    "C:\Users\Admin\AppData\Local\Temp\34cc9d3bb444786898b4a21a298a66e0d88cbd551caec83c2e34b28b51d81fd3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\Orimcvh.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\Orimcvh.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3796
      • C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleUpdate.exe
        C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleUpdate.exe /silent /install "appguid={71706594-2960-41b9-8fc5-3f7176a967da}&appname=f7d05580-6cf5-47f2-a9b7-e7201b27c8d0&needsadmin=True&lang=en"
        3⤵
        • Executes dropped EXE
        • Sets file execution options in registry
        • Checks computer location settings
        • Loads dropped DLL
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /regsvc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:2140
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:2228
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /ping 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-PC9hcHA-PC9yZXF1ZXN0Pg==
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2344
        • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /handoff "appguid={71706594-2960-41b9-8fc5-3f7176a967da}&appname=f7d05580-6cf5-47f2-a9b7-e7201b27c8d0&needsadmin=True&lang=en" /installsource otherinstallcmd /sessionid "{96CC2C33-AC90-4268-AECF-80367C7CCE5F}" /silent
          4⤵
          • Executes dropped EXE
          PID:3628
      • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-3.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-3.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        • Drops Chrome extension
        • Suspicious behavior: EnumeratesProcesses
        PID:2488
      • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-11.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-11.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:4732
      • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-7.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-7.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:3100
      • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-7.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-7.exe" /rawdata=GxknUVN6B69VZCXebW2hVQ0FMZhWHDt3FvVhuGLjOW0Et3PXgGbFSafHxCWx3ejWrOBnhXHt0klxCuq6nLNSD4/0g5bT+JCdHAndWnmvNtcwIWn8jzaUMy7afvVoDNgGbbdTRtz2352runmjk2/d2JU0Jz+75V0oOFSzSUxl4rOJafSAD90Tc7sVsDrTq60n5jI1wcd8W7dCsegEseJFNGgfqIb108Y1TKVGvD8bfpss7wCnxSwsH2mznup1JlCG1IIWpFxzk9pu0+Aceve+0dhwj/7v8VGi75CQUinNLP/QY2blk1hQotgoQPjL+KW5gOg5ph8Fp6tWVob4rapqnIHekmnZz0XgqLrrwCn6MvnyGFXSHawRTZA2GkD029Q3wMWQLxa3xsO/Qful46LKCP6wRuvOdvVyq/tSo5AwDYcu/Q6rh7LHktl9Jf+lP/s9raMs7bIh64ZYmWou9rQhHGey+4dLv7Y+hzgF5ftKVuaElWiEPm1DHqVbdLqBrUczvv8jXNMY6dNGYaJBQGv0ex7Q8Mer6buEKZ17thgt/XH97DBTteQoMCZHS0VdeOnilvBS2fZIhdFex8bofBeo3lKygXW2bdytCdXH3244w5leOtcdHD4E56jnd+AwqFpMQCVAFDAPLPzcW5mnhRjVdPmhmgpgsrwWrUWRfLUIzU2kjfI42iTNlO/QdTS8P9a3swNacvcNR0upCgeEWL4m4nU8rupXMjjARc7UWCc8kgGdiiIK7MijEKwN2WIfhpDqT3+HivNY5pn8HzQ3rK63m+t0ZtHHqKpOpdBs2MdMqnE/hK2PbtpTM8xQGY+r7qtdPTmnE3luMYcovsNOf3+jb7Vbx631wMYAe+iheL0J/FS6oG8+ML9kuBNHkzGutDhRQoiuQUwnPvb3J3NLFQh9cqz0yNNHOAwheq4+CHMzLZ9uVd5LhIMW3juJw+1XnFYZXJlj5cI5y1RmYPa9szisHXXwuVuY8LuTBv5yzkkctUQg+a7L2IqS1NpxqU4bNpaOpERpEI8gLBccXbBAhoKgTs9AmSqbHE8RPjjLV5UEuq6czLuZmniZwl2cU7JxqvXH+AyXObLS9rpusEgOEbJ66I4fiFPYZM/PVMW5pe6cQyP0KLq/JS9VJHyi9/Tu4ibZxhHXjb2HiooR9itxmiz+4t8/mnfb1rgvEgNL15/ZGG8guqEAgEI3KS5dcjuPvHSB5qzlVEEEIhRwbMgGZCO4c7zJ7I4Iw6JjVaI4vyWUv2rOcdpJe7Ay3dfp0TQt5kyna75mkfwVMlCFu27uA+6yQaIIy9SCgurXPRknbzzBAHudPwWnv7x6ODpGBd85FCEe2rp0PTv0+bqL94Dha8nWyy2PGf0334wxl0DK+1uH4OvKh0u5cguuo6fY/7opwwqMaimrRsdFB1wyqa5uQ3EjOONU8OtaO1tLBUw2na0j2i9FT0GDuNaDlZz/rwBO39drmTQKjHi7LENLYWSihzl8KqQM1SgmA6A0w21ID7GmYp1jkCT/AjE/Hkjvf9ak/YCZwRjIfM0YQzCW/8pid0CxvpzwreDzF4F42m4lPMwU4zj20i3ssFazNwt4SYg4fBLUySo78pbVBK8NpWeOzt6sfqgECCYzWP+tG+s/TrNPEtiHpSCKcR833KIp8jROrNGFiiqcVEvWLUz0doC9IKxkRN2DVeTnPgN7VwvoG+duqS4KcBECQPIv1NcooA+xRjwVFfnojGh3T2zifLlcD287nGx81Ek7kIhEyRdl00Vuq4+H5Rd5+IpR2WIc0MTdOyP7cQ0yWYVu8nmKO0kTQ9aPyJMg4I9RQP0Zb9o4Fys4bNTCohAJB8pfpcwP3s6E3yjF8PA29uYJvLIHPvjdw+tyGYSi/4qnn3s44z3ETpVdPlftl+mVB72TOFKPgANhaOYg2ItEU/3RClCPZBQbenLCP3ow3jr4FeJT9Ln80K2e21CSev0norpN2/dlGDj/T1BVcAwKGoIrqbo/Rfju4WO6cLal5Gigc+yWlPzQvw+Wxp2x2W4xcAWHySbLRLTDpHWCDfjjju/2uhOL5uFlY/fKCi0myRwJtkOCkzuUxxr4iUiD103Mb2MSOdmWgOC/0uBs6Fwyaub/wOoixisjT17aDDt/2bnrvtJPLP9NGg18d/ewtaVDFknd1nwsgq8CYP7frAexB8TswnGdq0evUaxKbnIuuRCzog440+bvJo+kkyqlvSKEsxxMDugBgHPMjBKvmZe44KjC7kQD6trlFawojkJKmjpqPqh2hQJYYwXgLhHVu4Xv8KYnDO9KBth01LCBQJHUIYs1toIWdp8PyjSmkns4WzkcaY2hEDg1xqXsPx1VR6WyMG14IsQNiK0w6J+Y5mYgLx39nETR+o0Q8SWufQ01frjEZKzKpwOX0iOndbfjedEJb3AfAeQqASnSzSxn6E6IHJOzLEjDKT2kJfJPUwJS0Pn80zLJrf9wXIyG1yZuAL9rjaBmXbmPj0kk8NYeyj6hesztGwN+exe6q/lEYNSqTNiGBmZa+1ixo9wDp6dpPjle+FutW2bZk8l2Y8fF
        3⤵
