Resubmissions

28-01-2023 03:33

230128-d4c5taea49 10

28-01-2023 03:25

230128-dyre9afd41 10

Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2023 03:33

General

  • Target

    Redline_20_2_crack/Panel/RedLine_20_2/Tools/Chrome.exe

  • Size

    1.1MB

  • MD5

    92cfeb7c07906eac0d4220b8a1ed65b1

  • SHA1

    882b83e903b5b4c7c75f0b1dc31bb7aa8938d8fa

  • SHA256

    38b827a431b89da0d9cdd444373364371f4f6e6bf299e7935f05b2351ca9186c

  • SHA512

    e2ee932f5b81403935a977f9d3c8e2e4f6a4c9a1967b7e1cf61229a7746a24aae486ac6b779fb570f1dff02a3ff30107044f0427ce46474b91d788c78c8fcfbf

  • SSDEEP

    24576:q6JGMnMpfVArKlhbP6GFibQC1QSvKZHHf1FqbI4Cn:47/MPGFibsSipHubPa

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 47 IoCs
  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Registers COM server for autorun 1 TTPs 25 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Redline_20_2_crack\Panel\RedLine_20_2\Tools\Chrome.exe
    "C:\Users\Admin\AppData\Local\Temp\Redline_20_2_crack\Panel\RedLine_20_2\Tools\Chrome.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdate.exe
      "C:\Program Files (x86)\GUM839C.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"
      2⤵
      • Executes dropped EXE
      • Sets file execution options in registry
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:448
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        PID:4304
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:1552
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:3220
        • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe
          "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateComRegisterShell64.exe"
          4⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Loads dropped DLL
          • Modifies registry class
          PID:4268
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNC4xMSIgc2hlbGxfdmVyc2lvbj0iMS4zLjM0LjExIiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezcwNEM5NTFBLTg2MTMtNDA1Ny05RUUzLURBQkFFRjNFRkJEQX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9IntDNzAwN0UzMC01MUVGLTQ2N0YtODY5MS00MkVBRTMzRTIxNEJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezQzMEZENEQwLUI3MjktNEY2MS1BQTM0LTkxNTI2NDgxNzk5RH0iIHZlcnNpb249IjEuMy4zNi43MSIgbmV4dHZlcnNpb249IjEuMy4zNC4xMSIgbGFuZz0icnUiIGJyYW5kPSIiIGNsaWVudD0iIiBpaWQ9InsxNDdFMUEzMS01RTQ5LUFDRDQtNzY0Ni1FMkVFNkZBMjJCNTZ9Ij48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBpbnN0YWxsX3RpbWVfbXM9IjE5NTQiLz48L2FwcD48L3JlcXVlc3Q-
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3596
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{704C951A-8613-4057-9EE3-DABAEF3EFBDA}"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3016
  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\109.0.5414.120_chrome_installer.exe
      "C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\109.0.5414.120_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Windows\TEMP\guiC25B.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe
        "C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Windows\TEMP\guiC25B.tmp"
        3⤵
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Registers COM server for autorun
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x238,0x23c,0x240,0x21c,0x244,0x7ff745621148,0x7ff745621158,0x7ff745621168
          4⤵
          • Executes dropped EXE
          PID:3880
        • C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{35BB21DC-6EDB-47A6-9490-A54F5BF8944F}\CR_D7255.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x238,0x23c,0x240,0x210,0x244,0x7ff745621148,0x7ff745621158,0x7ff745621168
            5⤵
            • Executes dropped EXE
            PID:3040
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNC4xMSIgc2hlbGxfdmVyc2lvbj0iMS4zLjM0LjExIiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezcwNEM5NTFBLTg2MTMtNDA1Ny05RUUzLURBQkFFRjNFRkJEQX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9InswMDgzQzEwRi00N0Q0LTRCRTgtQjE4NC02MjBDRjExRjFBRTh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzQy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEwOS4wLjU0MTQuMTIwIiBhcD0ieDY0LXN0YWJsZS1zdGF0c2RlZl8xIiBsYW5nPSJydSIgYnJhbmQ9IiIgY2xpZW50PSIiIGluc3RhbGxhZ2U9Ijc3IiBpaWQ9InsxNDdFMUEzMS01RTQ5LUFDRDQtNzY0Ni1FMkVFNkZBMjJCNTZ9IiBjb2hvcnQ9IjE6Z3UvaTE5OiIgY29ob3J0bmFtZT0iU3RhYmxlIEluc3RhbGxzICZhbXA7IFZlcnNpb24gUGlucyI-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjM0NCIgZG93bmxvYWRfdGltZV9tcz0iNjk1MyIgZG93bmxvYWRlZD0iOTMxMjI2MDAiIHRvdGFsPSI5MzEyMjYwMCIgaW5zdGFsbF90aW1lX21zPSI1MDA5MyIvPjxkYXRhIG5hbWU9Imluc3RhbGwiIGluZGV4PSJlbXB0eSIvPjwvYXBwPjwvcmVxdWVzdD4
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
  • C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateOnDemand.exe
    "C:\Program Files (x86)\Google\Update\1.3.34.11\GoogleUpdateOnDemand.exe" -Embedding
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2232
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xfc,0x100,0x104,0xc0,0x108,0x7ffd711e6b58,0x7ffd711e6b68,0x7ffd711e6b78
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2276
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4592
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:2
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4308
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2304 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2436
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:3716
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:220
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=3740 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:2160
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=4744 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:2532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4908 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1060
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5052 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2092
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5460 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:1512
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2016
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:488
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4776 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2344
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5692 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:1
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          PID:3704
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3384
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4748
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4616
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3272
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3768 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2480
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3128
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:1524
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2620
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6004 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:3484
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5940 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2228
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2652 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:4492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1712 --field-trial-handle=1672,i,3360573560250469278,3860710251628647189,131072 /prefetch:8
          4⤵
          • Executes dropped EXE
          PID:2440
  • C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1648

