Resubmissions

25-06-2021 19:57

210625-fegc29cpbn 10

20-06-2021 14:16

210620-nvtv6r37hn 10

Analysis

  • max time kernel
    585s
  • max time network
    382s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-06-2021 19:57

General

  • Target

    pdf-xchange_viewer_XV-78H1.exe

  • Size

    2.3MB

  • MD5

    642fa01134fc21a4faa5595d45e3f554

  • SHA1

    53bc8673fcbb4c2e748684c2462d3f01483d8dfe

  • SHA256

    a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6

  • SHA512

    c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\String1033.txt

Ransom Note
DN_AlwaysInstall=Always Install IDPROP_EXPRESS_LAUNCH_CONDITION_COLOR=The color settings of your system are not adequate for running [ProductName]. IDPROP_EXPRESS_LAUNCH_CONDITION_OS=The operating system is not adequate for running [ProductName]. IDPROP_EXPRESS_LAUNCH_CONDITION_PROCESSOR=The processor is not adequate for running [ProductName]. IDPROP_EXPRESS_LAUNCH_CONDITION_RAM=The amount of RAM is not adequate for running [ProductName]. IDPROP_EXPRESS_LAUNCH_CONDITION_SCREEN=The screen resolution is not adequate for running [ProductName]. IDPROP_SETUPTYPE_COMPACT=Compact IDPROP_SETUPTYPE_COMPACT_DESC=Compact Description IDPROP_SETUPTYPE_COMPLETE=Complete IDPROP_SETUPTYPE_COMPLETE_DESC=Complete IDPROP_SETUPTYPE_CUSTOM=Custom IDPROP_SETUPTYPE_CUSTOM_DESC=Custom Description IDPROP_SETUPTYPE_CUSTOM_DESC_PRO=Custom IDPROP_SETUPTYPE_TYPICAL=Typical IDPROP_SETUPTYPE_TYPICAL_DESC=Typical Description IDS_ACTIONTEXT_Advertising=Advertising application IDS_ACTIONTEXT_AllocatingRegistry=Allocating registry space IDS_ACTIONTEXT_AppCommandLine=Application: [1], Command line: [2] IDS_ACTIONTEXT_AppId=AppId: [1]{{, AppType: [2]}} IDS_ACTIONTEXT_AppIdAppTypeRSN=AppId: [1]{{, AppType: [2], Users: [3], RSN: [4]}} IDS_ACTIONTEXT_Application=Application: [1] IDS_ACTIONTEXT_BindingExes=Binding executables IDS_ACTIONTEXT_ClassId=Class ID: [1] IDS_ACTIONTEXT_ClsID=Class ID: [1] IDS_ACTIONTEXT_ComponentIDQualifier=Component ID: [1], Qualifier: [2] IDS_ACTIONTEXT_ComponentIdQualifier2=Component ID: [1], Qualifier: [2] IDS_ACTIONTEXT_ComputingSpace=Computing space requirements IDS_ACTIONTEXT_ComputingSpace2=Computing space requirements IDS_ACTIONTEXT_ComputingSpace3=Computing space requirements IDS_ACTIONTEXT_ContentTypeExtension=MIME Content Type: [1], Extension: [2] IDS_ACTIONTEXT_ContentTypeExtension2=MIME Content Type: [1], Extension: [2] IDS_ACTIONTEXT_CopyingNetworkFiles=Copying files to the network IDS_ACTIONTEXT_CopyingNewFiles=Copying new files IDS_ACTIONTEXT_CreatingDuplicate=Creating duplicate files IDS_ACTIONTEXT_CreatingFolders=Creating folders IDS_ACTIONTEXT_CreatingIISRoots=Creating IIS Virtual Roots... IDS_ACTIONTEXT_CreatingShortcuts=Creating shortcuts IDS_ACTIONTEXT_DeletingServices=Deleting services IDS_ACTIONTEXT_EnvironmentStrings=Updating environment strings IDS_ACTIONTEXT_EvaluateLaunchConditions=Evaluating launch conditions IDS_ACTIONTEXT_Extension=Extension: [1] IDS_ACTIONTEXT_Extension2=Extension: [1] IDS_ACTIONTEXT_Feature=Feature: [1] IDS_ACTIONTEXT_FeatureColon=Feature: [1] IDS_ACTIONTEXT_File=File: [1] IDS_ACTIONTEXT_File2=File: [1] IDS_ACTIONTEXT_FileDependencies=File: [1], Dependencies: [2] IDS_ACTIONTEXT_FileDir=File: [1], Directory: [9] IDS_ACTIONTEXT_FileDir2=File: [1], Directory: [9] IDS_ACTIONTEXT_FileDir3=File: [1], Directory: [9] IDS_ACTIONTEXT_FileDirSize=File: [1], Directory: [9], Size: [6] IDS_ACTIONTEXT_FileDirSize2=File: [1], Directory: [9], Size: [6] IDS_ACTIONTEXT_FileDirSize3=File: [1], Directory: [9], Size: [6] IDS_ACTIONTEXT_FileDirSize4=File: [1], Directory: [2], Size: [3] IDS_ACTIONTEXT_FileDirectorySize=File: [1], Directory: [9], Size: [6] IDS_ACTIONTEXT_FileFolder=File: [1], Folder: [2] IDS_ACTIONTEXT_FileFolder2=File: [1], Folder: [2] IDS_ACTIONTEXT_FileSectionKeyValue=File: [1], Section: [2], Key: [3], Value: [4] IDS_ACTIONTEXT_FileSectionKeyValue2=File: [1], Section: [2], Key: [3], Value: [4] IDS_ACTIONTEXT_Folder=Folder: [1] IDS_ACTIONTEXT_Folder1=Folder: [1] IDS_ACTIONTEXT_Font=Font: [1] IDS_ACTIONTEXT_Font2=Font: [1] IDS_ACTIONTEXT_FoundApp=Found application: [1] IDS_ACTIONTEXT_FreeSpace=Free