        • Executes dropped EXE
        PID:788
      • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-4.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-4.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:4996
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-bho.dll"
        3⤵
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:4060
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-bho64.dll"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-bho64.dll"
          4⤵
          • Registers COM server for autorun
          • Installs/modifies Browser Helper Object
          • Modifies registry class
          PID:3856
      • C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-codedownloader.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-codedownloader.exe" /rawdata=P8xP9e8rh+M3GKY552J1iMJjCYE+anWEnbiaD+u6kZhcSnLwgYsIVYYKLEfcbIWd5sErnNPHnQeLYKvvv6TIK2bpjaQ30aco5WNuFpAXmoETAJl6aRwqVp+TE8PoI55ImsTbzJbMcI/qDGRY8F7W0pOCrQA/e7xX9SOffpWHQKRztJLkrobyhKxMWeqUfO6NpQHh66LhLreYwSGPJ6mNHWX5cp7s3z56UxskTwVB6nvJBUEcpQOQp/W0EmAkNN4yfNpuZQ5Hsvvf9Ngp17fx28yGHuPCWxSaaGmtTFQYoO4B50sXMTz0QyIP0V3W3QOEkIlS8R0VLVImOKmpA3G0N485GTyCaGloI5l1ZjdixPHHnG6hLpFsDzEJjwsGPg9MPgcVKBxY9x6whtos97nuZMmEfSAyax46YM1+k/9apCNNfAM/eF/NUInLrq9IA+ntFMRFQOMYGuuQDSe6gbUZyfiSTYS0CovLpCZxyPfSZZ/Sabh+QUxnPXTxAazbNv4ruy5mEoJMqdQ6Cy9aLBsdBUvN6S4zws9mrhzu/u6KmXrQzR4vCryRgVTZI3SGhEFoLtG6ruuiSsiu3YCf/xRLdFuiWPRDpTIRGd+HRBtke6HiSer86kFsRVbPrntQ8G8fB0X9K4hU9F9nnZj5aMyvWuLIidTtP+rj6FhHLR0fm75C850zbfl2KtbsopfFmA3TBwesy30EmtwCQ/S0iVixvpAzuk/cvT4A6TIJ/8ocPRJ4OuouWqaT4evOydCRUamExtYWobKKuHPMY4B22kFUcjvIY8XyvPK2pD1T1tB4Dad4cWQ58iheVODKNS++LvUxSNagjl2sCzVwadKsxylmU0qF46D/M0E41tKii8GxtE8lBJDuMMCTzL0ffv61/Qaq7P+zcqq7c2RYnncdHnM2GpBNjOPJbt5CIVN3M5C6tgwSsBxj5lp4KPuQ2pkgMnwUzXMaE/1cinjw83iD/N2BR0CvHiO3lisJndJOyEFgJ99z52beSNNTmlfZD9YRcHsbeJqtyILDIDCvLwg44YbMzvFZSrW91F7ujmHzyUjXP6MqvgaRhUlF9+/JwzMk3OE46kmL+L2rPz1tEi+9xjdEGB825xFmyyDFqQpM2ZIbJrkYTNOsvxlH3mp+Rs5NvoGTJ6bcAR3njUwmyBx2pmjZn7sUFO6XyE6yBqjW9/s0XSRGj63GJPmz3OUACJNitYcInYWZOQJloCE5khyjmSvO1f3TcDltt/Z46tSVdntSEMW92ep1CHy4DSdqQ6+QAGxiGh9+WaO6rs1BAhT8YjCugmpX2KHkohplTrR/e9tXKhifkkCFbk4prOVmgwmIJ/i8uOagA0cW8QDcm86I4Ey4KiHV93sZ5qqfgWp04uTPF0o8cm1xLEw65h7UPqrJ9joMz/GgI63UsryQm/E+1k5ZLlA/rrJCUepweN6a5GH4Mxr8HWcFqG3PldONYPRicG7FyOkKa8z94x6qHkk5WxTfw8vETqOSUH2wKi6eNcJCo27OmssEFh96UZ9DiCNktlc9
        3⤵
        • Executes dropped EXE
