Analysis

  • max time kernel
    162s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 15:31

General

  • Target

    gpg4win-4.3.1.exe

  • Size

    33.9MB

  • MD5

    cff05af81adc5ca0066baf07d17edb24

  • SHA1

    7c5fa919c2eb90194e844de027a36e87c7be8a80

  • SHA256

    2db44b086d860c51a4f45f43a739cd20fb0822189deb1c1cf13e4b5a3b05bc3b

  • SHA512

    6db824e5da2a9c0af492e78f06fd18fc864eefeb3de4861b09eee6e9da7db2b4a5c181061262deb530dedd56640c314647cac4b49c9b7bb65f7b6020f79f4e10

  • SSDEEP

    786432:4xIC7bI5s6sxkbB2mULpBWfrw5nqGBbC7cSEW/4jHQrXcvbYZJiGLEhUiqQS:QwK6sSbB3ULpBWM5qG62HqBiqFQS

Malware Config

Signatures

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gpg4win-4.3.1.exe
    "C:\Users\Admin\AppData\Local\Temp\gpg4win-4.3.1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\gnupg-w32-2.4.5_20240307-bin.exe
      "C:\Users\Admin\AppData\Local\Temp\gnupg-w32-2.4.5_20240307-bin.exe" /S /D=C:\Program Files (x86)\Gpg4win\..\GnuPG
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      PID:3012
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32" /s "C:\Program Files (x86)\Gpg4win\bin_64\gpgol.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\Gpg4win\bin_64\gpgol.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:432
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32" /s "C:\Program Files (x86)\Gpg4win\bin_64\gpgex.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\Gpg4win\bin_64\gpgex.dll"
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        PID:3020
  • C:\Program Files (x86)\Gpg4win\bin\kleopatra.exe
    "C:\Program Files (x86)\Gpg4win\bin\kleopatra.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Program Files (x86)\Gpg4win\bin\gpgme-w32spawn.exe
      "C:\\Program Files (x86)\\Gpg4win\\bin\\gpgme-w32spawn.exe" "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpgme-Vsa9jn" "C:\\Program Files (x86)\\GnuPG\\bin\\gpgconf.exe" "--list-dirs"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Program Files (x86)\GnuPG\bin\gpgconf.exe
        "C:\\\\Program Files (x86)\\\\GnuPG\\\\bin\\\\gpgconf.exe" "--list-dirs"
        3⤵
        • Executes dropped EXE
        PID:436
    • C:\Program Files (x86)\Gpg4win\bin\gpgme-w32spawn.exe
      "C:\\Program Files (x86)\\Gpg4win\\bin\\gpgme-w32spawn.exe" "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpgme-hFxLuA" "C:\\Program Files (x86)\\GnuPG\\bin\\gpgconf.exe" "--list-components"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Program Files (x86)\GnuPG\bin\gpgconf.exe
        "C:\\\\Program Files (x86)\\\\GnuPG\\\\bin\\\\gpgconf.exe" "--list-components"
        3⤵
        • Executes dropped EXE
        PID:3396
    • C:\Program Files (x86)\Gpg4win\bin\gpgme-w32spawn.exe
      "C:\\Program Files (x86)\\Gpg4win\\bin\\gpgme-w32spawn.exe" "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpgme-tQGxFN" "C:\\Program Files (x86)\\GnuPG\\bin\\gpg.exe" "--version"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Program Files (x86)\GnuPG\bin\gpg.exe
        "C:\\\\Program Files (x86)\\\\GnuPG\\\\bin\\\\gpg.exe" "--version"
        3⤵
        • Executes dropped EXE
        PID:4768
    • C:\Program Files (x86)\Gpg4win\bin\gpgme-w32spawn.exe
      "C:\\Program Files (x86)\\Gpg4win\\bin\\gpgme-w32spawn.exe" "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpgme-hrDqQ0" "C:\\Program Files (x86)\\GnuPG\\bin\\gpgsm.exe" "--version"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Program Files (x86)\GnuPG\bin\gpgsm.exe
        "C:\\\\Program Files (x86)\\\\GnuPG\\\\bin\\\\gpgsm.exe" "--version"
        3⤵
        • Executes dropped EXE
        PID:1056
    • C:\Program Files (x86)\Gpg4win\bin\gpgme-w32spawn.exe
      "C:\\Program Files (x86)\\Gpg4win\\bin\\gpgme-w32spawn.exe" "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpgme-Qxlr1d" "C:\\Program Files (x86)\\GnuPG\\bin\\gpgconf.exe" "--version"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Program Files (x86)\GnuPG\bin\gpgconf.exe
        "C:\\\\Program Files (x86)\\\\GnuPG\\\\bin\\\\gpgconf.exe" "--version"
        3⤵
        • Executes dropped EXE
        PID:4376
    • C:\Program Files (x86)\GnuPG\bin\gpgconf.exe
      "C:\Program Files (x86)\GnuPG\bin\gpgconf.exe" --show-versions
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Program Files (x86)\GnuPG\bin\dirmngr.exe
        "C:\Program Files (x86)\GnuPG\bin\dirmngr.exe" --gpgconf-versions
        3⤵
        • Executes dropped EXE
        PID:1624