space: [1] IDS_ACTIONTEXT_GeneratingScript=Generating script operations for action: IDS_ACTIONTEXT_ISLockPermissionsCost=Gathering permissions information for objects... IDS_ACTIONTEXT_ISLockPermissionsInstall=Applying permissions information for objects... IDS_ACTIONTEXT_InitializeODBCDirs=Initializing ODBC directories IDS_ACTIONTEXT_InstallODBC=Installing ODBC components IDS_ACTIONTEXT_InstallServices=Installing new services IDS_ACTIONTEXT_InstallingSystemCatalog=Installing system catalog IDS_ACTIONTEXT_KeyName=Key: [1], Name: [2] IDS_ACTIONTEXT_KeyNameValue=Key: [1], Name: [2], Value: [3] IDS_ACTIONTEXT_MigratingFeatureStates=Migrating feature states from related applications IDS_ACTIONTEXT_MovingFiles=Moving files IDS_ACTIONTEXT_NameValueAction=Name: [1], Value: [2], Action [3] IDS_ACTIONTEXT_NameValueAction2=Name: [1], Value: [2], Action [3] IDS_ACTIONTEXT_PatchingFiles=Patching files IDS_ACTIONTEXT_ProgID=ProgID: [1] IDS_ACTIONTEXT_ProgID2=ProgID: [1] IDS_ACTIONTEXT_PropertySignature=Property: [1], Signature: [2] IDS_ACTIONTEXT_PublishProductFeatures=Publishing product features IDS_ACTIONTEXT_PublishProductInfo=Publishing product information IDS_ACTIONTEXT_PublishingQualifiedComponents=Publishing qualified components IDS_ACTIONTEXT_RegUser=Registering user IDS_ACTIONTEXT_RegisterClassServer=Registering class servers IDS_ACTIONTEXT_RegisterExtensionServers=Registering extension servers IDS_ACTIONTEXT_RegisterFonts=Registering fonts IDS_ACTIONTEXT_RegisterMimeInfo=Registering MIME info IDS_ACTIONTEXT_RegisterTypeLibs=Registering type libraries IDS_ACTIONTEXT_RegisteringComPlus=Registering COM+ Applications and Components IDS_ACTIONTEXT_RegisteringModules=Registering modules IDS_ACTIONTEXT_RegisteringProduct=Registering product IDS_ACTIONTEXT_RegisteringProgIdentifiers=Registering program identifiers IDS_ACTIONTEXT_RemoveApps=Removing applications IDS_ACTIONTEXT_RemovingBackup=Removing backup files IDS_ACTIONTEXT_RemovingDuplicates=Removing duplicated files IDS_ACTIONTEXT_RemovingFiles=Removing files IDS_ACTIONTEXT_RemovingFolders=Removing folders IDS_ACTIONTEXT_RemovingIISRoots=Removing IIS Virtual Roots... IDS_ACTIONTEXT_RemovingIni=Removing INI file entries IDS_ACTIONTEXT_RemovingMoved=Removing moved files IDS_ACTIONTEXT_RemovingODBC=Removing ODBC components IDS_ACTIONTEXT_RemovingRegistry=Removing system registry values IDS_ACTIONTEXT_RemovingShortcuts=Removing shortcuts IDS_ACTIONTEXT_RollingBack=Rolling back action: IDS_ACTIONTEXT_SearchForRelated=Searching for related applications IDS_ACTIONTEXT_SearchInstalled=Searching for installed applications IDS_ACTIONTEXT_SearchingQualifyingProducts=Searching for qualifying products IDS_ACTIONTEXT_SearchingQualifyingProducts2=Searching for qualifying products IDS_ACTIONTEXT_Service=Service: [1] IDS_ACTIONTEXT_Service2=Service: [2] IDS_ACTIONTEXT_Service3=Service: [1] IDS_ACTIONTEXT_Service4=Service: [1] IDS_ACTIONTEXT_Shortcut=Shortcut: [1] IDS_ACTIONTEXT_Shortcut1=Shortcut: [1] IDS_ACTIONTEXT_StartingServices=Starting services IDS_ACTIONTEXT_StoppingServices=Stopping services IDS_ACTIONTEXT_UnpublishProductFeatures=Unpublishing product features IDS_ACTIONTEXT_UnpublishQualified=Unpublishing Qualified Components IDS_ACTIONTEXT_UnpublishingProductInfo=Unpublishing product information IDS_ACTIONTEXT_UnregTypeLibs=Unregistering type libraries IDS_ACTIONTEXT_UnregisterClassServers=Unregister class servers IDS_ACTIONTEXT_UnregisterExtensionServers=Unregistering extension servers IDS_ACTIONTEXT_UnregisterModules=Unregistering modules IDS_ACTIONTEXT_UnregisteringComPlus=Unregistering COM+ Applications and Components IDS_ACTIONTEXT_UnregisteringFonts=Unregistering fonts IDS_ACTIONTEXT_UnregisteringMimeInfo=Unregistering MIME info IDS_ACTIONTEXT_UnregisteringProgramIds=Unregistering program identifiers IDS_ACTIONTEXT_UpdateComponentRegistration=Updating component registration IDS_ACTIONTEXT_UpdateEnvironmentStrings=Updating environment strings IDS_ACTIONTEXT_Validating=Validating install IDS_ACTIONTEXT_WritingINI=Writing INI file values IDS_ACTIONTEXT_WritingRegistry=Writing system registry values IDS_BACK=< &Back IDS_CANCEL=Cancel