        PID:3188
      • C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-codedownloader.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-codedownloader.exe" /rawdata=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
        3⤵
        • Executes dropped EXE
        PID:2320
      • C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-bg.exe
        "C:\Program Files (x86)\Browsers+Apps+1.1\Browsers+Apps+1.1-bg.exe" /executebg /externallog='C:\Users\Admin\AppData\Local\Temp\Browsers+Apps+1.1Installer_1669307403.log'
        3⤵
        • Executes dropped EXE
        PID:4620
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3996
  • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMTI4ODkiIGV4dHJhY29kZTE9IjI2ODQzNTQ1OSIvPjwvYXBwPjwvcmVxdWVzdD4=
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3228
  • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-6.exe
    "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-6.exe" /rawdata=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
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:5080
  • C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-2.exe
    "C:\Program Files (x86)\Browsers+Apps+1.1\a7ad3750-6906-4271-9a93-b5335977d68e-2.exe" /rawdata=b69iURten6FR54IJKINyWIpHXnFk3LVEdlbvWtMZaqGharTe0qOB8RmYD0boP9XdwMHE53SOb3Awc8dvAbv0UGlLW1fQMB2bC/Tz+CTgNbOypFlAB2S0zLGsqfZWXIvI+bLGrsytCYCWMH7crgXYP3LbcbJJ0v/XN2aILz3Re/S0Q58vhnQ3pyDRWNS165PNpq+omKpJXM7AnaN4+wEOb/A1F4mPnicx0bTNypLrtgAHmq3xC3wPAJLskbn9pkhAZo1yih5MKGe0/saCnS5F7eRSJKaXty1SXRzYk2EXgokbYJ7+5wWYEDAjhgMimhDY7+2OmFWilA0zRVdlxy64cW9h5ZLH1ZilTjQJev/09E4j3e4F86g67nX9dO+8VMcljuaHw/LR78ZXAUunzREa0vL+RruBkZXz9N9VPixtbNdJMU9ulY2mhYFsW9ItBS7UF2CoSJgD0TGdwG79tsO6IswThbUW7q1aY030cf3Wje1oOc5iLwqoJQZuTAYHlL0FXlpMdsdn7VpFSHKQYk98V1abcTy5GJ5CxbBJJyI8Z3WqTQrb4200u+hJQUhPUdmRv2YGZ2kiPoRcfhz4DL96nzIAxmxovMqEgFK5lLMhYbJszzpq+TBY6FqJ4INyNg4YiC/qXWJMa0PI54SXUb/JPQLzY1eELLkGSmB3NeiAGLCdiLGOZYyI721+cHWkUMKwc0F2yygqICaG4z1jX46p2zqk1MFJvY8u985UOmhAI1z+QYnDNtZHPMckIhfyEz4sBch990DxJif2vsSx8zpny0fxBVPQxGdvFce7ZeJeqm96qLreKbZlw7OQacHsDdQOIBcm6iQjLNgyGF4CnMx7EnH2wTOiBwatOdc1sd8lohx9T1RXrpRd9XLyRmSIdrYEZKD1B8yQOqJRM3cvATAwrfZAZz9D+l1yRhb9SRe9MyDa+07eq4EYeJhUPb+2RZcDx2/O8EqLY4tciy2WRVtF7V/hv534FX+xYL9ntH4Kg6CiiOl0frjrMzhOpJGMNu4Q
    1⤵
    • Executes dropped EXE
    • Modifies Internet Explorer settings
    • System policy modification
    PID:4876