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GUM839C.tmp\GoogleCrashHandler.exe
    Filesize

    287KB

    MD5

    a2d8bef0cca959e4beb16de982e3771c

    SHA1

    5713e1542a47f5dab9d6c4fb58092dea0c9bea4a

    SHA256

    aff4f2d3049b10893265524f4f1eeb297a60a9414f80ea3695bf1c58de2bc43d

    SHA512

    3df564bd32a3c5bcd91aa6b71561c79351b462a33e6a8901c3a451d706f012ed077000f6cb89017ed6014e209e81fab414e90d54cd6bb6100c4f355108e7dd2c

  • C:\Program Files (x86)\GUM839C.tmp\GoogleCrashHandler64.exe
    Filesize

    364KB

    MD5

    30c7cbced8e3689e30299cabad4b9ac7

    SHA1

    2c8f9adc1f8b6fc53c1489c59ac59034a47f552e

    SHA256

    296f1bc3a9e0210ada077895deafb9969aa8073189f1f3eb0736e9e87d17bb05

    SHA512

    6cfa66872d8db974ae21324aa12b65e5994a334121d2a33e3ce680b244813879b4a59e819ab51df27febebab303d7dac1331420ab683c6e8035473bc0ebe31cf

  • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdate.exe
    Filesize

    151KB

    MD5

    82f657b0aee67a6a560321cf0927f9f7

    SHA1

    703175455354cdbd4244668c94704fee585a9228

    SHA256

    794cf7644115198db451431bca7c89ff9a97550482b1e3f7f13eb7aca6120a11

    SHA512

    5407eac0dc840aee05265bdc0810865890fed09d7b83ff0dc3f3e4ed4a322a3716710c35208fe8a95ffb0ab2a051e5305825c3251ceb2dd7e0cde6e9cc4f97c2

  • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdate.exe
    Filesize

    151KB

    MD5

    82f657b0aee67a6a560321cf0927f9f7

    SHA1

    703175455354cdbd4244668c94704fee585a9228

    SHA256

    794cf7644115198db451431bca7c89ff9a97550482b1e3f7f13eb7aca6120a11

    SHA512

    5407eac0dc840aee05265bdc0810865890fed09d7b83ff0dc3f3e4ed4a322a3716710c35208fe8a95ffb0ab2a051e5305825c3251ceb2dd7e0cde6e9cc4f97c2

  • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdateComRegisterShell64.exe
    Filesize

    179KB

    MD5

    396ba164448844fcd0c72dd802ac7db6

    SHA1

    51e738ad497fbfc289099444555180f4a123c39d

    SHA256

    f3ada0bb7459836ba250314ea6d417694c974445f0f7218ea8a48b60c557bb89

    SHA512

    e0c4b15fc23c7c4507e1b06767ba9170993f9dafd642d5c07e5693aa39dd760b8aa63ec21d694a849c70b7c2ece362e07d26983e24d90f7dc2ded8d86ff05646

  • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdateCore.exe
    Filesize

    401KB

    MD5

    cecfd51c91c3aa81093460598c5d02a2

    SHA1

    b5411b717d1fccaa166e795de6f6da0b422704b0

    SHA256

    a055856dcc22687bcbaa828342c851f87dd9de74dc5d647e7799d8ec4d7be0de

    SHA512

    a1b9e6938f4231dee231256dadeb00006c1f5d30f16f88644196a31692aa6c9ef02c32c94fc030a7c072cdc45741ed4cb89f09c14320eab63c4ad02e7ddfd880

  • C:\Program Files (x86)\GUM839C.tmp\GoogleUpdateHelper.msi
    Filesize

    40KB

    MD5

    202b7ec9d41cda7ecc9a5db38301ab9f

    SHA1

    16d3b1eb48a39d8161d0ebb54c0dfb32b9c66b60

    SHA256

    28280e562ea8a542551505a1944f98a723f31a18b1ba69f59431245e432d2779

    SHA512

    579490db7e77ee0553f3e2b4062cac1634f8ae7261e065f516e57df6fcadfdcb5b7b97296230279fad124139ba64cee7dd31b61c29b70bdef7a588974d7424bd

  • C:\Program Files (x86)\GUM839C.tmp\goopdate.dll
    Filesize

    1.0MB

    MD5

    69d1bf5384cea587e6cc69ac827cc02d

    SHA1

    ff9895fe5ba57f1b7675c7f69ccc08365aafa02f

    SHA256

    d8f9c6a2e3f784e4a9c9dd714e1fbfea1883b920216dc01ad9d56700b17c0671

    SHA512

    3c0bbc042a6e51eeb4fc48b63a984b5e1964364fee3e94e0debd6e61ab806890bc1cdc9bfd2a672e55195d9ea1c2725792d826c1211badce6a7574760ec61df0

