Analysis
-
max time kernel
130s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-06-2021 14:16
Static task
static1
Behavioral task
behavioral1
Sample
pdf-xchange_viewer_XV-78H1.exe
Resource
win7v20210408
General
-
Target
pdf-xchange_viewer_XV-78H1.exe
-
Size
2.3MB
-
MD5
642fa01134fc21a4faa5595d45e3f554
-
SHA1
53bc8673fcbb4c2e748684c2462d3f01483d8dfe
-
SHA256
a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6
-
SHA512
c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 64 IoCs
Processes:
instup.exedescription ioc process File created C:\Windows\system32\drivers\avgSnx.sys instup.exe File created C:\Windows\system32\drivers\avgbuniv.sys instup.exe File created C:\Windows\system32\drivers\aswd84fec7f75130f73.tmp instup.exe File created C:\Windows\system32\drivers\aswdc484fe6b7413fcf.tmp instup.exe File created C:\Windows\system32\drivers\aswa49d59645f1bda5d.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgblogx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgElam.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgArDisk.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgMonFlt.sys instup.exe File created C:\Windows\system32\drivers\avgRdr2.sys instup.exe File created C:\Windows\system32\drivers\asw62e5f1aecc3f32d2.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw62e5f1aecc3f32d2.tmp instup.exe File opened for modification C:\Windows\system32\drivers\aswa49d59645f1bda5d.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw51c18c2daa89a6c7.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgSnx.sys instup.exe File created C:\Windows\system32\drivers\avgStm.sys instup.exe File created C:\Windows\system32\drivers\asw0c2b7587b05b73b0.tmp instup.exe File opened for modification C:\Windows\system32\drivers\aswd84fec7f75130f73.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbloga.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgKbd.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgFsBlk.sys instup.exe File created C:\Windows\system32\drivers\avgArPot.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw7e892651489e6375.tmp instup.exe File created C:\Windows\system32\drivers\asw97261c10d1c42fdb.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw97261c10d1c42fdb.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbdiska.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsdrivera.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsdriverx.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw0c2b7587b05b73b0.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsha.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidshx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgStm.sys instup.exe File created C:\Windows\system32\drivers\avgRvrt.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgSP.sys instup.exe File created C:\Windows\system32\drivers\avgNetHub.sys instup.exe File opened for modification C:\Windows\system32\drivers\aswfdd2d69c950eda46.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw2b02ae63b01ff85e.tmp instup.exe File opened for modification C:\Windows\system32\drivers\asw6c184d2a05d9bb1d.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbunivx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgNetHub.sys instup.exe File created C:\Windows\system32\drivers\avgVmm.sys instup.exe File opened for modification C:\Windows\system32\drivers\aswdb640ada64378c0b.tmp instup.exe File created C:\Windows\system32\drivers\aswe9cdb1e504de821a.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbdiskx.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgArPot.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgRvrt.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw9d7a9367c051ef03.tmp instup.exe File created C:\Windows\system32\drivers\avgArDisk.sys instup.exe File created C:\Windows\system32\drivers\avgbidsh.sys instup.exe File created C:\Windows\system32\drivers\asw9d7a9367c051ef03.tmp instup.exe File opened for modification C:\Windows\system32\drivers\aswe9cdb1e504de821a.tmp instup.exe File created C:\Windows\system32\drivers\asw6c184d2a05d9bb1d.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgNet.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgRdr2.sys instup.exe File opened for modification C:\Windows\system32\drivers\avgbidsh.sys instup.exe File opened for modification C:\Windows\system32\drivers\asw872cdcc7e47d4621.tmp instup.exe File opened for modification C:\Windows\system32\drivers\avgbuniva.sys instup.exe File created C:\Windows\system32\drivers\avgbidsdriver.sys instup.exe File created C:\Windows\system32\drivers\avgSP.sys instup.exe File created C:\Windows\system32\drivers\aswdb640ada64378c0b.tmp instup.exe File created C:\Windows\system32\drivers\aswfdd2d69c950eda46.tmp instup.exe File created C:\Windows\system32\drivers\asw2b02ae63b01ff85e.tmp instup.exe File created C:\Windows\system32\drivers\asw51c18c2daa89a6c7.tmp instup.exe File opened for modification C:\Windows\system32\drivers\aswdc484fe6b7413fcf.tmp instup.exe -
Executes dropped EXE 29 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpsaBSI.execookie_mmm_irs_ppi_902_451_o.exeavg_antivirus_free_setup_x64.exeinstup.exeinstaller.exeinstaller.exeinstup.exeServiceHost.exeUIHost.exesbr.exeupdater.exeSetupInf.exeAvEmUpdate.exeSetupInf.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeavBugReport.exeRegSvr.exeRegSvr.exeRegSvr.exeRegSvr.exeoverseer.exeengsup.exewsc_proxy.exewsc_proxy.exeengsup.exepid process 1492 pdf-xchange_viewer_XV-78H1.tmp 3612 saBSI.exe 1320 cookie_mmm_irs_ppi_902_451_o.exe 3964 avg_antivirus_free_setup_x64.exe 2712 instup.exe 3120 installer.exe 3560 installer.exe 3816 instup.exe 2876 ServiceHost.exe 4244 UIHost.exe 4804 sbr.exe 4840 updater.exe 3224 SetupInf.exe 736 AvEmUpdate.exe 4636 SetupInf.exe 5004 SetupInf.exe 4460 SetupInf.exe 4856 AvEmUpdate.exe 736 AvEmUpdate.exe 5248 avBugReport.exe 5280 RegSvr.exe 5332 RegSvr.exe 5400 RegSvr.exe 5436 RegSvr.exe 5472 overseer.exe 5484 engsup.exe 5584 wsc_proxy.exe 5620 wsc_proxy.exe 5680 engsup.exe -
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UIHost.exepdf-xchange_viewer_XV-78H1.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation UIHost.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation pdf-xchange_viewer_XV-78H1.tmp -
Loads dropped DLL 21 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpcookie_mmm_irs_ppi_902_451_o.exeinstup.exeregsvr32.exeregsvr32.exeregsvr32.exeinstup.exeServiceHost.exeregsvr32.exeUIHost.exeregsvr32.exeregsvr32.exepid process 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1320 cookie_mmm_irs_ppi_902_451_o.exe 2712 instup.exe 2712 instup.exe 1728 regsvr32.exe 3848 regsvr32.exe 3152 regsvr32.exe 3816 instup.exe 2876 ServiceHost.exe 420 regsvr32.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 4244 UIHost.exe 4244 UIHost.exe 4488 regsvr32.exe 4556 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