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GnuPG\share\locale\pl\LC_MESSAGES\gnupg2.mo
    Filesize

    238KB

    MD5

    954e63685bf62aa9ae12c14c76131a63

    SHA1

    6fd1c5ca2d16e5e995c32fe9038dd4751d0d14f2

    SHA256

    27076a5fa4e6ad7b0fd43df445d1d6986c2d3add094d8885ed7ca390fa7ae68a

    SHA512

    677a32afe059b79f2a6856b8afc6b6a065d656d72a3fdb2363c0c47d8c9ca607ba0a8ad6ca5f97992a0873160ae155c117cecaaafd4a2fa3805c7b6dec3105b7

  • C:\Program Files (x86)\Gpg4win\bin\gpgex.dll
    Filesize

    536KB

    MD5

    6de54fbe7f86a98ab5c5b0ec513df79c

    SHA1

    c01632940bf6abf4e86278b420489e5d25c2e986

    SHA256

    37ac2063dd1372979909aa119e273b03c535208eac5039d14064d8ac960a0324

    SHA512

    7fd9ddd9910a853198e7660ab6ad08cc4865c39747d98a13049d1d7404a119f7738ee5a542b4b50d9e323dac0c05bf7bb7810c9e1550f5b9edaa9ae7fc67dabd

  • C:\Program Files (x86)\Gpg4win\bin\gpgol.dll
    Filesize

    2.9MB

    MD5

    0a6bd76d29c84f06d86c25a112c0f5a1

    SHA1

    781d480bb2326f708058d3ddc38a0e9051d632b3

    SHA256

    cdba64b14b33405f3efb988a6f15768563c8f620af4678f32a45be10ef2ce20a

    SHA512

    94660ce2e3550b7d897f8ec8ea86915190fa12dfd98b68ccc3d843af8a0109d65319a56c6fd31a0604b1527f203c073536b666986e6c3bb89424fe1b0fbb8bb7

  • C:\Program Files (x86)\Gpg4win\bin\kleopatra.exe
    Filesize

    4.8MB

    MD5

    56b7add491410755af6cad3fca38e0d5

    SHA1

    4608b90cf847963fc1ca500f4e21e0be45648827

    SHA256

    b83d684e1e5ca6ca9bb06ba01beb38745a9b11df2d9077435010ac8c7c92d4ad

    SHA512

    2fed1998b4e4f6bccc6cf57dba88495e8ea793c998fc5ed8a33a9e1743b1960cdbe669a6a1b7229eee92c0857e7573ab0d88d16dcb39e19563cc6b71f81e00bb

  • C:\Program Files (x86)\Gpg4win\bin\libKF5Codecs.dll
    Filesize

    274KB

    MD5

    7b11e553121fd8faefd52200777a6a40

    SHA1

    a5812b8b6edc196f0d7a1850558ed2290d503deb

    SHA256

    45bbb83e60198480ad39a652a5fc91f1238f3e51e25c07762b6eca7c4e2898bc

    SHA512

    f17398c4290ae6e9a2d7f5020ec990fe199dadd16126fb6ca81a394938a94fdd66271f90def56f9b9f5845170d8f7bed0fa52c42515c7c4593ea096034aeb2d1