  • C:\Program Files (x86)\GUM839C.tmp\goopdate.dll
    Filesize

    1.0MB

    MD5

    69d1bf5384cea587e6cc69ac827cc02d

    SHA1

    ff9895fe5ba57f1b7675c7f69ccc08365aafa02f

    SHA256

    d8f9c6a2e3f784e4a9c9dd714e1fbfea1883b920216dc01ad9d56700b17c0671

    SHA512

    3c0bbc042a6e51eeb4fc48b63a984b5e1964364fee3e94e0debd6e61ab806890bc1cdc9bfd2a672e55195d9ea1c2725792d826c1211badce6a7574760ec61df0

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_am.dll
    Filesize

    45KB

    MD5

    2e4a126b96812387b4b2287f0ac9984e

    SHA1

    f860ac32eb14282f9acb0beb8b17cb28c72d8ae6

    SHA256

    3593fb2cbdbe626f0162e2fd279f63447fb23591d68e460eed338410ea765f3c

    SHA512

    d7126dceb64cbc3daa42c7c1e5a4291e0d7bc61734704628c337ba150a51e1d6c5167ccd4bdca2f8a61be1e09d2cc4713641bd63a0ca7cf7a2245414e38ecdc8

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ar.dll
    Filesize

    44KB

    MD5

    73b513e081a75b2419a1e4ff96ea7a01

    SHA1

    3c076814f6e0d7e5ca77ca37d20b0d9f2a8ac4c5

    SHA256

    f2831ccdd15dedeeb7a097bcdb49ee31831274a3171f11809ea11c69b232b953

    SHA512

    337937733d4fafd55f5992bbba3960e5bb670f4cd87ec88e95ff28cfffc97f13d6ca18007c0fb769c1ac78ae3eb86f049a3c82f5dc69f5476c57ced894973a97

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_bg.dll
    Filesize

    47KB

    MD5

    c2ebb44d01d7a7d5b61aca6f82e16504

    SHA1

    e1a8e38eaf05234d9f10e055f920fdf1cd3ebe78

    SHA256

    d3f0fb94c9cfac96d685cc47e9456ad86d1b5bcf03bd0db11255d33a2a360adb

    SHA512

    df100a50dcfa4cedbc0c0fc91aa76e90dae9bc377a645fcc2e9dde18736b36016c796c5273f2bfdecc505a150edb705ec7a0016df6281f345f8a2fe1093dfeca

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_bn.dll
    Filesize

    47KB

    MD5

    685ed2907a9d297d86ba33667b760086

    SHA1

    e6b98c9a3980099d279ddbc2eea94b3bbe094a50

    SHA256

    edbaf1e2ac0c335972ede1be0d425e9c8be4c68e4987778e6ae28f046e5d0d9a

    SHA512

    c35557b4f91476d8daebd9b13b06ce489ffc4f2a9e47155036c29ba22724e436917fd4ca467bb870905733d3ac5be8f85c22d2d39027b13b92a0b2b4b09092b2

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ca.dll
    Filesize

    47KB

    MD5

    038ef0dee664c858cdd550e717849c9c

    SHA1

    33143772d5c8570e5eaa894fdc58f3ca9f992e9e

    SHA256

    6d682e1347068253231be39136da2774255f758a4c8dc056f06e2bf875a3bdc1

    SHA512

    96844cad15f8dffd024adab2657643e06bcb026334ea7c7a9940d0c2c75b69f3284f108c50afeb243e4042ee9eaa00827368a354b97edd4212046db4c977ebe7

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_cs.dll
    Filesize

    46KB

    MD5

    ce1dd611a19e30291631a9657afd96b3

    SHA1

    af7f28802081381b4fd8c707151d0664cdaefc39

    SHA256

    0a8166e3963bd3e754487c1b57e84a429e1c1ec483d273da5ef2cc5e3a6115de

    SHA512

    5b0d5b2732a14a08fb4509408142a481c23e323adea6cdd90d8fe70c0dc58b48c46d47387409129a4e6be83a76733041a98d30fa749bd0544e3d88694a6d3b61

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_da.dll
    Filesize

    46KB

    MD5

    db5b3a59d09111bcd39c20f626b474bd

    SHA1

    fd3e35d9d00f14b99b8aba065d71e8261a6d5fe1

    SHA256

    79ffd7f3efccf614f7a1ed8ffdb49623694bc1b179c6f435ca56464a0526c57c

    SHA512

    bd0e2556183824efc610b248fe595b6f1e34d194fc0bc652f29fa7f07443121f9580d025e8b5088f91b18c771d1c63c1a93a72707fc228e70ac1a2e5dd0c3ea1

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_de.dll
    Filesize

    48KB

    MD5

    53a1f85365b0a7e9f9b28171c44a057e

    SHA1

    3ec8c9ec9ba32c5acb120175bd0fc876695d9583

    SHA256

    9e3a8acf0bf2655af754add6cc10e12cfa10a68da256e93192644a4fe3c8c7c9

    SHA512

    6db953a72dd346aa491bf21afe8d5537e773abdbf2e8e99d8c0b4d07635119016b07db52228322a7e72b29781cbdb7234bff018d4b5786a00f4b3f1f2b37a6c1

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_el.dll
    Filesize

    48KB

    MD5

    d052cadd807c25c72886906a9efbc86e

    SHA1

    c56bd5d490c1b6997ab884cd8dc2cb18659eee40

    SHA256

    47fd4fa0a2ef55bf44d00f9abe231dcc053972a04b09e9ac005f37f7926498cb

    SHA512

    37371289e77233f2a225a8ffc3e36800e5416bd7a02d4f826e8fc117264bb2157a67d7425b05c8eb60365e3a93307c28fd1c00279d89d9e42e51474585c9d507