instup.exewsc_proxy.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av instup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\SECURITY CENTER\PROVIDER\AV\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} wsc_proxy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\SECURITY CENTER\PROVIDER\AV\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} wsc_proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{4FC75CA5-1654-5411-7CFB-1893D506BCF4} instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Provider instup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
instup.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AvRepair = "\"C:\\Program Files\\AVG\\Antivirus\\setup\\instup.exe\" /instop:repair /wait" instup.exe -
Checks for any installed AV software in registry 1 TTPs 25 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpRegSvr.exewsc_proxy.exewsc_proxy.exeinstup.exeinstup.exeSetupInf.exeRegSvr.exeengsup.exeSetupInf.exeAvEmUpdate.exeRegSvr.exeRegSvr.exeavg_antivirus_free_setup_x64.exeSetupInf.exeSetupInf.exeAvEmUpdate.exeengsup.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast wsc_proxy.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast wsc_proxy.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast engsup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast AvEmUpdate.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\AVAST Software\Avast pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\AVG\AV\Dir pdf-xchange_viewer_XV-78H1.tmp Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast RegSvr.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast SetupInf.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast engsup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Writes to the Master Boot Record (MBR) 1 TTPs 17 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
RegSvr.exeAvEmUpdate.exeSetupInf.exeRegSvr.exewsc_proxy.execookie_mmm_irs_ppi_902_451_o.exeSetupInf.exeavg_antivirus_free_setup_x64.exeavBugReport.exeSetupInf.exeSetupInf.exeRegSvr.exeRegSvr.exeoverseer.exewsc_proxy.exeinstup.exeinstup.exedescription ioc process File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 AvEmUpdate.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 wsc_proxy.exe File opened for modification \??\PhysicalDrive0 cookie_mmm_irs_ppi_902_451_o.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup_x64.exe File opened for modification \??\PhysicalDrive0 avBugReport.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 SetupInf.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 RegSvr.exe File opened for modification \??\PhysicalDrive0 overseer.exe File opened for modification \??\PhysicalDrive0 wsc_proxy.exe File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Drops file in System32 directory 2 IoCs
Processes:
instup.exedescription ioc process File opened for modification C:\Windows\system32\asw87db944882630faa.tmp instup.exe File created C:\Windows\system32\asw87db944882630faa.tmp instup.exe -
Drops file in Program Files directory 64 IoCs
Processes:
instup.exeinstaller.exeinstaller.exeAvEmUpdate.exedescription ioc process File opened for modification C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\api-ms-win-core-rtlsupport-l1-1-0.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\api-ms-win-core-processenvironment-l1-1-0.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\api-ms-win-core-synch-l1-2-0.dll instup.exe File created C:\Program Files\AVG\Antivirus\1033\avg.local_vc142.crt\asw07798df9dc6e4e10.tmp instup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\inst-warningbackground.gif installer.exe File opened for modification C:\Program Files\McAfee\Temp3073356737 installer.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\21061905\aswb07debb31d75ee6c.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\21061905\aswJsFlt64.dll instup.exe File opened for modification C:\Program Files\AVG\Antivirus\tasks_core.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\protobuf.dll.sum instup.exe File created C:\Program Files\AVG\Antivirus\Setup\b36e61f8-361b-4719-9a1c-ac3a2761a8ed\update.xml AvEmUpdate.exe File opened for modification C:\Program Files\McAfee\Temp3073356737\jslang\eula-da-DK.txt installer.exe File opened for modification C:\Program Files\McAfee\Temp3073356737\jslang\eula-hr-HR.txt installer.exe File opened for modification C:\Program Files\AVG\Antivirus\setup instup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-ko-KR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\externalutilityfunction.luc installer.exe File opened for modification C:\Program Files\AVG\Antivirus\resources_av instup.exe File opened for modification C:\Program Files\AVG\Antivirus\asw4f9625647070686f.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\msvcp140_codecvt_ids.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswImgPr.exe instup.exe File created C:\Program Files\McAfee\Temp3073356737\jslang\wa-res-install-nl-NL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-pl-PL.js installer.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\21061905\db_u.dat instup.exe File opened for modification C:\Program Files\AVG\Antivirus\TuneupSmartScan.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\aswRegSvr.exe instup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-amazon-upsell-logo.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-en-US.js installer.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\config.ini instup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-es-MX.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\wa-ui-uninstall.js installer.exe File created C:\Program Files\AVG\Antivirus\defs\21061905\asw62746651ff32fc93.tmp instup.exe File created C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\aswcb9c98bcdd65b8de.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\zlib.txt instup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-dwtoast.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-blast-search-toast-de-DE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-hr-HR.js installer.exe File created C:\Program Files\AVG\Antivirus\setup\Inf\x64\avgbidsdriver.sys instup.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\dailycounters.luc installer.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\Inf\x64\aswe679f4b6ca5fbddf.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\21061905\db_dsign.dat instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\avg.local_vc142.crt\avg.local_vc142.crt.manifest.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\x86\aswhookx.dll instup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\new-tab-overlay.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\efficacy\styles\utils\wa-ef-day-counter-renderer.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-ru-RU.js installer.exe File opened for modification C:\Program Files\AVG\Antivirus\defs\21061905\asw60c98592760e801a.tmp instup.exe File created C:\Program Files\AVG\Antivirus\asw4f9625647070686f.tmp instup.