  • C:\Program Files (x86)\Gpg4win\bin\libKF5ConfigCore.dll
    Filesize

    499KB

    MD5

    f716b2fa37dff739f08f3993b79d09b9

    SHA1

    724e4a865745a71c400b2b5a3d44a3b75e2aab06

    SHA256

    35c7e5d505ab4c35135157049cb057ee7a5729ac2b738570590aa7622bff64a3

    SHA512

    24dbda31d14e26606f8c3b2554f4ca6c717420a361db04c48197f91afa05a3a254b2530f884637e8778696a78aef205c5b2aece85bb37dcfe39794bc6643f362

  • C:\Program Files (x86)\Gpg4win\bin\libKF5ConfigGui.dll
    Filesize

    168KB

    MD5

    551427752ca4a73cfb85b7275d66f0d0

    SHA1

    1c212683f0ac6beee0ae0d015e99da198559b747

    SHA256

    a27ebf9a417ea3f561139eaea6b7d8318f802099c85e8d707bd088546872ec77

    SHA512

    e0dd4336f48ed79899409347a159a8d52376712fd594ab5e9e4b1f1873edea5cfee501adcd6c408af4449fe0b40adf933da517dc738e0db5a33e2e240c79b21d

  • C:\Program Files (x86)\Gpg4win\bin\libKF5ConfigWidgets.dll
    Filesize

    452KB

    MD5

    f3cd64079c40cede28c50bdf44cdf96d

    SHA1

    7d8a7e209165c499623a84e7cbee1f969a4e6d00

    SHA256

    3b0348d40f83b9b3edcb9168cb318140fa0a03823b4badd5c5991b8ab2d89365

    SHA512

    cfc7eec6b86d4b574550a1f5bcc9bb6807c4be3b9b97d64294466360886708a6baea078d8ff3a7ad436451b8e81a092efa5e8a6a53a7ac2beb76d9f1dc44ae39

  • C:\Program Files (x86)\Gpg4win\bin\libkleopatraclientcore.dll
    Filesize

    101KB

    MD5

    99b348c1671f79cb5b50b3929df1d34f

    SHA1

    7e73e393a4e15d1ba84ad91aa256d6c4620d8a81

    SHA256

    acfe84c4348b136c77b3781264edf04432504faa1dfea8f9d2bb144c021e5e82

    SHA512

    1b44a48cb3cf06efc0eceb09c19a985399fe7706dc4bd265dc020a2c62df625029f0759b24d86db01224aa9cdbdb5ff36c4d0007ac3dd6b4cb7b92693dacc883

  • C:\Program Files (x86)\Gpg4win\bin\libkleopatraclientgui.dll
    Filesize

    44KB

    MD5

    3d6173c0a2d499a43a12b8369a36e715

    SHA1

    ea370ed5cd5e63ec057fe063ee6a2b7298a666d0

    SHA256

    fd77fe0a7a1879260a2c2614291ba85e88f88d249a84f34d4da14909631cb52c

    SHA512

    eb4e7feefd0bd325c7fd87de88189ea190500ce84aee355cb614b63ccdbfdb4c2b58002394a7126adfde1a77b420ec7898183328ffa53fcb59de5b473e6ebbb9

  • C:\Program Files (x86)\Gpg4win\bin\libwinpthread-1.dll
    Filesize

    60KB

    MD5

    f3087bf95436d720143a1ed88c53edcd

    SHA1

    e82ec2fb41fd00bff787b6c0afdbfb7e2b260dc9

    SHA256

    0d2598850642932cf2fa3cfc344230796fd61c3171c784f3c523883893e0b5fb

    SHA512

    e6cc54d79f6ab32a555a791a0ea15e6e336443119d45f6ccef1c4de8fc196d9bcaeee22293badddab60fd4a771f79c4006d11a3b404834a9294c561a7c24fa89

  • C:\Program Files (x86)\Gpg4win\bin\translations\qtxmlpatterns_en.qm
    Filesize