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_en-GB.dll
    Filesize

    45KB

    MD5

    4281d3c6a33aae2ace4fdd78ac7b6b33

    SHA1

    85a291be91118fec09a84572375b2a2dc255d47b

    SHA256

    ebd5c1b6f76eb41a59b1118a16a45db8fb45b32a0dabe5f919c5d209f1e4cf85

    SHA512

    df2c45ac7afad9ff9e7bda93a6760b8e014c8d5411b664eb0aa711ca2f35baae72b791224ec1cee7bf2a3fe2e604278abf2a32584a2cf05a1299ccf1cf975cab

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_en.dll
    Filesize

    45KB

    MD5

    5473d86e3d71ecbea1ece30abf01cd8f

    SHA1

    f5df20dd87ff904b279ab4949f25b72bbcd4a7ee

    SHA256

    b036bcb285a4eac4fe744b88c03a2e553132c9896d784ce95effb437973134ae

    SHA512

    be4590f12c5c9f83ff19a1f248616ca0eb0206af55adb8f326f3b70922718e804dfcfa32e8afaadc42113e0c57642a0d0db8c3de72df2b844eb54aa2e03691ab

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_es-419.dll
    Filesize

    47KB

    MD5

    babcc3d7ac72bb5fcbf504b960b7a233

    SHA1

    33d6338b41cf7908ef589c9c27902dbb2c8f7186

    SHA256

    fce66f6407d801d0a8b6d47c7286622cb5d800d7520f5c14ac162fa3145dbfc1

    SHA512

    2bf865df175033a33756cc4ed7681930049808b2ee61068142eed07e1c68e4581a81dd4238d7d2ebca27b33d7d45f4000bb342637c14a7275c8fa87684438073

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_es.dll
    Filesize

    48KB

    MD5

    c6b78770986dcdcf2e873059a33fd64b

    SHA1

    3dbf01d0b5288d1b54195b4c62ca8831bbc5f089

    SHA256

    69f67cc945fdd476b6d43f213da7a6cb35ac9194efaa50ee8a1c5fbfacac7c7f

    SHA512

    ba83afcc2e04277e25787634e07adf4d11199b400fc491fe1d1b556657b648cb5a0857b37a9f9f0096db9ef949a0971a55ea4f8900adc24fbe652a9c96fe2b3f

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_et.dll
    Filesize

    46KB

    MD5

    b1583b0eb3b3c938f5f16cfae1022601

    SHA1

    96df2af0f594d3bd101cd13d8b08ad5c30a52744

    SHA256

    82a6a6d661093a2310660e49a171b2bbcea4ad2d2485074b82c6969eeefd825d

    SHA512

    e56f02313351bc8aedb93e34784fd9a0d2f92c7c31c6e21d898027eeab6c15cda17a839f2313174627f88051bd306dd60bbb58b40ffb67ac7159400a73c7d177

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_fa.dll
    Filesize

    45KB

    MD5

    54649821e243e218ffa10802191055b6

    SHA1

    b5b74efe139ba8418b1c56c7a3241d395aa0a499

    SHA256

    5a397ab4774fd5a7f0d7e0d4871812fa92e2f9e5f595e94a4b652fecc29674ae

    SHA512

    e31f81434fd90d2b9aa5f7832052236ca56b836362ea35088e03397510523c8ff0d19345d71767a649f42ef1808f05335fd9b27020c3fb5a2ac33cea456e9851

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_fi.dll
    Filesize

    46KB

    MD5

    8f20a78be087a95b80f1162ceba79b46

    SHA1

    c76e0616b18b6f86d25cc2ad05e2ad04fb07f090

    SHA256

    ba9494dec1273c3a5f629e4cd0990beea6f35168ab940693fe179f111cfa9a9b

    SHA512

    a289c1c7b11b0272cf12004ea5190d2344ec044585fcaf0967e80f66af0c6d0f9208e5ed935b006ae875b4f876ff993be19a702bece3610e748f342ad492ffed

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_fil.dll
    Filesize

    47KB

    MD5

    f230b256bb15dc4d6c3c70895185bb0b

    SHA1

    5ea5242bc95c294a4d6ac7904ac3538998c175b4

    SHA256

    abb5511af0c804210152ade4e3d140e586932aa078db535f3f240f2ad8bf3c45

    SHA512

    eb9fdddd86825fa463858fea9a1ff8adae3fa6d67a27ff34a4704a9d503baa52ec2713d51b474a84dca6e69b0204d44fbfb452082d10a33a84ffff3e93066245

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_fr.dll
    Filesize

    48KB

    MD5

    77fd989107f16f1749b4160c1f0339f4

    SHA1

    c0897a9b5cedccd68ca9466623b73b58777ddf97

    SHA256

    816361339757f2f9bbef560c902d4207ce6328a3506570e9b1df1e65f77f989c

    SHA512

    1ec841b2f9d54ad9d9f6dbb5ddbe3a97d17b23b3f4ea45707803a1b61876b79f793bf649da5c0db4264bf2adfa32395962f91e8c2aeae4bf664d4b57b0cb1ccb