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\mbedTLS.txt.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\ntp_time.dll.sum instup.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\ais_gen_gui-*.vpx instup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-en-US.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\lastoemcheck.luc installer.exe File opened for modification C:\Program Files\McAfee\Temp3073356737\jslang\eula-zh-TW.txt installer.exe File opened for modification C:\Program Files\AVG\Antivirus\1033\avg.local_vc142.crt\asw6af31f628ea1c207.tmp instup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-it-IT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\proxytypehandler.luc installer.exe File opened for modification C:\Program Files\AVG\Antivirus\setup\ais_dll_eng-818.vpx instup.exe File created C:\Program Files\AVG\Antivirus\defs\21061905\aswfcde7e2b67d9090f.tmp instup.exe File created C:\Program Files\AVG\Antivirus\avg.local_vc142.crt\asw514dc92b3bb1282e.tmp instup.exe File created C:\Program Files\McAfee\WebAdvisor\webadvisor_v2.mcafee.chrome.extension.json installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-zh-CN.js installer.exe File opened for modification C:\Program Files\AVG\Antivirus\Licenses\aswdcb39c22db18bac6.tmp instup.exe -
Drops file in Windows directory 3 IoCs
Processes:
MicrosoftEdge.exeinstup.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\ELAMBKUP\asw684423129b476224.tmp instup.exe File created C:\Windows\ELAMBKUP\asw684423129b476224.tmp instup.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4164 1492 WerFault.exe pdf-xchange_viewer_XV-78H1.tmp -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
instup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service instup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags instup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags instup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service instup.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
avBugReport.exeRegSvr.exeengsup.exeSetupInf.exeAvEmUpdate.exeSetupInf.exeinstup.exeSetupInf.exewsc_proxy.exeavg_antivirus_free_setup_x64.exeAvEmUpdate.exeRegSvr.exewsc_proxy.exeSetupInf.exeRegSvr.exeinstup.exeengsup.exeRegSvr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 avBugReport.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature engsup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision engsup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision wsc_proxy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision AvEmUpdate.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 engsup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 engsup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision SetupInf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature AvEmUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupInf.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 RegSvr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wsc_proxy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature wsc_proxy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RegSvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RegSvr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AvEmUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
instup.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\Bios instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosReleaseDate instup.exe -
Processes:
regsvr32.exeMicrosoftEdge.exeregsvr32.exeRegSvr.exebrowser_broker.exeRegSvr.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extension Validation\{3C5422B3-D1E2-449E-A736-809C934C2F80} RegSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extension Validation\{3C5422B3-D1E2-449E-A736-809C934C2F80} RegSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ServiceHost.exeupdater.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My updater.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe -
Modifies registry class 64 IoCs
Processes:
instup.exeinstup.exeRegSvr.exeMicrosoftEdgeCP.exeRegSvr.exeRegSvr.exeMicrosoftEdge.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: ais_x64" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: api-ms-win-core-processthreads-l1-1-0.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Creating directory: C:\\ProgramData\\AVG\\Browser" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\part-vps_win32-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\offertool_arm64_ais-*.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "95" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: aswHds.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_mx4.nmp" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\Common Files\\AV\\AVG Antivirus\\userdata.cab" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\Inf\\aswHwid.inf" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\ais_gen_streamfilter-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Antivirus.AsOutExt.1\CLSID\ = "{B342E21B-AD7E-4568-AE3F-D0D844537A7A}" RegSvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "69" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: nos.dll" instup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\ais_cmp_secureline-*.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\setup\\ais_gui_cef_devtools-*.vpx" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Antivirus.AsOutExt.1\CLSID RegSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B342E21B-AD7E-4568-AE3F-D0D844537A7A} RegSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: sbr_x64_ais-c71.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: ais_core" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: ashBase.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\avgthemefile\ = "AVG theme file" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Starting kernel driver: avgbidsh" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB904E4E-D2C7-4C8D-8492-B620BB9896B1} RegSvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "85" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "84" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EDDBDEA4-5C07-453F-BE8C-81D738984381}\1.0\HELPDIR\ = "C:\\Program Files\\AVG\\Antivirus\\x86" RegSvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "36" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: ashServ.dll" instup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\x86\\avgMonVD.dll" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\AVG instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "26" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: nghttp2.txt" instup.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "87" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_java.sig" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "54" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: mfc140u.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "59" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: lexbor.txt" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\Aavm4h.