    16B

    MD5

    bcebcf42735c6849bdecbb77451021dd

    SHA1

    4884fd9af6890647b7af1aefa57f38cca49ad899

    SHA256

    9959b510b15d18937848ad13007e30459d2e993c67e564badbfc18f935695c85

    SHA512

    f951b511ffb1a6b94b1bcae9df26b41b2ff829560583d7c83e70279d1b5304bde299b3679d863cad6bb79d0beda524fc195b7f054ecf11d2090037526b451b78

  • C:\Program Files (x86)\Gpg4win\bin_64\gpgex.dll
    Filesize

    492KB

    MD5

    6e3aa6891c29084e022089c4767396c8

    SHA1

    b91a892fa7ada3f5736960445abb1a1c1e86e19a

    SHA256

    5c99a4689c519fc0f918130cba268664a01e2ea23ede4e9aad5aee9abc1a3bc3

    SHA512

    65866cfbd80c451305c2f466ebc0c82018c0f280256e3e9f0f9b4084dffc4af2a0643d9283f5ba6cf7219102ea504b2880bc441719f0d079c9e78865d629431d

  • C:\Program Files (x86)\Gpg4win\bin_64\gpgol.dll
    Filesize

    2.8MB

    MD5

    cb24c4a9759526e8b1b1186e1bfc6371

    SHA1

    b71236abfeb6de237d8543db885d774ceadd1dce

    SHA256

    00cf36f72afabcba8c4b48d57b9afcae080d5df802501b488e4c16a8f712478e

    SHA512

    4d6b79c81d27acc0fec927eb1a56b269b074aa29030d03338a343d054d4e86c980b371cdc673d5598d54a34d3ece8e1ea7fbc05e809c73ad87b9e19d36f76fb1

  • C:\Program Files (x86)\Gpg4win\share\locale\eo\LC_MESSAGES\kio5.mo
    Filesize

    186KB

    MD5

    e91d1c7c64d01abf95b5c0e998aca584

    SHA1

    aae9ba479aca06991eaaedb54694ad7ed19fb66a

    SHA256

    29d0e8b53abaca6efa2e4d6b498ebee47b67460e4c8c2dbec4169021784603a3

    SHA512

    f0e7469ab29225b67a2867f2ab9801405384d3cbf07c9e2e199235dbf2794af478f91289277106fbe71f330d7d6957e4dbe90ce0e34e7678aa6437ad897a9546

  • C:\Program Files (x86)\Gpg4win\share\locale\es\LC_MESSAGES\okular.mo
    Filesize

    90KB

    MD5

    62da3c407727099a17afc361687f59a6

    SHA1

    4c0315143aa676e9a2e93282c226f32bbcfb5c48

    SHA256

    86cc5df4aae6df0d5bb6096cfde13bec5eb87f2fd03fcbb3992c6d75d7a17207

    SHA512

    ccf05c83c371ae1b8cd2ebd87d5906c3665b422118ed5a33a2f84acc86cfbc5a918c41b4186de99bbce70b12aa895008f2784521628103bde713b714ab0e0f1c

  • C:\Program Files (x86)\Gpg4win\share\locale\kk\LC_MESSAGES\kitemviews5_qt.qm
    Filesize

    30B

    MD5

    b83230a03cb46ec13cf38dfbb0f3b744

    SHA1

    f071802c2c5a46be2a65bd6282608034bdef99ed

    SHA256

    71f6122a857122143f1b51b5dc7669668a77e93d4c1bfa8c93c370330a7d4335

    SHA512

    6ca19700cbd8decfa19b897d1b073f1c2322544c659bc8cb7dbbc8fe381932e58205619f156026457a8cbf6088e178c33b31e6cc0337e5b1a553e97fa21dd4db

  • C:\Program Files (x86)\Gpg4win\share\locale\km\LC_MESSAGES\kitemviews5_qt.qm
    Filesize

    30B

    MD5

    da4e374c6587f14ec35db9b151acb1a5

    SHA1

    7a7f4bb69fd9f3762d75e385cd981902a3bced22

    SHA256

    962c69a60bf953b54428464f6acee3d68deb3b96f19e83ad1e5528e14e03170f

    SHA512

    6ad9c41d8441b4084cfb730ad857145a2b53b646f1af8fa6e36a17096407a5abe29eca86ed1e3750c463f728c48468714f3c15b41ea88fd09e30f179f183eab4