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_gu.dll
    Filesize

    48KB

    MD5

    f42aad7002e1a4ac1d455fa51852b32c

    SHA1

    5ddf112b7a9afc2baf26e3d6168458875efdb327

    SHA256

    215c700fac5caed6e5073e10cd5a07e0409cf0107903476e9a52dc5494ff6389

    SHA512

    73bcb19f50cc1a9f56ca1e759a3362cad150cb9e2bae75563429f611987c82c2e6fde56d847161f84fd6db071def3a8ad996a553a5d7061162ce34be2a05d4e8

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_hi.dll
    Filesize

    46KB

    MD5

    a5a40fde77ce0330572603819f7eab1a

    SHA1

    83bb3a9f1daf58a1d3e4a213837bbf9b996ad11a

    SHA256

    1e19516dacf3e895e632cfa6e863d4896a5847281602c16cf3995c107860888e

    SHA512

    90d46291506bdc47968d771194039472e318d1c6600bee8c71846080419d88a3fb96e8abcae4b7b0001a1eec7d91b03b0edd68641ce77e9417de3dd19af14309

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_hr.dll
    Filesize

    47KB

    MD5

    41b96846b3e594d215e049bc6e44e7d5

    SHA1

    1e607f3285feade41c0c5c124dc2cf00423007c5

    SHA256

    f53fa99736059d03ca35499f15d39be942d6f3633d47942e98a79d423aeccacd

    SHA512

    c2fd0106cfafad09f3f456e3248ae0afdc57649ccf7950efa2b5c371f948982f17041c0c25870e9a597fa9d5ce4f18f4ed9685af501db6290c4828bb4792788b

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_hu.dll
    Filesize

    47KB

    MD5

    3b8977206e495c4c64273009e5a57f9b

    SHA1

    b63baf9e295dfdce61e4668ffcb131a846346d9c

    SHA256

    d815413523556b0d5a872c5a8a62a80bfb939e52c9d319054ef8b54a68928bdb

    SHA512

    6427ab789f87c213977de0844ab0162f4c11f1fcec464d5451ef3e7bd69389045b1c9c93900ff2387bd255e800884d2cd2b914740c50ad46a6947a6455fd1fef

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_id.dll
    Filesize

    46KB

    MD5

    0abb138c12fdf76e83704895273ba314

    SHA1

    82bcf40e6b03dae0c18c17fb16a48da2c9b7a90a

    SHA256

    7e676cf463cdc3f7f8ab3e41edc5dab966a86681ec4989ecc74d460cd1d56b60

    SHA512

    90dbd5bf06d597dc909eb28061b0975b7b8d8f95dac5582e924fcdb645d9e48d5580be718b76ac860dd1793a19e868844341762fea6ab1dfd0d89fffbb3a96c7

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_is.dll
    Filesize

    46KB

    MD5

    4c954e97257e899d5941e190fcef8ca9

    SHA1

    ba48b1400694a9db0248c9b4d7deef01185cd1d2

    SHA256

    c14d1ce67e2a671feb5cfab3176cb0c73b31585ba32d40d9f21b1a892c1b2e20

    SHA512

    5a635abb9834b83f77d8703ef7ac2450b23a0c08a853db9f3c23addc881c5a6c9f091910c2e8a5e57e777e58c50a316e2c7c0793e01d5129f4ff8a87ef7e216a

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_it.dll
    Filesize

    48KB

    MD5

    e476d68395afc1f1468ea27e7d801eab

    SHA1

    a227eac261c10ea4e1c6ca2ba739050c0ed33375

    SHA256

    44bab1dc2526c25560493fbd4d5dbb8c0cfdf53f99cbb6b9ed0ba765fb39bcab

    SHA512

    8687e25fb9711a7575da95fc0673b5bba9600bf2c08491c94d9d3bc2b44bee91abb2f082e1b5988226e1a603b132ad0bd29a8d2175bf01aae005b0bc174cb508

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_iw.dll
    Filesize

    44KB

    MD5

    0da881f72338a4fb295a3fb837a696e5

    SHA1

    adb1f526e96528f38e56ca514588927cc747e91d

    SHA256

    8c7a9d6f96d007d9557eea5009ce20b7d1be0334aa7d8168d79c9867a733a932

    SHA512

    2a04569abc10e8a5acacb5411a008cf0a60223033e188be55def796c063e7c652690f0119e454d65e0f3ef464e3143d392d58aa8fdf6405bff72e88d353d7eca

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ja.dll
    Filesize

    43KB

    MD5

    9a2fc61130b68ee41476d63f415447f1

    SHA1

    504bfce2ff3bb536324f77d959675c98ee6fbb28

    SHA256

    a3a60744f7c4853eb7e44b1840a6d3def05f3bbc53dbfec0c64b0de5e8bb5e2c

    SHA512

    22fe7827b113f8c2834b9ca3e25ae62029fa57c84c037cccbe2f019007d5cdc5dce3f7df0367fce99dda2315689f5a2975e8b029041c735dbadf6e7a0689d885

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_kn.dll
    Filesize

    48KB

    MD5

    072f51e42208a3d311105ef2fd72a883

    SHA1

    75ffea6e1d95c0806b04e3f16dc5976f19ab2b78

    SHA256

    77d6d93944a212f7efb2455f46db20277e0a5a4fada9a04a0d7392c5aa30cc22

    SHA512

    33755458ca0f3dcd36dc02a6ae781d3dbb0e9042a77159ad101c50b19444adf6979a73c3222cb804b7dc111a6b6f30ea707da00b1a7fc21ec15ca9dec05fbbbb