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\avgconfigfile\BrowserFlags = "8" instup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\aswcml.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "62" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: jrog2-b3.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: db_sl.sig" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: engsup.exe" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: api-ms-win-crt-runtime-l1-1-0.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: BrowserCleanup.ini" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Installing kernel driver: avgbidsdriver" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Unregistering file: C:\\Program Files\\AVG\\Antivirus\\aswWebRepIE64.dll" instup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: dll_loader.dll" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\AVG\ = "{472083B1-C522-11CF-8763-00608CC02F24}" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B342E21B-AD7E-4568-AE3F-D0D844537A7A}\InprocServer32 RegSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: Detours.txt" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Deleting file: C:\\Program Files\\AVG\\Antivirus\\SetupInf64.exe" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{472083B1-C522-11CF-8763-00608CC02F24}\ = "AVG" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "32" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "62" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe -
Processes:
ServiceHost.exesaBSI.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e210f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0280f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f saBSI.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpsaBSI.exeavg_antivirus_free_setup_x64.exeServiceHost.exeUIHost.exepid process 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 1492 pdf-xchange_viewer_XV-78H1.tmp 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3612 saBSI.exe 3964 avg_antivirus_free_setup_x64.exe 3964 avg_antivirus_free_setup_x64.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe 4244 UIHost.exe 4244 UIHost.exe 2876 ServiceHost.exe 2876 ServiceHost.exe -
Suspicious behavior: LoadsDriver 13 IoCs
Processes:
pid process 624 624 624 624 624 624 624 624 624 624 624 624 624 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4352 MicrosoftEdgeCP.exe 4352 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exeMicrosoftEdge.exeWerFault.exeMicrosoftEdgeCP.exedescription pid process Token: 32 3964 avg_antivirus_free_setup_x64.exe Token: 32 2712 instup.exe Token: SeDebugPrivilege 2712 instup.exe Token: 32 3816 instup.exe Token: SeDebugPrivilege 3816 instup.exe Token: SeDebugPrivilege 4224 MicrosoftEdge.exe Token: SeDebugPrivilege 4224 MicrosoftEdge.exe Token: SeDebugPrivilege 4224 MicrosoftEdge.exe Token: SeDebugPrivilege 4224 MicrosoftEdge.exe Token: SeRestorePrivilege 4164 WerFault.exe Token: SeBackupPrivilege 4164 WerFault.exe Token: SeDebugPrivilege 4164 WerFault.exe Token: SeDebugPrivilege 3112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3112 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3112 MicrosoftEdgeCP.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe Token: 35 3816 instup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmppid process 1492 pdf-xchange_viewer_XV-78H1.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 1492 pdf-xchange_viewer_XV-78H1.tmp 4224 MicrosoftEdge.exe 4352 MicrosoftEdgeCP.exe 4352 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.exepdf-xchange_viewer_XV-78H1.tmpcookie_mmm_irs_ppi_902_451_o.exeavg_antivirus_free_setup_x64.exesaBSI.exeinstaller.exeinstaller.exesc.exeinstup.exeregsvr32.exeServiceHost.exeregsvr32.exeinstup.exeupdater.exeMicrosoftEdgeCP.exedescription pid process target process PID 4092 wrote to memory of 1492 4092 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 4092 wrote to memory of 1492 4092 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 4092 wrote to memory of 1492 4092 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 1492 wrote to memory of 3612 1492 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 1492 wrote to memory of 3612 1492 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 1492 wrote to memory of 3612 1492 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 1492 wrote to memory of 1320 1492 pdf-xchange_viewer_XV-78H1.tmp cookie_mmm_irs_ppi_902_451_o.exe PID 1492 wrote to memory of 1320 1492 pdf-xchange_viewer_XV-78H1.tmp cookie_mmm_irs_ppi_902_451_o.exe PID 1492 wrote to memory of 1320 1492 pdf-xchange_viewer_XV-78H1.tmp cookie_mmm_irs_ppi_902_451_o.exe PID 1320 wrote to memory of 3964 1320 cookie_mmm_irs_ppi_902_451_o.exe avg_antivirus_free_setup_x64.exe PID 1320 wrote to memory of 3964 1320 cookie_mmm_irs_ppi_902_451_o.exe avg_antivirus_free_setup_x64.exe PID 3964 wrote to memory of 2712 3964 avg_antivirus_free_setup_x64.exe instup.exe PID 3964 wrote to memory of 2712 3964 avg_antivirus_free_setup_x64.exe instup.exe PID 3612 wrote to memory of 3120 3612 saBSI.exe installer.exe PID 3612 wrote to memory of 3120 3612 saBSI.exe installer.exe PID 3120 wrote to memory of 3560 3120 installer.exe installer.exe PID 3120 wrote to memory of 3560 3120 installer.exe installer.exe PID 3560 wrote to memory of 2076 3560 installer.exe sc.exe PID 3560 wrote to memory of 2076 3560 installer.exe sc.exe PID 3560 wrote to memory of 1060 3560 installer.exe sc.exe PID 3560 wrote to memory of 1060 3560 installer.exe sc.exe PID 1060 wrote to memory of 1728 1060 sc.exe regsvr32.exe PID 1060 wrote to memory of 1728 1060 sc.exe regsvr32.exe PID 1060 wrote to memory of 1728 1060 sc.exe regsvr32.exe PID 3560 wrote to memory of 2768 3560 installer.exe sc.exe PID 3560 wrote to memory of 2768 3560 installer.exe sc.exe PID 3560 wrote to memory of 3848 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 3848 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 420 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 420 3560 installer.exe regsvr32.exe PID 2712 wrote to memory of 3816 2712 instup.exe instup.exe PID 2712 wrote to memory of 3816 2712 instup.exe instup.exe PID 3560 wrote to memory of 2132 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 2132 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 1060 3560 installer.exe sc.exe PID 3560 wrote to memory of 1060 3560 installer.exe sc.exe PID 2132 wrote to memory of 3152 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 3152 2132 regsvr32.exe regsvr32.exe PID 2132 wrote to memory of 3152 2132 regsvr32.exe regsvr32.exe PID 3560 wrote to memory of 420 3560 installer.exe regsvr32.exe PID 3560 wrote to memory of 420 3560 installer.exe regsvr32.exe PID 2876 wrote to memory of 4244 2876 ServiceHost.exe UIHost.exe PID 2876 wrote to memory of 4244 2876 ServiceHost.exe UIHost.exe PID 2876 wrote to memory of 4464 2876 ServiceHost.exe regsvr32.exe PID 2876 wrote to memory of 4464 2876 ServiceHost.exe regsvr32.exe PID 4464 wrote to memory of 4488 4464 regsvr32.exe regsvr32.exe PID 4464 wrote to memory of 4488 4464 regsvr32.exe regsvr32.exe PID 4464 wrote to memory of 4488 4464 regsvr32.exe regsvr32.exe PID 2876 wrote to memory of 4556 2876 ServiceHost.exe regsvr32.exe PID 2876 wrote to memory of 4556 2876 ServiceHost.exe regsvr32.exe PID 3816 wrote to memory of 4804 3816 instup.exe sbr.exe PID 3816 wrote to memory of 4804 3816 instup.exe sbr.exe PID 2876 wrote to memory of 4840 2876 ServiceHost.exe updater.exe PID 2876 wrote to memory of 4840 2876 ServiceHost.exe updater.exe PID 4840 wrote to memory of 4896 4840 updater.exe cmd.exe PID 4840 wrote to memory of 4896 4840 updater.exe cmd.exe PID 4840 wrote to memory of 4940 4840 updater.exe cmd.exe PID 4840 wrote to memory of 4940 4840 updater.exe cmd.