  • C:\Program Files (x86)\Gpg4win\share\locale\lv\LC_MESSAGES\kitemviews5_qt.qm
    Filesize

    36B

    MD5

    05dde48e23fac68bddfadd39c3b29ca5

    SHA1

    c9b83d712c2b9f68e5f631e4e1f0aa7779fc208c

    SHA256

    2327768f504d96b61af841e0673c88bc0eb093fd2ec45d5f9b257b2ad0609507

    SHA512

    991b5cc0fd0688364ab73b7548d9ce93681e44066cf11e20856d56625268da657aad1ae6b887fa5a4b11769e6c0d989a729ca443ed126e3f66cc060a14ea668b

  • C:\Program Files (x86)\Gpg4win\share\locale\nl\LC_MESSAGES\kleopatra.mo
    Filesize

    242KB

    MD5

    b97b250ccd52c1f4b787f9090f08eed9

    SHA1

    89f64bddba985e89f2f8f80004530a954097db8c

    SHA256

    bfbe5debd2d5ae555b96155b8bedd324e56164db4e0c5f7edfeb8a0018a0100a

    SHA512

    308641ab36a1005e5efa330953918d970ced65e0570435986312e9772859cc22b270d5d3951637d8a651264d8f23bd74ad545f406b186178b2c86ff50314561d

  • C:\Users\Admin\AppData\Local\Temp\gnupg-w32-2.4.5_20240307-bin.exe
    Filesize

    5.3MB

    MD5

    6efb76e751a360f5ef7bdee99b93a0f4

    SHA1

    9ffe88554341f28e077ef42150b149a851af2fae

    SHA256

    d2ac821ceacf9409ebcdb42ae330087ada30c732981f00b356f9c2f08fac4dc1

    SHA512

    2f08e850d00c951139ea2993c92915a884c9a49c64a547a186cd310eb43c5b9c9b59c46931eb38f241a5c66f76aa81fb85533db01ac848532cec9ab180b60b8b

  • C:\Users\Admin\AppData\Local\Temp\gpgme-Qxlr1d
    Filesize

    18B

    MD5

    dc07682612150fbea67f103bebe1fa26

    SHA1

    269dd24c33c82a9cbca5e80ea500dc09c47d9fbb

    SHA256

    0ed101d7d58f7a1b6726b14b616a7f9b636e57ab107ff5e62271790348db0b3c

    SHA512

    6d599e85dddeef2160d11e0f3bb1f437057e78143aba4efba16b3315d485270c1caf8beb2fa5dedc41a9a23d8dff55de593e165801b08e9ce723ac73c1519073

  • C:\Users\Admin\AppData\Local\Temp\nsa3A4C.tmp\LangDLL.dll
    Filesize

    7KB

    MD5

    20850d4d5416fbfd6a02e8a120f360fc

    SHA1

    ac34f3a34aaa4a21efd6a32bc93102639170e219

    SHA256

    860b409b065b747aab2a9937f02d08b6fd7309993b50d8e4b53983c8c2b56b61

    SHA512

    c8048b9ae0ced72a384c5ab781083a76b96ae08d5c8a5c7797f75a7e54e9cd9192349f185ee88c9cf0514fc8d59e37e01d88b9c8106321c0581659ebe1d1c276

  • C:\Users\Admin\AppData\Local\Temp\nsa3A4C.tmp\System.dll
    Filesize

    26KB

    MD5

    4f25d99bf1375fe5e61b037b2616695d

    SHA1

    958fad0e54df0736ddab28ff6cb93e6ed580c862

    SHA256

    803931797d95777248dee4f2a563aed51fe931d2dd28faec507c69ed0f26f647

    SHA512

    96a8446f322cd62377a93d2088c0ce06087da27ef95a391e02c505fb4eb1d00419143d67d89494c2ef6f57ae2fd7f049c86e00858d1b193ec6dde4d0fe0e3130