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ko.dll
    Filesize

    42KB

    MD5

    33a88023facdd939c6c14cb692cd55e7

    SHA1

    d05c983d49667360d06926011b0f8095e5c2cba7

    SHA256

    5b5feaa8f9f9621c63fdedba977c24c4a4519b3966e2d6e445a0ec9b2caa8a54

    SHA512

    f846aef7a6882c8ccdce3cf5d641d67e2637e44dcb055597c29f8e8bc360807129f7a0d828f0a8f03cfdc5bb27f6b6c3f0a2e194308e0a9e21fab5f3583968d9

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_lt.dll
    Filesize

    46KB

    MD5

    de7fd22ca9efb8f45842bef8b0ddd8b1

    SHA1

    f9593b2d031a8976117ae31a5d2cccf1bd859baf

    SHA256

    e0bc1b946e50ad5aa24c016524da2e251530062704178ae0f51f9af02a89e1fc

    SHA512

    2f3b299efb513e6faf8e361cbcaff90652ae08bac138a1662996c33f0b299a65c50fc3570ae0b1cce0a2b131a19e7ba06839dd819ff7bdb1e6a687d5022bd7e8

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_lv.dll
    Filesize

    47KB

    MD5

    bcc3f87f93fa8c9ff8efbca84abd4f20

    SHA1

    72f26fdc4c1eb80f19d70fe3da883874fe1b3eb8

    SHA256

    fc52bcaa4081a8bf597b6cdca4981c9b29b59bac40f8307fa334a3485d2009d9

    SHA512

    6e170a630255f5921c5de6f1e159f2c1a9d10acde461798151406e2e560f29b86f118486e3c99567fe0a637e0f3d347496042485e8061ff4875d5fc8b049d649

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ml.dll
    Filesize

    49KB

    MD5

    c75102b45b2086b3508b6c1258ddb604

    SHA1

    50047a285bbd90c20a8ac11eaf041469446da5f1

    SHA256

    8dd0d64d6883c721087e0f58b5c195893f0fb2451468fe5eccc7a9f44f3d1537

    SHA512

    56de8616b579cc5e2204d5e0c52441812424fa9f1703a237e221e5e0495dd2c09436c9fab713f01471ee6ee3aa52b0a1c3175affd552cb004fcf2cb07928560a

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_mr.dll
    Filesize

    47KB

    MD5

    28d4751e027905c336b515ae1f3aa180

    SHA1

    07eb485efc3c132835cd281ee69362c2827c9c21

    SHA256

    3c7a123cd8bf4515b7289692571de55f2b40c5fe6962b748e276af3906199442

    SHA512

    98aa17583e46051164d851fbc6f9b474a626920dbfdbd2117b9d41e142577c05256d9c0eab001311af1d376441455fda43309cf66c50a75529b50829e9b05eec

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ms.dll
    Filesize

    46KB

    MD5

    867d3bd67091a1475a5c4fe054d82fe5

    SHA1

    33f495238c94ef6842bcf3f0dc53bbb9d8dc7080

    SHA256

    3cd843128bfa0053aee3c6db136e146b0671a6908e3b7c8403d262a168e81922

    SHA512

    5af3e8adede786575b5aac54300df82a399cdd6f9103bb8b15e59b5d8db03e6602d06e21dc8fbee5cf599c51a537dc6707f79094081fb0034263d63da8bbd63a

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_nl.dll
    Filesize

    47KB

    MD5

    215ca7776e35f174224c07596b91ef73

    SHA1

    ff5d1524082ee947a2a05dad454b0d6c5ee5025b

    SHA256

    a2264b70bf36805f4ce1c9faabb52863f445d4ec30bb9b0517f6c24f94c833d0

    SHA512

    ff9ebb9123eaa5670ad9178894664872bc2f2d290fed76431c56cc92f227dbef4beac3574d385061ede6546565b800839d97cb8f9507ca8b19f0fbdd7fa7af29

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_no.dll
    Filesize

    46KB

    MD5

    dcf2797b1d7a5554b2b133d0484e8b08

    SHA1

    a543a0bf5d3bb13ccbf47b0f399431a85f3eb215

    SHA256

    178736becebb2d2e1081f0a6345fff39b6c47a52f0f87a61f3c32827e7957e18

    SHA512

    3cefbc4f384156794776a92b5c4e7a5a51f01e14dfeb411abecbc9ebf1dfbc803401210409431b764629e040a32cae7ef2eafedcff776c01a11dbc625d11be35

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_pl.dll
    Filesize

    47KB

    MD5

    16767444bef259c44868446eb88bdea2

    SHA1

    6ff62515f34b5cc0bd369f3d272c6ef66c063d8e

    SHA256

    1e12db31f943e5fbcf44c408ab1dea16347eab61eb5851e673857842ca4f9ce2

    SHA512

    1640e2eadc19ac35429753abbb52f871810c18e42b2e149b1577164f78e0c22164552837931f5ede87cbcab487a363576bff27466bbd69e0c35b809838346665

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_pt-BR.dll
    Filesize

    46KB

    MD5

    87cf92508e25a76a073b0a016805f994

    SHA1

    fbcc75d7bcb5f588637a7b6b762bfaaef231faee

    SHA256

    e1ec02f7cc5c625d4b5dde602b66f2648c19b953ff3648867d90153f6be8c845

    SHA512

    b15a5c9c78b0fe9e8c82c88661fcb3146f6a4a1dd5c9092c08597e070445dfac0c233353acad86348ef24901b9dea43ba4e97082c1e582ad96a2393c44acf41d