IDS_CANCEL2=&Cancel IDS_CHANGE=&Change... IDS_COMPLUS_PROGRESSTEXT_COST=Costing COM+ application: [1] IDS_COMPLUS_PROGRESSTEXT_INSTALL=Installing COM+ application: [1] IDS_COMPLUS_PROGRESSTEXT_UNINSTALL=Uninstalling COM+ application: [1] IDS_DIALOG_TEXT2_DESCRIPTION=Dialog Normal Description IDS_DIALOG_TEXT_DESCRIPTION_EXTERIOR={&TahomaBold10}Dialog Bold Title IDS_DIALOG_TEXT_DESCRIPTION_INTERIOR={&MSSansBold8}Dialog Bold Title IDS_DIFX_AMD64=[ProductName] requires an X64 processor. Click OK to exit the wizard. IDS_DIFX_IA64=[ProductName] requires an IA64 processor. Click OK to exit the wizard. IDS_DIFX_X86=[ProductName] requires an X86 processor. Click OK to exit the wizard. IDS_DatabaseFolder_InstallDatabaseTo=Install [ProductName] database to: IDS_ERROR_0={{Fatal error: }} IDS_ERROR_1=Error [1]. IDS_ERROR_10==== Logging started: [Date] [Time] === IDS_ERROR_100=Could not remove shortcut [2]. Verify that the shortcut file exists and that you can access it. IDS_ERROR_101=Could not register type library for file [2]. Contact your support personnel. IDS_ERROR_102=Could not unregister type library for file [2]. Contact your support personnel. IDS_ERROR_103=Could not update the INI file [2][3]. Verify that the file exists and that you can access it. IDS_ERROR_104=Could not schedule file [2] to replace file [3] on reboot. Verify that you have write permissions to file [3]. IDS_ERROR_105=Error removing ODBC driver manager, ODBC error [2]: [3]. Contact your support personnel. IDS_ERROR_106=Error installing ODBC driver manager, ODBC error [2]: [3]. Contact your support personnel. IDS_ERROR_107=Error removing ODBC driver [4], ODBC error [2]: [3]. Verify that you have sufficient privileges to remove ODBC drivers. IDS_ERROR_108=Error installing ODBC driver [4], ODBC error [2]: [3]. Verify that the file [4] exists and that you can access it. IDS_ERROR_109=Error configuring ODBC data source [4], ODBC error [2]: [3]. Verify that the file [4] exists and that you can access it. IDS_ERROR_11==== Logging stopped: [Date] [Time] === IDS_ERROR_110=Service [2] ([3]) failed to start. Verify that you have sufficient privileges to start system services. IDS_ERROR_111=Service [2] ([3]) could not be stopped. Verify that you have sufficient privileges to stop system services. IDS_ERROR_112=Service [2] ([3]) could not be deleted. Verify that you have sufficient privileges to remove system services. IDS_ERROR_113=Service [2] ([3]) could not be installed. Verify that you have sufficient privileges to install system services. IDS_ERROR_114=Could not update environment variable [2]. Verify that you have sufficient privileges to modify environment variables. IDS_ERROR_115=You do not have sufficient privileges to complete this installation for all users of the machine. Log on as an administrator and then retry this installation. IDS_ERROR_116=Could not set file security for file [3]. Error: [2]. Verify that you have sufficient privileges to modify the security permissions for this file. IDS_ERROR_117=Component Services (COM+ 1.0) are not installed on this computer. This installation requires Component Services in order to complete successfully. Component Services are available on Windows 2000. IDS_ERROR_118=Error registering COM+ application. Contact your support personnel for more information. IDS_ERROR_119=Error unregistering COM+ application. Contact your support personnel for more information. IDS_ERROR_12=Action start [Time]: [1]. IDS_ERROR_120=Removing older versions of this application IDS_ERROR_121=Preparing to remove older versions of this application IDS_ERROR_122=Error applying patch to file [2]. It has probably been updated by other means, and can no longer be modified by this patch. For more information contact your patch vendor. {{System Error: [3]}} IDS_ERROR_123=[2] cannot install one of its required products. Contact your technical support group. {{System Error: [3].}} IDS_ERROR_124=The older version of [2] cannot be removed. Contact your technical support group. {{System Error [3].