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Software Discovery

1
T1518

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleCrashHandler.exe
    Filesize

    71KB

    MD5

    03114dadbd9977fc823f95b21fb987e7

    SHA1

    0e7cc420b0be38296ef8516dc3786361119f1f5f

    SHA256

    9ee9cfe293a8c2aa59ac8b65ba93f47c5ed4134793bc0f8102870d63cbb7a68b

    SHA512

    dcd85d7ee439a00827fba3cb2d5c8c24a5a508dd359699a43178c6cfa122d0128659392a29283945757ba8853a0e6a270a2aee003424973c3e4d598cd7635d3f

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleUpdate.exe
    Filesize

    67KB

    MD5

    d858ba2ee718b1db1ced20646e641d08

    SHA1

    01c53fbc0030066fe9032fec431d9ea26b5811cc

    SHA256

    9e63f6d3ab97d53924b975ed233cf595efaedca94ab513398cb892684c8027f1

    SHA512

    08bd015cf63062be24878026a01d07562a5ba5f4eb4f06f2674e13b92d24c31d38580974f23713f67f713c9098c1847b5b1cc49bb89c1c93d8fad2c73d237a4c

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleUpdate.exe
    Filesize

    67KB

    MD5

    d858ba2ee718b1db1ced20646e641d08

    SHA1

    01c53fbc0030066fe9032fec431d9ea26b5811cc

    SHA256

    9e63f6d3ab97d53924b975ed233cf595efaedca94ab513398cb892684c8027f1

    SHA512

    08bd015cf63062be24878026a01d07562a5ba5f4eb4f06f2674e13b92d24c31d38580974f23713f67f713c9098c1847b5b1cc49bb89c1c93d8fad2c73d237a4c

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\GoogleUpdateHelper.msi
    Filesize

    140KB

    MD5

    fc7a2f466f7a0f3e873077505719c1a1

    SHA1

    f729c4cdf49744729357319e10da2514ec40cb03

    SHA256

    5588dfe6fbe9eed8fd7e207cf91cf355979788360e1e27bfc0f0e3208ebeedb4

    SHA512

    43cbbd39e6f02dec5a0df026ba38953587a1c16e2a7a7e898c6ac508ff94fa127264c45ab9e3aaeadbd270666591306970d7718f03a8898bd5f2e6f83cd7f96d

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\goopdate.dll
    Filesize

    744KB

    MD5

    28e5f1fb21e09e6d504ec20acaa580bf

    SHA1

    f54259d88e8c94aa7f498050c82f41df8a6dc5ad

    SHA256

    ba2fa0819dba4d0c1c0aa59c54d657fa7d8f432ee7efcfb78ac21149f951aba3

    SHA512

    39e4b0903a90df6461faf060a899c69e848af3c0202a34f12ec3844479447ba9e8479036d6631dee8f8b6746f8762df3f5027040ca9da00eff2d91ca288d6753

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\goopdate.dll
    Filesize

    744KB

    MD5

    28e5f1fb21e09e6d504ec20acaa580bf

    SHA1

    f54259d88e8c94aa7f498050c82f41df8a6dc5ad

    SHA256

    ba2fa0819dba4d0c1c0aa59c54d657fa7d8f432ee7efcfb78ac21149f951aba3

    SHA512

    39e4b0903a90df6461faf060a899c69e848af3c0202a34f12ec3844479447ba9e8479036d6631dee8f8b6746f8762df3f5027040ca9da00eff2d91ca288d6753

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\goopdateres_en.dll
    Filesize

    26KB

    MD5

    129ffa7149b12b655cb71056064dd9e6

    SHA1

    2b2ffd8b3b659bd0963bf2a8da7d4c10e4dbd8ac

    SHA256

    f9fb6751ca8329a645814bf1483870d1c0f084f3a77fc79ab438aacc36feb581

    SHA512

    3ea12811b5ee047785c70dc34b9cb9482e078b18347e1c80a49491116f6c942b24e4d5b820bbed0fd8c1db048faa7b7b506accff3a55877c12e74a2852cd1396

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\npGoogleUpdate4.dll
    Filesize

    215KB

    MD5

    c21ab59e6240a86c3f21e1f89b092348

    SHA1

    95cb7efd1f795035d7800cb6e9963ba0b673997b

    SHA256

    e5d79663c35a4843793f15c7c1fa5007da0cb91792124b2ddf6f7bafe0863365

    SHA512

    0556d9e5e723f72dcd8fb31d30c8ad440153002f70531cc2f509e98e9225402b51a06ab3194b0e838f379b5d7d7b63023f7e16f903b4d894717f3dd84aaa11ac

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\psmachine.dll
    Filesize

    152KB

    MD5

    fefef2f226fd6be184bc4a3378b02aaf

    SHA1

    edb4a6c7e75e18acb805418effd78267bb2f37c4

    SHA256

    126c7a3934655730e4173fb80103fbd40426a3dc4667cb56073072ac62e56bbb

    SHA512

    b5ed060d491b049b7eba60f01531ee174383d81a001d57ad246b274d2ea32f0b43559bd1fd8fc74358c3d36c4e826d3bfdb569932be375037497ff956a163870