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4352 wrote to memory of 3112 4352 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-SMHEK.tmp\pdf-xchange_viewer_XV-78H1.tmp"C:\Users\Admin\AppData\Local\Temp\is-SMHEK.tmp\pdf-xchange_viewer_XV-78H1.tmp" /SL5="$20120,1569491,780800,C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\Temp3073356737\installer.exe"C:\Program Files\McAfee\Temp3073356737\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//06⤵
-
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"7⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe"C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe" /silent /ws3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.af6925577312113c\avg_antivirus_free_setup_x64.exe"C:\Windows\Temp\asw.af6925577312113c\avg_antivirus_free_setup_x64.exe" /silent /ws /cookie:mmm_irs_ppi_902_451_o /ga_clientid:86962d88-16ae-4015-80c8-44ae047e6149 /edat_dir:C:\Windows\Temp\asw.af6925577312113c4⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\instup.exe"C:\Windows\Temp\asw.1b3ed3b2ed10745a\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.1b3ed3b2ed10745a /edition:15 /prod:ais /guid:1daebff5-12e5-4427-8a87-887328fe1b9f /ga_clientid:86962d88-16ae-4015-80c8-44ae047e6149 /silent /ws /cookie:mmm_irs_ppi_902_451_o /ga_clientid:86962d88-16ae-4015-80c8-44ae047e6149 /edat_dir:C:\Windows\Temp\asw.af6925577312113c5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\instup.exe"C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.1b3ed3b2ed10745a /edition:15 /prod:ais /guid:1daebff5-12e5-4427-8a87-887328fe1b9f /ga_clientid:86962d88-16ae-4015-80c8-44ae047e6149 /silent /ws /cookie:mmm_irs_ppi_902_451_o /edat_dir:C:\Windows\Temp\asw.af6925577312113c /online_installer6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\sbr.exe"C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\sbr.exe" 3816 "AVG Antivirus setup" "AVG Antivirus is being installed. Do not shut down your computer!"7⤵
- Executes dropped EXE
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRdr2.cat7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgHwid.cat7⤵
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgVmm.cat7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRvrt.cat7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\SetupInf.exe"C:\Program Files\AVG\Antivirus\SetupInf.exe" /elaminst C:\Windows\system32\drivers\avgElam.sys7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\AvEmUpdate.exe"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer /reg7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\AvEmUpdate.exe"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer17⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\avBugReport.exe"C:\Program Files\AVG\Antivirus\avBugReport.exe" --send "dumps|report" --silent --path "C:\ProgramData\AVG\Antivirus" --guid 1daebff5-12e5-4427-8a87-887328fe1b9f8⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\x86\RegSvr.exe"C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\aswAMSI.dll"7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies Internet Explorer settings
-
C:\Program Files\AVG\Antivirus\RegSvr.exe"C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\aswAMSI.dll"7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\AVG\Antivirus\x86\RegSvr.exe"C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\asOutExt.dll"7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
-
C:\Program Files\AVG\Antivirus\RegSvr.exe"C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\asOutExt.dll"7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
-
C:\Program Files\Common Files\AVG\Overseer\overseer.exe"C:\Program Files\Common Files\AVG\Overseer\overseer.exe" /skip_uptime /skip_remediations7⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe"C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe" /prepare_definitions_folder7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\wsc_proxy.exe"C:\Program Files\AVG\Antivirus\wsc_proxy.exe" /svc /register /ppl_svc7⤵
- Executes dropped EXE
- Windows security modification
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
-
C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe"C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe" /avg /get_latest_ga_client_id /get_latest_landingpageid_cookie /get_latest_pagedownloadid_cookie7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 9523⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Program Files\AVG\Antivirus\wsc_proxy.exe"C:\Program Files\AVG\Antivirus\wsc_proxy.exe" /runassvc /rpcserver1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Registry Run Keys / Startup Folder
3New Service
1Browser Extensions
1Bootkit
1Defense Evasion
Modify Registry
6Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\McAfee\Temp3073356737\browserhost.cabMD5
28cfe468ba233cf2208a08e162c1efff
SHA1a8af1df9ba26127d1baa2efc2a765413c3832bc1
SHA25661c5dd5928ed1c2116b6d6bdb90299ce6a63c66755ec382e726a6fd6fd84b857
SHA512b06fe2601ccdd89fd5cc2f39ce201b7f63518bc13a272e32de8fce01415970cacc5fe2a15e8c1fa3e3de7e31236fa0b4f12e77b9a1eae876243a7e2a7a3ffe06
-
C:\Program Files\McAfee\Temp3073356737\browserplugin.cabMD5
3a643cc4d41312979384f97a939b215a
SHA1e103d018967861cc1d6131028e51c254fc854da2
SHA256790239a2a05a8eb3c26ac6601a3949af1762fd82ca619aa5bf41999ae34b8579
SHA5126c867d673bc1591f270328831bb72288e790f10a2ee24ff3b8b1f3d6d17f6e061c2b161920ef7f39180345f78cd8e93330e146ef03c2674ebf254274c4831e3b
-
C:\Program Files\McAfee\Temp3073356737\downloadscan.cabMD5
710964b0aa392c4acf73fa66a0dd3c3a
SHA1f2b7060216581b5d19aaf823ce58a37dc002c2f9
SHA25617dd80af4a3be63d2e7b3140c346cc3ed1f6f9364c4a986d468582ea24a08bb2
SHA51214a7c78f1967e5127cb7ccdeaad7d906d7597f9f50c218d97684bab7fb2e0a0a2c6d2043dbc9f4effdebbc4189155ec9c47e53d85ed84a0c34abef1e64fcd475
-
C:\Program Files\McAfee\Temp3073356737\eventmanager.cabMD5
a58ad8f956b46368c1a8df645f22e845
SHA100ab5d367141c931cf391b13f6f4a81ea9146706
SHA25682c6e3c804d7b990c5e6b47ee1f3bafc0ca754ab3389b12b6000ff8e125db775
SHA512c50b7d6deacf8aee1bdaaa2562a7cd9aec25d9263b2609d9a8ccf5e2c64b96d726b3991790df2518cbf16c157e2ea82e55cd96b730d7ef236e00adea9fd17728