  • C:\Users\Admin\AppData\Local\Temp\nsa3A4C.tmp\UserInfo.dll
    Filesize

    6KB

    MD5

    9c8190bf734e58469eeb894b04c9fda0

    SHA1

    8ba2d3474ee1acf315fbccb7253e7cbdbae414c2

    SHA256

    88860534a424835a4bc47d3db8d0f4b1481442ed3efdeb7338a7ddf616651a60

    SHA512

    910af7da023bccda2dba873ff95769d24174b09c5f053e676e56a2f99f6e376009b7ee62fb23835285160c4c6feaba99c530b978c1085a37d610d3fa1a4f3727

  • C:\Users\Admin\AppData\Local\Temp\nsa3A4C.tmp\g4wihelp.dll
    Filesize

    82KB

    MD5

    1d21fa410d54e5782078f759c3b95a7d

    SHA1

    0e2d21ad8f6532a8c9dfb60c4f4058ef5985f2be

    SHA256

    5d360cffc1ff6c0f49289fab1181daa93164022228e87dd136c8fbbf100f2bb3

    SHA512

    79a0fef74d9c901ffd7a9a4de7c09b496564cfe8db2cd22feaf3ca3c42586a100294e3d937a5e7cfd150c8f5a9879d817030c08bf38ab26a328183fbf0f4c744

  • C:\Users\Admin\AppData\Local\Temp\nsa3A4C.tmp\nsDialogs.dll
    Filesize

    12KB

    MD5

    2029c44871670eec937d1a8c1e9faa21

    SHA1

    e8d53b9e8bc475cc274d80d3836b526d8dd2747a

    SHA256

    a4ae6d33f940a80e8fe34537c5cc1f8b8679c979607969320cfb750c15809ac2

    SHA512

    6f151c9818ac2f3aef6d4cabd8122c7e22ccf0b84fa5d4bcc951f8c3d00e8c270127eac1e9d93c5f4594ac90de8aff87dc6e96562f532a3d19c0da63a28654b7

  • C:\Users\Admin\AppData\Local\Temp\nsm94AB.tmp\InstallOptions.dll
    Filesize

    28KB

    MD5

    7770a504cf10db9899f7adc59d4c7dec

    SHA1

    d1ecc15b69af83aa8065199261e28d78947f7da8

    SHA256

    e2e74adc3704c5e7d52f10e17f384ba7d8d80c11900dda0ce8e578a9944c4dda

    SHA512

    694726085477e7e82c3b960d853910e12f24a6d97ac629586124b8d02def44da24f3ace6a3404ffa7bf2d410e93a1c6e918e149801201f4c9800991aabd6f212

  • C:\Users\Admin\AppData\Local\Temp\nsm94AB.tmp\g4wihelp.dll
    Filesize

    60KB

    MD5

    b0379f02947c072a1898230dcbe1e961

    SHA1

    b218c6ef3083c61ccceb562557b274ee2e0c29cc

    SHA256

    64167cab813702ae208521282121dba5bdf30fcda68809ae18c3a79ee31d4b30

    SHA512

    105949e108b1a9f1e404e6b6578de9427c3e0f424f95a6d0a5c4c0b9ea2554ab66419dbe49b70e39fc1dd45279a3ac8f0317c9da4d966647760fd9a2bd2b5239