}} IDS_ERROR_125=The description for service '[2]' ([3]) could not be changed. IDS_ERROR_126=The Windows Installer service cannot update the system file [2] because the file is protected by Windows. You may need to update your operating system for this program to work correctly. {{Package version: [3], OS Protected version: [4]}} IDS_ERROR_127=The Windows Installer service cannot update the protected Windows file [2]. {{Package version: [3], OS Protected version: [4], SFP Error: [5]}} IDS_ERROR_128=The Windows Installer service cannot update one or more protected Windows files. SFP Error: [2]. List of protected files: [3] IDS_ERROR_129=User installations are disabled via policy on the machine. IDS_ERROR_13=Action ended [Time]: [1]. Return value [2]. IDS_ERROR_130=This setup requires Internet Information Server for configuring IIS Virtual Roots. Please make sure that you have IIS installed. IDS_ERROR_131=This setup requires Administrator privileges for configuring IIS Virtual Roots. IDS_ERROR_1329=A file that is required cannot be installed because the cabinet file [2] is not digitally signed. This may indicate that the cabinet file is corrupt. IDS_ERROR_1330=A file that is required cannot be installed because the cabinet file [2] has an invalid digital signature. This may indicate that the cabinet file is corrupt.{ Error [3] was returned by WinVerifyTrust.} IDS_ERROR_1331=Failed to correctly copy [2] file: CRC error. IDS_ERROR_1332=Failed to correctly patch [2] file: CRC error. IDS_ERROR_1333=Failed to correctly patch [2] file: CRC error. IDS_ERROR_1334=The file '[2]' cannot be installed because the file cannot be found in cabinet file '[3]'. This could indicate a network error, an error reading from the CD-ROM, or a problem with this package. IDS_ERROR_1335=The cabinet file '[2]' required for this installation is corrupt and cannot be used. This could indicate a network error, an error reading from the CD-ROM, or a problem with this package. IDS_ERROR_1336=There was an error creating a temporary file that is needed to complete this installation. Folder: [3]. System error code: [2] IDS_ERROR_14=Time remaining: {[1] minutes }{[2] seconds} IDS_ERROR_15=Out of memory. Shut down other applications before retrying. IDS_ERROR_16=Installer is no longer responding. IDS_ERROR_1609=An error occurred while applying security settings. [2] is not a valid user or group. This could be a problem with the package, or a problem connecting to a domain controller on the network. Check your network connection and click Retry, or Cancel to end the install. Unable to locate the user's SID, system error [3] IDS_ERROR_1651=Admin user failed to apply patch for a per-user managed or a per-machine application which is in advertise state. IDS_ERROR_17=Installer terminated prematurely. IDS_ERROR_1715=Installed [2]. IDS_ERROR_1716=Configured [2]. IDS_ERROR_1717=Removed [2]. IDS_ERROR_1718=File [2] was rejected by digital signature policy. IDS_ERROR_1719=Windows Installer service could not be accessed. Contact your support personnel to verify that it is properly registered and enabled. IDS_ERROR_1720=There is a problem with this Windows Installer package. A script required for this install to complete could not be run. Contact your support personnel or package vendor. Custom action [2] script error [3], [4]: [5] Line [6], Column [7], [8] IDS_ERROR_1721=There is a problem with this Windows Installer package. A program required for this install to complete could not be run. Contact your support personnel or package vendor. Action: [2], location: [3], command: [4] IDS_ERROR_1722=There is a problem with this Windows Installer package. A program run as part of the setup did not finish as expected. Contact your support personnel or package vendor. Action [2], location: [3], command: [4] IDS_ERROR_1723=There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run. Contact your support personnel or package vendor. Action [2], entry: [3], library: [4] IDS_ERROR_1724=Removal completed successfully. IDS_ERROR_1725=Removal failed. IDS_ERROR_1726=Advertisement completed successfully. IDS_ERROR_1727=Advertisement failed. IDS_ERROR_1728=Configuration completed successfully. IDS_ERROR_1729=Configuration failed. IDS_ERROR_1730=You must be an Administrator to remo