  • C:\Users\Admin\AppData\Local\Temp\comh.154828\psuser.dll
    Filesize

    152KB

    MD5

    8d90bb3a36521b50d0e512a781e36871

    SHA1

    399ce73fbd27eabb303fd899656e3c66c55b3f29

    SHA256

    9901c1fb64c2b0c23f60b754f8d6a57a257a694ea880a7e36836c2043dde214d

    SHA512

    62478dab27233e1180cee87eccf3b74bd48d5b2fe022f83a03a131341621f311666397dd6fc75db72c9bda75b80ad391bb40d12141e8380d899731625978b711

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils.dll
    Filesize

    837KB

    MD5

    73b3a19d57de0ffbf360ef662917c979

    SHA1

    8a9296f0a4c8068206f29fbeda0011e002fea475

    SHA256

    83f191b4e1a632768e5dca86e8c76b16fb77c7023b3d5ab967c57792b17a9f9e

    SHA512

    dbc94d32aadb18eaccf807d5ec1702678a538b335c0248a0f101e21a867b8ecddaf73b034643cafc19b55d5636a763a831feef06404777f621fcd75e578ac89a

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\InstallerUtils2.dll
    Filesize

    95KB

    MD5

    efe2d31cb30a164eeb99d1ac5b5430e5

    SHA1

    43a6dea3f8dbd9b0ac145ee390e9a42422fc56cf

    SHA256

    394366130eaf28bc49479f629f3c2b6bc0a2c11c839e8b50230561c49a1fd19a

    SHA512

    a6a0e2da36a69615262c0133af33ee2275c45300f926a08d3210df5df56b49ae72f4a1979ab59560efceae293429b059aa29fd8a94b33cf80d53c480ffef33ae

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\StdUtils.dll
    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\System.dll
    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\UserInfo.dll
    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\UserInfo.dll
    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\inetc.dll
    Filesize

    20KB

    MD5

    4c01fdfd2b57b32046b3b3635a4f4df8

    SHA1

    e0af8e418cbe2b2783b5de93279a3b5dcb73490e

    SHA256

    b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014

    SHA512

    cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\inetc.dll
    Filesize

    20KB

    MD5

    4c01fdfd2b57b32046b3b3635a4f4df8

    SHA1

    e0af8e418cbe2b2783b5de93279a3b5dcb73490e

    SHA256

    b98e21645910f82b328f30c644b86c112969b42697e797671647b09eb40ad014

    SHA512

    cbd354536e2a970d31ba69024208673b1dc56603ad604ff17c5840b4371958fc22bafd90040ae3fb19ae9c248b2cfce08d0bc73cc93481f02c73b86dbc0697b2

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\md5dll.dll
    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\md5dll.dll
    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\md5dll.dll
    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\md5dll.dll
    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\nsisos.dll
    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • C:\Users\Admin\AppData\Local\Temp\nsu62C.tmp\nsisos.dll
    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\Orimcvh.exe
    Filesize

    11.1MB

    MD5

    4a76843746b4591bd5ffa9dc46ffebb6

    SHA1

    aad700cddc630b009acf816492a88d61ac10502e

    SHA256

    88a5e7419445439cb90f875b5fb9501654dc63ec6804985dc11ffec151e922b2

    SHA512

    f9a50e4fa417e03340b4db274696b78131a89e04332d3d1714238dd7777cc43882421ef0952e2e451b3ffb3c8a0da3686cf359a6e6fc1e772898e9b4b38cb6bc

  • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\Orimcvh.exe
    Filesize

    11.1MB

    MD5

    4a76843746b4591bd5ffa9dc46ffebb6

    SHA1

    aad700cddc630b009acf816492a88d61ac10502e

    SHA256

    88a5e7419445439cb90f875b5fb9501654dc63ec6804985dc11ffec151e922b2

    SHA512

    f9a50e4fa417e03340b4db274696b78131a89e04332d3d1714238dd7777cc43882421ef0952e2e451b3ffb3c8a0da3686cf359a6e6fc1e772898e9b4b38cb6bc

  • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\StdUtils.dll
    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\System.dll
    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsuAE85.tmp\WrapperUtils.dll
    Filesize

    58KB

    MD5

    ad076872caa05a4e009e045301cedcd8

    SHA1

    8d0498321982c03cc88b2881ea9398f2af5db785

    SHA256

    fa69b8f3e6c99c7f717d824b22306de0dfed6e2b6c0bc70f7aada4f855f44590

    SHA512

    dbfeea82ac9c92bd4c7ac09069f32e7b20fe0ee52d27562db1605b570c21f6ba381cb0a0e42450a81c05773c6d7bf891c8d97733b08ab38f11a597d9a6196222

  • memory/788-232-0x0000000000000000-mapping.dmp
  • memory/1368-250-0x0000000000000000-mapping.dmp
  • memory/2140-200-0x0000000000000000-mapping.dmp
  • memory/2228-202-0x0000000000000000-mapping.dmp
  • memory/2320-253-0x0000000000000000-mapping.dmp
  • memory/2344-203-0x0000000000000000-mapping.dmp
  • memory/2488-201-0x0000000000000000-mapping.dmp
  • memory/3100-231-0x0000000000000000-mapping.dmp
  • memory/3188-252-0x0000000000000000-mapping.dmp
  • memory/3228-220-0x0000000000000000-mapping.dmp
  • memory/3440-187-0x0000000000000000-mapping.dmp
  • memory/3628-204-0x0000000000000000-mapping.dmp
  • memory/3796-206-0x0000000003E00000-0x0000000003E09000-memory.dmp
    Filesize

    36KB

  • memory/3796-207-0x0000000003E00000-0x0000000003E09000-memory.dmp
    Filesize

    36KB

  • memory/3796-160-0x0000000004741000-0x0000000004744000-memory.dmp
    Filesize

    12KB

  • memory/3796-215-0x0000000005AC0000-0x0000000005C68000-memory.dmp
    Filesize

    1.7MB

  • memory/3796-205-0x0000000003E00000-0x0000000003E09000-memory.dmp
    Filesize

    36KB

  • memory/3796-222-0x0000000005C00000-0x0000000005D32000-memory.dmp
    Filesize

    1.2MB

  • memory/3796-221-0x0000000005C01000-0x0000000005CC7000-memory.dmp
    Filesize

    792KB

  • memory/3796-155-0x0000000003E00000-0x0000000003E09000-memory.dmp
    Filesize

    36KB

  • memory/3796-135-0x0000000000000000-mapping.dmp
  • memory/3796-209-0x0000000005900000-0x0000000005AA8000-memory.dmp
    Filesize

    1.7MB

  • memory/3796-226-0x0000000005D40000-0x0000000005E72000-memory.dmp
    Filesize

    1.2MB

  • memory/3796-234-0x0000000006050000-0x00000000061EC000-memory.dmp
    Filesize

    1.6MB

  • memory/3796-242-0x0000000006050000-0x0000000006182000-memory.dmp
    Filesize

    1.2MB

  • memory/3796-244-0x0000000006191000-0x0000000006257000-memory.dmp
    Filesize

    792KB

  • memory/3796-245-0x0000000006190000-0x00000000062C2000-memory.dmp
    Filesize

    1.2MB

  • memory/3796-208-0x0000000003E00000-0x0000000003E09000-memory.dmp
    Filesize

    36KB

  • memory/3856-251-0x0000000000000000-mapping.dmp
  • memory/4060-249-0x0000000000000000-mapping.dmp
  • memory/4620-254-0x0000000000000000-mapping.dmp
  • memory/4732-214-0x0000000000000000-mapping.dmp
  • memory/4996-233-0x0000000000000000-mapping.dmp