  • memory/3012-301-0x0000000000400000-0x0000000000454000-memory.dmp
    Filesize

    336KB

  • memory/4400-48-0x0000000074A60000-0x0000000074A6B000-memory.dmp
    Filesize

    44KB

  • memory/4400-1446-0x0000000074B50000-0x0000000074B5E000-memory.dmp
    Filesize

    56KB

  • memory/4400-47-0x0000000074B50000-0x0000000074B5E000-memory.dmp
    Filesize

    56KB

  • memory/4400-46-0x0000000000400000-0x0000000000487000-memory.dmp
    Filesize

    540KB

  • memory/4400-1445-0x0000000000400000-0x0000000000487000-memory.dmp
    Filesize

    540KB

  • memory/4400-410-0x000000006A180000-0x000000006A19D000-memory.dmp
    Filesize

    116KB

  • memory/4400-379-0x0000000000400000-0x0000000000487000-memory.dmp
    Filesize

    540KB

  • memory/4400-388-0x0000000074B50000-0x0000000074B5E000-memory.dmp
    Filesize

    56KB

  • memory/4400-1499-0x0000000000400000-0x0000000000487000-memory.dmp
    Filesize

    540KB

  • memory/4400-400-0x0000000074A60000-0x0000000074A6B000-memory.dmp
    Filesize

    44KB

  • memory/4488-1509-0x00000000001D0000-0x00000000001E4000-memory.dmp
    Filesize

    80KB

  • memory/4488-1527-0x0000000001C60000-0x00000000022CE000-memory.dmp
    Filesize

    6.4MB

  • memory/4488-1503-0x00000000022D0000-0x0000000002433000-memory.dmp
    Filesize

    1.4MB

  • memory/4488-1505-0x0000000001510000-0x0000000001C54000-memory.dmp
    Filesize

    7.3MB

  • memory/4488-1501-0x0000000000BA0000-0x0000000000BFB000-memory.dmp
    Filesize

    364KB

  • memory/4488-1512-0x00000000029B0000-0x0000000002AAE000-memory.dmp
    Filesize

    1016KB

  • memory/4488-1513-0x0000000000C00000-0x0000000000C83000-memory.dmp
    Filesize

    524KB

  • memory/4488-1515-0x0000000002C80000-0x0000000002CA3000-memory.dmp
    Filesize

    140KB

  • memory/4488-1511-0x00000000027E0000-0x00000000029A8000-memory.dmp
    Filesize

    1.8MB

  • memory/4488-1518-0x0000000066240000-0x00000000662AD000-memory.dmp
    Filesize

    436KB

  • memory/4488-1520-0x000000006FEC0000-0x000000006FEDE000-memory.dmp
    Filesize

    120KB

  • memory/4488-1519-0x0000000066940000-0x0000000066F73000-memory.dmp
    Filesize

    6.2MB

  • memory/4488-1521-0x0000000066240000-0x00000000662AD000-memory.dmp
    Filesize

    436KB

  • memory/4488-1523-0x000000006FEC0000-0x000000006FEDE000-memory.dmp
    Filesize

    120KB

  • memory/4488-1522-0x0000000001510000-0x0000000001C54000-memory.dmp
    Filesize

    7.3MB

  • memory/4488-1502-0x0000000001C60000-0x00000000022CE000-memory.dmp
    Filesize

    6.4MB

  • memory/4488-1532-0x000000006BAC0000-0x000000006BB85000-memory.dmp
    Filesize

    788KB

  • memory/4488-1538-0x000000006D400000-0x000000006D55F000-memory.dmp
    Filesize

    1.4MB

  • memory/4488-1540-0x0000000062F40000-0x0000000062F88000-memory.dmp
    Filesize

    288KB

  • memory/4488-1542-0x00000000022D0000-0x0000000002433000-memory.dmp
    Filesize

    1.4MB

  • memory/4488-1543-0x0000000068740000-0x0000000068784000-memory.dmp
    Filesize

    272KB

  • memory/4488-1544-0x0000000064AC0000-0x0000000064C4E000-memory.dmp
    Filesize

    1.6MB

  • memory/4488-1545-0x0000000063EC0000-0x0000000063F1A000-memory.dmp
    Filesize

    360KB

  • memory/4488-1549-0x0000000000400000-0x00000000008C4000-memory.dmp
    Filesize

    4.8MB

  • memory/4488-1551-0x0000000070EC0000-0x0000000070EF9000-memory.dmp
    Filesize

    228KB

  • memory/4488-1498-0x0000000001390000-0x000000000150A000-memory.dmp
    Filesize

    1.5MB

  • memory/4488-1596-0x0000000066940000-0x0000000066F73000-memory.dmp
    Filesize

    6.2MB

  • memory/4488-1649-0x0000000001510000-0x0000000001C54000-memory.dmp
    Filesize

    7.3MB

  • memory/4488-1650-0x0000000001C60000-0x00000000022CE000-memory.dmp
    Filesize

    6.4MB

  • memory/4488-1651-0x000000006BAC0000-0x000000006BB85000-memory.dmp
    Filesize

    788KB

  • memory/4488-1704-0x00000000022D0000-0x0000000002433000-memory.dmp
    Filesize

    1.4MB

  • memory/4488-1705-0x0000000064AC0000-0x0000000064C4E000-memory.dmp
    Filesize

    1.6MB