Signatures

  • Modifies system executable filetype association 2 TTPs 12 IoCs
  • Registers COM server for autorun 1 TTPs
  • Blocklisted process makes network request 6 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 37 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookAW 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe
    "C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmp" /SL5="$40050,1569491,780800,C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe
        "C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:508
        • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\installer.exe
          "C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Program Files\McAfee\Temp1433196233\installer.exe
            "C:\Program Files\McAfee\Temp1433196233\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:1208
            • C:\Windows\SYSTEM32\sc.exe
              sc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"
              6⤵
                PID:2632
              • C:\Windows\SYSTEM32\regsvr32.exe
                regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:584
                • C:\Windows\SysWOW64\regsvr32.exe
                  /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                  7⤵
                  • Loads dropped DLL
                  PID:3608
              • C:\Windows\SYSTEM32\sc.exe
                sc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"
                6⤵
                  PID:1976
                • C:\Windows\SYSTEM32\regsvr32.exe
                  regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"
                  6⤵
                  • Loads dropped DLL
                  PID:588
                • C:\Windows\SYSTEM32\sc.exe
                  sc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//0
                  6⤵
                    PID:4080
                  • C:\Windows\SYSTEM32\sc.exe
                    sc.exe start "McAfee WebAdvisor"
                    6⤵
                      PID:3628
                    • C:\Windows\SYSTEM32\regsvr32.exe
                      regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2632
                      • C:\Windows\SysWOW64\regsvr32.exe
                        /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"
                        7⤵
                        • Loads dropped DLL
                        PID:3672
                    • C:\Windows\SYSTEM32\regsvr32.exe
                      regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"
                      6⤵
                      • Loads dropped DLL
                      • Modifies registry class
                      PID:3748
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod1_extract\winzip_mul_64.msi" /qn XAT=dci5
                3⤵
                • Enumerates connected drives
                • Suspicious use of AdjustPrivilegeToken
                PID:804
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Modifies system executable filetype association
            • Blocklisted process makes network request
            • Adds Run key to start application
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Modifies data under HKEY_USERS
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:368
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding C3476AB5C466449F1A055B37EC9B1F97
              2⤵
              • Loads dropped DLL
              PID:2808
              • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3E1ED143-F25C-43C5-A2C8-B146C8BAAD9E}
                3⤵
                • Executes dropped EXE
                PID:3960
              • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0715E107-9826-423E-BBC9-4EB1A3EA96B0}
                3⤵
                • Executes dropped EXE
                PID:1832
              • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BF2B1F68-4A1C-47F8-BE0E-BE847B7E2372}
                3⤵
                  PID:2780
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3F939B62-FE32-48DA-9511-2086C82BA685}
                  3⤵
                  • Executes dropped EXE
                  PID:3932
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C764189E-7261-4284-927D-2DDA4FF2B87F}
                  3⤵
                  • Executes dropped EXE
                  PID:2684
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3D915DD8-084B-4E23-8FC0-094AEF0F8536}
                  3⤵
                  • Executes dropped EXE
                  PID:3920
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{618EC6AD-9F65-4237-97D8-7CB9E01B4FFB}
                  3⤵
                  • Executes dropped EXE
                  PID:5004