-
C:\Program Files\McAfee\Temp3073356737\ieplugin.cabMD5
57eb77776b4a8db76fb9d0e2fe50b143
SHA1c2e276572497b82ff16ecf3399aecf7ed52669b0
SHA25610e2162ef19193a8770cfaa31127fa919030a70823ce9d7e6d34df303cbd7584
SHA5127771cedf27f369719919498300863600c53d6cb7c2356e9f6c3f6cd1a31a99588b14a4eff01434e618e062af44f82f0f0e8541f1d0427ed26e7ab932800c2b87
-
C:\Program Files\McAfee\Temp3073356737\installer.exeMD5
9cccc422f0f6f92aee773e1250bae648
SHA188c245b40b5e350271090ebc72f8741add4e1028
SHA256605ec7a8f4aad45229ef7d08ef022bf2185064f5ebc6656259f7915445708583
SHA5120eb8005515bf4624a8df7f50fd9d1326a1f0b35456e24d0d922152dd0fc00e772b4ced927bdf5368622ba0ccfd05aa0bf47956b988770dc100c38f75ac76cd13
-
C:\Program Files\McAfee\Temp3073356737\installer.exeMD5
9cccc422f0f6f92aee773e1250bae648
SHA188c245b40b5e350271090ebc72f8741add4e1028
SHA256605ec7a8f4aad45229ef7d08ef022bf2185064f5ebc6656259f7915445708583
SHA5120eb8005515bf4624a8df7f50fd9d1326a1f0b35456e24d0d922152dd0fc00e772b4ced927bdf5368622ba0ccfd05aa0bf47956b988770dc100c38f75ac76cd13
-
C:\Program Files\McAfee\Temp3073356737\l10n.cabMD5
e06302a629745d9bb3885b4c96c932cc
SHA1d0780301a93d2988e41391097aca17c4f7967b82
SHA25611bbc21f9a03e79d87ad565a5d2e3d59951626f10db30bcbd4147d5a92f33cf8
SHA5125be8d385c92a9fd55cc1b4447b5ef3e8ceff7704334fcc82d95a3e48b0c18a0a5ef053da7a4acd441ce6e48e76ea8cd3a8e7755bebe730b2056a9158dc4fbdee
-
C:\Program Files\McAfee\Temp3073356737\logicmodule.cabMD5
78964605cd2ca336b308f26f89bd2450
SHA1f37d42aac6229aee4b41aa6b68bc81a39b337f18
SHA25604b91a8519ae1b61ce5843541c3602ea0813ad7ee142328d44116050628fa7c5
SHA5120e68b46683cbb89a10cafdf0922963937dd623c70363e7c2337687ca670d2a596bdfe7b89da89ed6575ba27ba79feb1788db7c2d2adfff78a3297c5471de5dec
-
C:\Program Files\McAfee\Temp3073356737\logicscripts.cabMD5
20e0ed6677f66535f28ef090aa514c18
SHA1b4a66f0ab564c9c260ed378f78423a376ecd86ba
SHA25638aff090ff805c23362ca879623dc5f9727cf2174ed5f559bd7251ea9679090c
SHA512fc69ff5d464eb7220041b35bec4dc2fcd99f6c3006466c02a5d7f7e26bf348e83f4d24d774dbf10d11cbd1dbdcb8c6390afe225150df267031b594626452d4e4
-
C:\Program Files\McAfee\Temp3073356737\lookupmanager.cabMD5
f21abb608cae290ff61cac8f20b42c20
SHA12ec3b5c2a8136c030803532c9e4fbc3c9f54d5fd
SHA256e85004383ef70e56efefa07c3629c806bb5ae01b77f8a6962fd4a6df4fc08346
SHA5126f1d8f93ed3e0594f983e53a7a11f2d0fc960ad12a2f2e2d4ddf6c3b2bea14a7db19c2b52a418e02b25cd9687314b8a399b7a01dd685fa9d81f80f7374fc32c5
-
C:\Program Files\McAfee\Temp3073356737\mfw-mwb.cabMD5
371765781c4ad6e7f1e7f38fbee25145
SHA1f7ca3f468e2283c7859fb859d7007c6ad10ebe7c
SHA2562a82453e6cd49b75e79ba94cf0914e227c3fbe20c0aca16ee9b31a7824555939
SHA512bfab34b08dd678ba7f6e7c54037e7342d3887ca91b4c76d8329611b92a1fe3885d4ee231e6003853debf2cfb5b13c41d34abb09970ced8082bab17093f4ab957
-
C:\Program Files\McAfee\Temp3073356737\mfw-nps.cabMD5
49a03f46911358e157f3864651bba718
SHA1f4606145778d88adbd55d8d1a2af847e60d26dcb
SHA25659005e5344266063e316f41fb7e1d8f42e34ae991c0ae7c6404ecb1e29c69aa5
SHA512db4027620cbf11e4982fa371e937d3f2b49ffc4960b0c61536ce982f046d3581022993d7c756c1c19f83f8910d492f3fed773e8321e28d63226c9add3195d5c2
-
C:\Program Files\McAfee\Temp3073356737\mfw-webadvisor.cabMD5
28699a0432bb5afcf4a4260e663499d5
SHA10be9f0fdaab9680efe83520145dbeb1da25c9c85
SHA256102d9f67d2a2ccad986b6c6491275813915a3babd7681c5d3fb8496959e7771d
SHA512558b8621aa55bd45a619f4b6bf1c136e8d6b3d5cd3607b67ac906847b476dfda050b2657afcf0a7b7c3b1bf5b4ed9bc0ee896c75965e8665cb2dd2b9a7129b85
-
C:\Program Files\McAfee\Temp3073356737\mfw.cabMD5
48bfc9f28f91cac96f4c70db2a0db01d
SHA19e6668a30be7cf1cf62afb4f8124f5fcbf239c38
SHA25671a2f094382252989c21743d156758979078780514e8d07250517423d904cbee
SHA512e3092f8a241865a0dc7918898ed9b73922e619945efa45017284e471d8edb087181f840331bf0f26b96aeb3855415e364d7d0e3d9ba7802d07ea455714cfebfc
-
C:\Program Files\McAfee\Temp3073356737\resourcedll.cabMD5
b760c65e221f6bf49598180c4bc92825
SHA11b17c76af377d3b54a9d07f81b72f932c6fea348
SHA2562986ce09d61fc8c6ee4331a8b9afe98edec5249c2558532eae44e119193ca6c9
SHA5128884e50ec4ad019e2f336f977cf8ece259473f01df24b009224e86e412903d1e721906a7366b328eaa6357a36bc049d791ba9fa3c663a021f9773352e33a587d
-
C:\Program Files\McAfee\Temp3073356737\servicehost.cabMD5
aa823216f410b4e17c0db068adb6e928
SHA179ede05a01e0a505ae67cca2c1eae2c6f5c3507b
SHA2565f23340ae1dae6ba0320a5e79c5252792f35952fef545c02761fd573aa43983e
SHA512574e9f954d7a0e74060a8a9f6ce184c8073f1fcb6d662b22014954ed07c5aa87e84c00773c17b5198b369707f2e3301f81506b279a1fb2696190584855990aa2
-
C:\Program Files\McAfee\Temp3073356737\settingmanager.cabMD5
e30d7d0e48c57457b5f33140105cafb8
SHA1722bc0ba1b665329a66c5c0941fc52205d447aff
SHA256609fe983538113bb317a6d4693a6a15f2d27d0e56474ae44efa528d69da6ad8d
SHA5123abd60a13e83773cf258fb6662787e8575828f60c349ffad3ee002b02a20c66a9d5dc125ee97e76a4d5f8d7f94f9cef4e40cb7223745ab4ab7add3bce6c0ebbf
-
C:\Program Files\McAfee\Temp3073356737\taskmanager.cabMD5
ee7b156b66c20e45125661ef8b4d16c0
SHA16e0d3b65ef7440e530c1ecbf4b2de760043faa06
SHA2561b7bafbb9b31c05276eb11b09cc7a497d239bc01f704ef60f667ddeb773708e3
SHA512ecacc042cb23b5924a407cc5f736a30aea09d76653a61386e3230590203223cfee0f03e4facee23b0373058d4947f6b3ae9031f1f5d016151e54cee02aa83a36
-
C:\Program Files\McAfee\Temp3073356737\telemetry.cabMD5
f34ea5e18e4d1f90b2cb05325f63febb
SHA11c49b25bafd09b118b0c6d57d6424161420c17b4
SHA25620b23693a222f466a60ec16aba1b694f6de235e13a6aed7cb41ec9ea1f614964
SHA512c6375cc6f42f986c3be75716a3c9f9b5ffe59ae2cc1e5271eba1d07042ef3972088c6fd049fe11ddd6bc3d10772765c5bf6ef1f957422155b25f6f3f27fba702
-
C:\Program Files\McAfee\Temp3073356737\uihost.cabMD5
c278eb5530a9de2d2887b603399bcefa
SHA122fe587b118be846c57f558bb420ae35e1840f98
SHA256b0e3d3bda83cf2c6d84e9a422a311d789da012ce11ac5e1be00417f349a0442c
SHA5126395fa81cc76570d08462a3adf57baee119a0b2b256f7632d514392b041209d158f741890f57c78021ca6a75d79458d2620c86c934221d76faf47e103d23c6e6
-
C:\Program Files\McAfee\Temp3073356737\uimanager.cabMD5
a046f5759b70a6944d093a6c30eb4718
SHA1f87d39d06fda5f5973b59bed674e5e25f010b175
SHA256268c0cff94e67279ba8714ad7fb3734804feb8ecc94089d55f583d45b8c1b70b
SHA512e008c2c14f70e614e82c8726c8a747d47525510c2972460b8daa384b5fc106c7e7fc8f3ce8b0c960b7a5d87318646af8801ed85fd6711e9986713fcb6e5b6723
-
C:\Program Files\McAfee\Temp3073356737\uninstaller.cabMD5
054a03ce02eafecf9c28170a8c4105fa
SHA1f6156656194500ae0f581975147af20d8c23ded7
SHA25644fefc0296bfd3d99ae0644b1b13ddace1ef35553be65f5e5386c149bcc57448
SHA51257fe7149fb8bcc50186dc5b87e5273661fe029e5827ac803a46e02a911f9da034886bf882f4b6d2eda0f6c596cf926ad6525cb2dea794935bcffad572ead5621
-
C:\Program Files\McAfee\Temp3073356737\updater.cabMD5
30c1eaa6e7e141a27794267c1b91ac4a
SHA1752a02b4af509d6126a13fc2e5c89c430366c44f
SHA2565e6fe7464da9b7850752718e7cfccf2de215e4ec7cf2365ed054cae8e6d44110
SHA512445ea05121d6ae0e707862f8273e097ddda38612b901f78ecb799e965e459cb230063db3dc945b83dd717ca3a30dbcb82736a46785bd1e5eb4514ea83d28a06a
-
C:\Program Files\McAfee\Temp3073356737\wataskmanager.cabMD5
189474ad1682c9d24db59fb86d8b6940