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_pt-PT.dll
    Filesize

    47KB

    MD5

    5a45a26a54f413fc9ae3010432ac28cf

    SHA1

    79285198fe7d0f71397817f75190fd54c2c2e4a5

    SHA256

    d2ed2b685d8c5352cca042ec2df9c9ac9b3dc1129d3e0a4c09c31956cd0ae105

    SHA512

    1fc3f559b3324613acb0ee920bfe432728354efb7c2c59459ee44a6b14b48987b5b1173b4a7c34ee3a0eef970506b4517ec7aba25976459795292d0f44823a7c

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ro.dll
    Filesize

    47KB

    MD5

    427d15f9015a3a16170aa4ed86f9c8e6

    SHA1

    6ee82448c93a2f916d4cfd193510e0c745b7ee46

    SHA256

    dc9b3d58d2ee1ba9eac47ef0c3e91edfb749fd6b6c7395b16f61d334f95833e1

    SHA512

    7374ff2ad04bcaeb273d1ce6a2d8efd7ee47d235f9ebbe75166c69801dcebd7310ce46f1cd795ebeb231ba4ba902e58ad5cffaef0818f291382db50ef2f1278b

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ru.dll
    Filesize

    46KB

    MD5

    af3349f27fc5996c634bcc5545108a55

    SHA1

    46d0a57a2925ce027e7d84f78dc1592496bb4842

    SHA256

    5aac683af9938cc98996f153bdfbed7319fc08a406ef801119e3a64f77ec6942

    SHA512

    7ccfb2955b1dd40f9ca26e37af130e367a0fc11e87d97f54d57655785e7130ea060e67cff31d6161cb13cc9349c655cacf73b7f7dbd63edc71a1e60fbed04ce1

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_sk.dll
    Filesize

    46KB

    MD5

    5e41887a7a732dcddc9589840bcc9402

    SHA1

    df0913bbb0d3233f4724a3f175c6d91d7aa29ea7

    SHA256

    22e6c17f2c519dd9d0c878175b609205f4690c386d70e2636d4b83f55f31b419

    SHA512

    d38b72a72c595604880698f7db96459525a6929182f2d6682138b86217fec22757f427efa7d0038655de6e22e6329be53ffd24762199ec515f547cbe1c32cd4b

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_sl.dll
    Filesize

    47KB

    MD5

    c337b1203f9293549ba29e5be5dcccff

    SHA1

    9bb3b158ef3850e2b108aa6660e6f668b66db8e4

    SHA256

    e2991885badc9d7f2737e61fc6421e80b7adcd6e9dab439728200333393f9a55

    SHA512

    c6a6703609c36af7c9f3b891786260f146d2609122d77e41f8cf94541f3044a9bff6e0047f1bd0c4f74eec806dad50fe52c30e66e0c18874ccdcac4f6904db1d

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_sr.dll
    Filesize

    46KB

    MD5

    964bdde2f1023e01412898233d72ea9d

    SHA1

    7d4ab12b3e02e57b7b54caa6fe3fa253620cef60

    SHA256

    b8d502c1edaeb2a9250c0d3ed6ab180500be1a7e57cf20848fefc3b8048bda45

    SHA512

    6e1e4cec5786262ad264de7b2275aaba3b7f90152d77e2554c34a1423885c6a2a2b7e95985d02176b110047da90f94e9c8fc58509c384962aa440ccb13c0539c

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_sv.dll
    Filesize

    46KB

    MD5

    cb51bc64dc2e3f1976af760830389773

    SHA1

    ce709b7ed52f1aa44dec05f59bcca2d531ed6af1

    SHA256

    0eb33c5e897c3bd154e1688574a8bc4f876146306f71bc25dbd13d52b966bd3a

    SHA512

    1d3eadfc1414db49cfb92ba2bd5260a1a0f24d1419d87e826d5a0b348b00fd8a2328701ffd2e6b2164670d870d44db3b9c43ff5361bf4bb8e07cb331d36ac94d

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_sw.dll
    Filesize

    48KB

    MD5

    15a7db5d784745f4c8f06ad17c062bb0

    SHA1

    57b74b49067320b5a5f4370af91a62bc3b494ca9

    SHA256

    51fea2ef842076e85df77fc809330805574c19cf4f9723a09ae9ce24a92591d8

    SHA512

    67541058fa530c9903f5c73232758914e1d690bff46170528b406f8d80936b236476d02f0983130d3ccab1f8ce88e6f285bd1b14c15cd4078f74732cbfb3f4af

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ta.dll
    Filesize

    48KB

    MD5

    36c0dee9d410cef6dd3178d7fc405810

    SHA1

    2b983aca4501b218e4c8de285cdd51f5c9adc2d6

    SHA256

    0df14319ce6648a457185c5214eda3595da1001cd495d90743498435ff1348ee

    SHA512

    9088e940a4452a0dd6f46a3f91e4e6ba25bc9aa6a035c1ee79b22483081749983351745e33a9a025b199cbc26f7e993b7477c9fae7e850b29e4ffff517afcf8e

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_te.dll
    Filesize

    48KB

    MD5

    572cd004b77c2314d1cb46465b9d4688

    SHA1

    eb53f76aa2d451d8af39f52fcb39c6a7e55db0cb

    SHA256

    75df260b8fd23e411fbc3a5bfb968a7ff794c0aa46d566107fe2c17caddd8cfb

    SHA512

    72d754be1bf6c3e3ed151b5ea24e3f7bb6163d7cb5a16bc648317aeeedcb62d49080dac9e5f78ff498cd02af6353d8e55bbfe8eed1b951d77c53506c35819d2a

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_th.dll
    Filesize

    45KB

    MD5

    8b8efafaf5c073c6be9603695c66bcf2

    SHA1

    cdd5e44f807924d740391460d82d10d67af706c1

    SHA256

    f143cf5135dd81fae72cc9f061b1320a059ab9a20b263d1e9612b37d029f61b7

    SHA512

    855ea7968838b8f3268a78216d201b3ba02ed90361cc9eb278bc9dc43563cf4e54db3b996b00f61a21f56bb9beeb801ce95cdcb51d3ab562c966d9183f8a2818

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_tr.dll
    Filesize

    46KB

    MD5

    015f150b0ad7dc922ea562e3baeb27ff

    SHA1

    95c21f3fd767cd9671edaa58f1fe72e9cb43a748

    SHA256

    48a5de95d4db906a4f7ec74a1c30c9fa4311113931438c9df9c72fb8f7260e64

    SHA512

    0d83511eb4e4cd8d5f69be04419d5209490c44690cdab57392f87adc47d392d1519c4cd139952da85c06fcf2b2b5bde24abc3249ed1aa123fac20f849dcb872a

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_uk.dll
    Filesize

    46KB

    MD5

    1704be0e60765c931b5a2aed62ed2ed3

    SHA1

    e7faa3ae38bd5a47604326a2e627ec0bb61b8b90

    SHA256

    b8027ca5e88df6fbf11705cc312a63d5659d2abb0d826dcc21255b72efbfc681

    SHA512

    6d7c4e42892068b9eca01369b26530063a7a6eb58b9a7d70ae7f213c7471ff781d374494bc6c3794587ec1ef9397cc0a412a86d4a5c7c89dca7a9c906d57a2a2

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_ur.dll
    Filesize

    46KB

    MD5

    002e1990162182adc8b81a7e5f1a85e5

    SHA1

    efc017a7378b9bbb30e8afb12decf6f398d8d00a

    SHA256

    8d476b5e01268c462d994c0799ea4bdd01cbeeefeb546eacc8b51e2c1ddda438

    SHA512

    527a060d167e8423c7ee3d3135a2488ef39bbffe855ddf5e1079e541a967a9f9b161311579c865edfe65a826890b869ac4180e76cc50510e1ed1dfea597402a8

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_vi.dll
    Filesize

    46KB

    MD5

    9660f97192873e3aafb6e1fb0277a2e6

    SHA1

    16599e467ae5d46e68061e8bae6ac6938ea0a34c

    SHA256

    0dc040171aca029892b70963216071ca51caa5c3dc4d6372eb447414b0a00689

    SHA512

    6fd430cf62197cbb61135fb80f575a79661fed4f5fd8660883bc59332948b3a7501a19816438b90930e26c1f60205efdc6f6870704188b6710bc9c95083a4666

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_zh-CN.dll
    Filesize

    40KB

    MD5

    0ffb741c8ae9d5925427f6825ba73759

    SHA1

    47076a6cece60f54e9e6198ea020bcc24b8613d9

    SHA256

    9ac0f7c55ff2ee4ca31d00f2a3d4ec30c53ab94c189f7d4228982f01893dce69

    SHA512

    bda1dd1a835b8e418868654c7f336851d59e0304dab2866d9026936393f9dd75b29997d69e99e3bb4ce58944fb46782a9fbfae1c34d32355b8a00b7695402822

  • C:\Program Files (x86)\GUM839C.tmp\goopdateres_zh-TW.dll
    Filesize

    40KB

    MD5

    8b78d5f5ecdd454911bef4c211f12875

    SHA1

    75ff9eeaf3a4f49fe16ad8473f18ab927e8e1501

    SHA256

    fb8f75752260ac1718ce82eb6e69ecbfd5623555ef9bbf32cb20076d23719405

    SHA512

    c72e831746234702d3cef0a2dcefcff4dd2aeb57df56529fb5394b433b3329c72b5e66a9721a98573d89f1bcd1864cefb342f656eff403f835bd39eab7f4a587

  • memory/448-132-0x0000000000000000-mapping.dmp
  • memory/860-198-0x0000000000000000-mapping.dmp
  • memory/1552-199-0x0000000000000000-mapping.dmp
  • memory/2232-209-0x0000000000000000-mapping.dmp
  • memory/3016-203-0x0000000000000000-mapping.dmp
  • memory/3040-208-0x0000000000000000-mapping.dmp
  • memory/3220-200-0x0000000000000000-mapping.dmp
  • memory/3596-202-0x0000000000000000-mapping.dmp
  • memory/3664-204-0x0000000000000000-mapping.dmp
  • memory/3880-206-0x0000000000000000-mapping.dmp
  • memory/3976-207-0x0000000000000000-mapping.dmp
  • memory/4268-201-0x0000000000000000-mapping.dmp
  • memory/4304-197-0x0000000000000000-mapping.dmp
  • memory/4408-210-0x0000000000000000-mapping.dmp
  • memory/5072-205-0x0000000000000000-mapping.dmp