SHA13a5bf9b2eac25e13c57553d224e6b2202a3932e1
SHA256633261dfd9cd16cab8be1ff13797672f524b961daf19c78fe3e3cc087efc3bd7
SHA512e8309c442a0c43f730a3ac0e549bb00ea288331e4fc6322371ec78c016ac765135e0f230799435d47263eaba257e7af63344c2baeeb1b76dbcab2d1aab982e57
-
C:\Program Files\McAfee\Temp3073356737\webadvisor.cabMD5
1af487fe3d59dc415b1063927e1570b3
SHA11195c0b4b37121e5fdcb60d7795e7af0255e810a
SHA256f5121c20914cffb4260ca33b780fe9d8a3e757c5d5358be333e0de4ef0e5a732
SHA512f5725bd30fa36744c727cc789195b48d13cb9a4fa7e53fa1c23f10e42d246c568fb6045c31d3a6e104c53ba75f242c96f50dfe7022aa5255cd07fe66e31f2b05
-
C:\Program Files\McAfee\Temp3073356737\wssdep.cabMD5
2fe4887fbeeab77206378e5889c3ecca
SHA1d151d93eccc16d1d78f513506d267ef65527d3c2
SHA256a32a240af295492ebe0cdfc3b514d1c34e30dd63443f07970382d2d3670b08fd
SHA512f71f5ecac0761120bc08203ab856ce3a82aa180cb494a5ff64f03757eeefa9da2016a26cd229e01513f9ca5e55c5be157647ce9f2cd7f6d397c77b5f98693681
-
C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dllMD5
d674ea1796f2485ea8103484add0ddc8
SHA1ad8c26a34a740daac85afeb506cb3c8334d99e9b
SHA256bb9008593e024e75d8b144818bce8f0dd90033289694b07ace7b322bd1b88787
SHA51277f6f2e5da221f2ca4996f562e3092f1c63479acddff0a54ba740834eb439737a06b9b1081ff00639dc2f8598409add2171c2d379d18332876b7ebccbee1c2c2
-
C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dllMD5
f8afff6b7a290e4d76b146d50d65bdc9
SHA1fd562a9a68716f2c003eb044f53634f3a2bfbadb
SHA256de7631ceea58d4e27e6b9c760c891e2bad60b668526b6ecf4ea6b3de98e9ece2
SHA51211c9b39ee574a823509e59a5bbb80dfdc47859b45641bd64e84fe1cb9cebdd2eba5a9bda32fff260f06da754ff478ad663f9904c5e26700d8cfef47a72d4b533
-
C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dllMD5
047e679f02a388b85a81c3472bc7eb72
SHA1d8740c6390ee08889514980cd31e82272465a92c
SHA2560c241f18626043e055678a2899d7a77c11c226b653249735f59d1a87f4e28255
SHA512059368bffb7d81657f5b7bd14f04b5cca57821295d70f6837bc27d6d5d14079fa4472dbcdc82dde1af0e52cd1a53656c6b09a779e22025887c9acc47fe2fddc9
-
C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.logMD5
14bf728c29787767b2d19037c3493d26
SHA183ed7ac1f46e8acd4b9a5642eade244ccf33c406
SHA2569785e02958b89d4179cd826eb16378b3699058625617b5001e561784ca072b84
SHA512a0be3b21f6a70f84aa5e1cb285cf68d0adbd31cc38db6888c3f6d8cec13f2ee3f0b402ba4476717943c65c2669f24b3475960ad89b0dd1273c38dcd8b8e92fa6
-
C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.logMD5
f3512aadac83e628c808949cd7a177a8
SHA1a5870a1c0482b9e155de8bd65c9ffe823c684738
SHA256ec4255d22057e6480c68ead697b348c336bea965216f0f56af32d7d5a4281b81
SHA512b1949d544be29069f3d0f3178b005c01e7f4dee8f5b5b31d43458a2ab5ada748e5ec05a0ac051e21c9e3cd47399cd856b102355fca46bdb178060adf2e154cfe
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\installer.exeMD5
de516192c778e6b3c06ba6fd6ab59af8
SHA18f69cd3dd6d886ce4720acb53b50d576be7984db
SHA2560836627fea928601836beb7ec0c8c5c4bc115fb35ff9fa4079284a465da4ebde
SHA512d92090d051e29698c20d06feb09bf9b028c4d736b6b0eb86e758a9bc1bb73b7d4d727bc3c8378ef63dbd8464e2322eeceda812362ff8f428efe3842014808d1e
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-8550T.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exeMD5
89f08d976e1223fd70a7221199a5a40d
SHA199fdfab6c5aa66430db42cc0ff4a19c3e2fb0561
SHA256ec9a2ab7e550fea665e501cf07aa9ddcb553b68dbfc1b53439a988d87254d891
SHA512706ab34716089c428b6573d7f71463b0e5ab3862e7717c79f206ab9510ac5f09e10c18f8640962ddd72658fae840feda65478487b49ba6edef5958f545986403
-
C:\Users\Admin\AppData\Local\Temp\is-SMHEK.tmp\pdf-xchange_viewer_XV-78H1.tmpMD5
47fe613751fef2c83fda48877d90300f
SHA1d950ebcbf8621baef45f21198ccc72c59a524e53
SHA256e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1
SHA512c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\Instup.dllMD5
216bb4e2fc1d507b9b46ce21f2efee53
SHA148e278d32b66645e3a37e1cb081dc03939e47ef1
SHA25669ba641702643e6943931b3db606084192b721783b3b28bd5a1667de408a36e2
SHA512c935c988e9f089dbf790798bd80359e4b2ed63faa51247b9c10e24eecb71fd145a5e6f71d3cb42c5438408f97ec4ba15d1ed9828ded712675afc189d044877ea
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\Instup.exeMD5
ab23eb9907d31e5e2392783cae33ceb8
SHA13942e6e3600bbdff4e9967500fb97fb53bee8450
SHA25658c7cddc279c22c4b1368e3664d857e553c8089d13ba4dfaa436d98b1ba3ef3a
SHA512109ad00eef48e7849b72bc0675a9e814db51d8c4a6121a2d31daadd71fd3823f7e85cfbf485dea6bf9604028b9440dd76280174af007af6ffb326459fd4b646b
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\Instup.dllMD5
216bb4e2fc1d507b9b46ce21f2efee53
SHA148e278d32b66645e3a37e1cb081dc03939e47ef1
SHA25669ba641702643e6943931b3db606084192b721783b3b28bd5a1667de408a36e2
SHA512c935c988e9f089dbf790798bd80359e4b2ed63faa51247b9c10e24eecb71fd145a5e6f71d3cb42c5438408f97ec4ba15d1ed9828ded712675afc189d044877ea
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\New_15050c71\instup.exeMD5
ab23eb9907d31e5e2392783cae33ceb8
SHA13942e6e3600bbdff4e9967500fb97fb53bee8450
SHA25658c7cddc279c22c4b1368e3664d857e553c8089d13ba4dfaa436d98b1ba3ef3a
SHA512109ad00eef48e7849b72bc0675a9e814db51d8c4a6121a2d31daadd71fd3823f7e85cfbf485dea6bf9604028b9440dd76280174af007af6ffb326459fd4b646b
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\config.defMD5
e1ea1719f8f2e29069cf083c7117ddc0
SHA11805968ccf8beddaad362e1294b46c4fe09522c6
SHA256768dd530090ece9403c03b8a94e94be3edc4080f10b5999b06d78a7c3b286943
SHA512cc82bfbf295cf293bd74a2d2ad75c6af6faeabe241d9a2a1900baa011ca55f0dc2e11279cc8e48e67a460bd86d42eec1fcdddbbbf7bfaa80bd823132a877a0ee
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\config.defMD5
1fd4ca781a61bd323641781c04520671
SHA1d62c608fea75332ab9032d9b62d1e391c864d801
SHA2560180f3a96e7e14c65550cd77a1692d2daed9135f98207c40d411de1b387f3b4d
SHA5129bdde8404862857eab06c8c02ddb1ef6106bc47ea0b75052de3f7d94e5af1d8d6b8e913bafa861f646c91cc6f9576c5819705d25e198c70b5986b5440acec69a
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\instcont_x64_ais-c71.vpxMD5
ab23eb9907d31e5e2392783cae33ceb8
SHA13942e6e3600bbdff4e9967500fb97fb53bee8450
SHA25658c7cddc279c22c4b1368e3664d857e553c8089d13ba4dfaa436d98b1ba3ef3a
SHA512109ad00eef48e7849b72bc0675a9e814db51d8c4a6121a2d31daadd71fd3823f7e85cfbf485dea6bf9604028b9440dd76280174af007af6ffb326459fd4b646b
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\instup_x64_ais-c71.vpxMD5
800951be30e8710cd563b308597ddcf4
SHA1da0ba08dabcd03508d3a8848e8b11c635064c5d7
SHA25659bcf11e63e667211bb489a3ccc76c49dfe669464baca75c4bf979085ff82227
SHA51252d0f1d70dfa8d7e5b68c9444afdd72896323663a2a3dbac0a8ab5023bcb14b172f648ed423e9c121047e9d37b405b5d9fd11606a4d26360d4aa0c20b1cf7ab6
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\part-setup_ais-15050c71.vpxMD5
f8e3bd0567e050e32a8f5be80522071c
SHA152a480973b2eaa391102ba21c9ea4fa98af918e8
SHA2568c3eb28d9b6f54721dc13abe49d7dcfa459db6c58b317d6d2528eb04ac043cc0
SHA51299729ee749d86e76a7affe9a7baa35aea55de9de1afce186fe2850868cc48ecf2d7a886811e863f1560de4cb8e8a9b394b64eae307ad8026af543fbf6a8478f5
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\prod-pgm.vpxMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\prod-vps.vpxMD5
0c35f70c22274a9e931475faa204fb60
SHA1afb8025afec61f4c3efb0fba4c9b8a1963d9404c
SHA256cedcfac00b6ac84d4781fc97b9aec0c79a772ee0783b277766c1fca485dd0843
SHA512da5f2863e57d510898f5f125d957eee8b760937d2dfb1af74522737c5489c3a90ae925933f15af418df7776d6bacd2596b2bfc19c68ed57822170641ba6a722b
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\servers.defMD5
0175a33cf53ca37657134fe439235d06
SHA124e7a9a7732b43e311b7f9dbfa69f625127e2457
SHA2564477b78f7de173fed513cabf775a1d55ae4525db0dda01ea93fe6eec2c8ec5b2
SHA512a54602725d77e2e6f76115355a96265ee433cf5cf52e53021c1f90db477661258c3ac7c022d018b96718a8229d5664ef4e44f8cda2b6b99d4bebc3bad17657d1
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\servers.defMD5
0175a33cf53ca37657134fe439235d06
SHA124e7a9a7732b43e311b7f9dbfa69f625127e2457
SHA2564477b78f7de173fed513cabf775a1d55ae4525db0dda01ea93fe6eec2c8ec5b2
SHA512a54602725d77e2e6f76115355a96265ee433cf5cf52e53021c1f90db477661258c3ac7c022d018b96718a8229d5664ef4e44f8cda2b6b99d4bebc3bad17657d1
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\servers.def.vpxMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\setgui_x64_ais-c71.vpxMD5
6d98a62a56a7048192ad9f765a3d3f55
SHA1f86185f9270c9ff789b88226ef7082be2fe46457
SHA256b4f360236b70ee89d1de4132ebede85ce23d8fc219b362ac4251687a434529ef
SHA51258af1928f7e30a70aa75e98ecee3cc38b397b5b9faae4fc5756dbbe7dad07dca632cca8289ce361c441f9053ee91be8601428f0a142e8d517fbc123506ad8fc3
-
C:\Windows\Temp\asw.1b3ed3b2ed10745a\uat64.vpxMD5
93055fa12dd18f79c481b860842949de
SHA1733fbc9091da1acb7bf8073c86b87b77f56ac3a1
SHA25628e190b2ef135ef3be2439d41e857f23dc564759c1e70a661579d2b9db39d5a9
SHA51260d44d403c8dba99d060a934f6edc50a8ed810debd637ac1e21955bcf0018583a651cd340359b0156ad62498a34fc971724e2ceec385516feec66aef8965dc20
-
C:\Windows\Temp\asw.af6925577312113c\avg_antivirus_free_setup_x64.exeMD5
0785826db7d016ac70a1fafb1535eb2f
SHA149d29d46e91312cb74954481994d934541bf1865
SHA256f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6
SHA512867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754
-
C:\Windows\Temp\asw.af6925577312113c\avg_antivirus_free_setup_x64.exeMD5
0785826db7d016ac70a1fafb1535eb2f
SHA149d29d46e91312cb74954481994d934541bf1865
SHA256f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6
SHA512867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754
-
C:\Windows\Temp\asw.af6925577312113c\ecoo.edatMD5
3f44a3c655ac2a5c3ab32849ecb95672
SHA193211445dcf90bb3200abe3902c2a10fe2baa8e4
SHA25651516a61a1e25124173def4ef68a6b8babedc28ca143f9eee3e729ebdc1ef31f
SHA512d3f95262cf3e910dd707dfeef8d2e9db44db76b2a13092d238d0145c822d87a529ca58ccbb24995dfcf6dad1ffc8ced6d50948bb550760cd03049598c6943bc0
-
\Program Files\McAfee\WebAdvisor\win32\wssdep.dllMD5
f8afff6b7a290e4d76b146d50d65bdc9
SHA1fd562a9a68716f2c003eb044f53634f3a2bfbadb
SHA256de7631ceea58d4e27e6b9c760c891e2bad60b668526b6ecf4ea6b3de98e9ece2
SHA51211c9b39ee574a823509e59a5bbb80dfdc47859b45641bd64e84fe1cb9cebdd2eba5a9bda32fff260f06da754ff478ad663f9904c5e26700d8cfef47a72d4b533
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dllMD5
047e679f02a388b85a81c3472bc7eb72
SHA1d8740c6390ee08889514980cd31e82272465a92c
SHA2560c241f18626043e055678a2899d7a77c11c226b653249735f59d1a87f4e28255
SHA512059368bffb7d81657f5b7bd14f04b5cca57821295d70f6837bc27d6d5d14079fa4472dbcdc82dde1af0e52cd1a53656c6b09a779e22025887c9acc47fe2fddc9
-
\Users\Admin\AppData\Local\Temp\is-8550T.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-8550T.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-8550T.tmp\zbShieldUtils.dllMD5
8b03d5f13240d4395654ac0074a95728
SHA189d0f5039379fdda7719fa8b5ab3a46a92e3a064
SHA256f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6
SHA512bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3
-
\Windows\Temp\asw.1b3ed3b2ed10745a\Instup.dllMD5
216bb4e2fc1d507b9b46ce21f2efee53
SHA148e278d32b66645e3a37e1cb081dc03939e47ef1
SHA25669ba641702643e6943931b3db606084192b721783b3b28bd5a1667de408a36e2
SHA512c935c988e9f089dbf790798bd80359e4b2ed63faa51247b9c10e24eecb71fd145a5e6f71d3cb42c5438408f97ec4ba15d1ed9828ded712675afc189d044877ea
-
\Windows\Temp\asw.1b3ed3b2ed10745a\uat_2712.dllMD5
b79713c07c4dfe9054a53d29bda1dcd9
SHA1c6d37b94b9482aadc2aff1647443d33c6016f82a
SHA2561419e3c1aa1e519572e88a2c3bb42320c3c07e8011ff51de2ed5677373b88d5a
SHA5123569f00fafafb4206ae0437f86b6fba3d0f80cba446499dac1fc37b2b5a5e91e19a5c454cd61c38fd09b9ec3c597572fdac728584941e305dfa4f87a305af774
-
\Windows\Temp\asw.af6925577312113c\avg_antivirus_free_setup_x64.exeMD5
0785826db7d016ac70a1fafb1535eb2f
SHA149d29d46e91312cb74954481994d934541bf1865
SHA256f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6
SHA512867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754
-
memory/420-201-0x0000000000000000-mapping.dmp
-
memory/420-189-0x0000000000000000-mapping.dmp
-
memory/736-238-0x0000000000000000-mapping.dmp
-
memory/736-276-0x0000000000000000-mapping.dmp
-
memory/1060-181-0x0000000000000000-mapping.dmp
-
memory/1060-198-0x0000000000000000-mapping.dmp
-
memory/1320-126-0x0000000000000000-mapping.dmp
-
memory/1492-118-0x00000000007C0000-0x000000000090A000-memory.dmpFilesize
1.3MB
-
memory/1492-116-0x0000000000000000-mapping.dmp
-
memory/1492-122-0x00000000056C0000-0x00000000056CF000-memory.dmpFilesize
60KB
-
memory/1728-183-0x0000000000000000-mapping.dmp
-
memory/2076-180-0x0000000000000000-mapping.dmp
-
memory/2132-197-0x0000000000000000-mapping.dmp
-
memory/2712-135-0x0000000000000000-mapping.dmp
-
memory/2768-184-0x0000000000000000-mapping.dmp
-
memory/3120-139-0x0000000000000000-mapping.dmp
-
memory/3152-200-0x0000000000000000-mapping.dmp
-
memory/3224-211-0x0000000000000000-mapping.dmp
-
memory/3560-144-0x0000000000000000-mapping.dmp
-
memory/3612-123-0x0000000000000000-mapping.dmp
-
memory/3816-191-0x0000000000000000-mapping.dmp
-
memory/3848-187-0x0000000000000000-mapping.dmp
-
memory/3964-131-0x0000000000000000-mapping.dmp
-
memory/4092-114-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4244-202-0x0000000000000000-mapping.dmp
-
memory/4460-274-0x0000000000000000-mapping.dmp
-
memory/4464-203-0x0000000000000000-mapping.dmp
-
memory/4488-204-0x0000000000000000-mapping.dmp
-
memory/4556-205-0x0000000000000000-mapping.dmp
-
memory/4636-265-0x0000000000000000-mapping.dmp
-
memory/4804-206-0x0000000000000000-mapping.dmp
-
memory/4840-207-0x0000000000000000-mapping.dmp
-
memory/4856-275-0x0000000000000000-mapping.dmp
-
memory/4896-208-0x0000000000000000-mapping.dmp
-
memory/4940-209-0x0000000000000000-mapping.dmp
-
memory/5004-273-0x0000000000000000-mapping.dmp
-
memory/5248-277-0x0000000000000000-mapping.dmp
-
memory/5280-278-0x0000000000000000-mapping.dmp
-
memory/5332-279-0x0000000000000000-mapping.dmp
-
memory/5400-280-0x0000000000000000-mapping.dmp
-
memory/5436-281-0x0000000000000000-mapping.dmp
-
memory/5472-282-0x0000000000000000-mapping.dmp
-
memory/5484-283-0x0000000000000000-mapping.dmp
-
memory/5584-284-0x0000000000000000-mapping.dmp
-
memory/5680-285-0x0000000000000000-mapping.dmp