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0291A01F-92A7-404D-8D67-4CA17A422C16}
                  3⤵
                  • Executes dropped EXE
                  PID:5036
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{038B9B6D-437E-4107-A7C1-737591376B75}
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:4688
                • C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7672C35F-2597-45F8-B98A-DA1D01B99584}
                  3⤵
                  • Executes dropped EXE
                  PID:2720
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{80FE9B8F-7EF2-442B-BC64-EBB061FEE202}
                  3⤵
                  • Executes dropped EXE
                  PID:1736
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E4193060-B137-4796-96B4-D73D6AA62092}
                  3⤵
                  • Executes dropped EXE
                  PID:4084
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{38795865-A37B-418E-A440-DD025A0E84A5}
                  3⤵
                  • Executes dropped EXE
                  PID:4792
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{59F57033-C1BC-4ABF-8447-5837725D5BC6}
                  3⤵
                  • Executes dropped EXE
                  PID:4068
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A6E55644-C2D7-424E-9BE1-9FD60B5B9F74}
                  3⤵
                  • Executes dropped EXE
                  PID:4776
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D1F46427-C060-42F5-AC58-C97F6F4EAABA}
                  3⤵
                  • Executes dropped EXE
                  PID:1300
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8BB9FEA2-C6F9-40A3-BECB-A22296A38134}
                  3⤵
                  • Executes dropped EXE
                  PID:2256
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7D8B8B24-E3D5-4993-A7F4-70AF426FF347}
                  3⤵
                  • Executes dropped EXE
                  PID:4844
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{379B0824-FCC1-4211-92BC-11E4681DB77E}
                  3⤵
                  • Executes dropped EXE
                  PID:4892
                • C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe
                  C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6D3B44EA-F06B-4272-9B63-0CF9005D284C}
                  3⤵
                  • Executes dropped EXE
                  PID:3736
              • C:\Windows\System32\MsiExec.exe
                C:\Windows\System32\MsiExec.exe -Embedding C763DCDADA037DD504DFC13B4B7A24AD
                2⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4004
                • C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe
                  "C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:4860
                • C:\Program Files\WinZip\adxregistrator.exe
                  "C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=user /GenerateLogFile=false
                  3⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  PID:5092
                • C:\Windows\SysWOW64\schtasks.exe
                  C:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 1" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_9AM\" -show" /ST 09:31 /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:1832
                • C:\Windows\SysWOW64\schtasks.exe
                  C:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 2" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_12PM\" -show" /ST 12:31 /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:516
                • C:\Windows\SysWOW64\schtasks.exe
                  C:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 3" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_3PM\" -show" /ST 15:31 /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:1344
              • C:\Windows\System32\MsiExec.exe
                C:\Windows\System32\MsiExec.exe -Embedding 6183ECBCBD2FBFF32EF86E5949024D6D E Global\MSI0000
                2⤵
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Modifies Internet Explorer settings
                • Modifies registry class
                PID:4964
                • C:\Program Files\WinZip\adxregistrator.exe
                  "C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=admin /GenerateLogFile=false
                  3⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Modifies registry class
                  PID:5056
              • C:\Program Files\WinZip\WzPreviewer64.exe
                "C:\Program Files\WinZip\WzPreviewer64.exe" -regserver winzip64
                2⤵
                • Executes dropped EXE
                • Modifies registry class
                PID:3736
              • C:\Program Files\WinZip\WzPreloader.exe
                "C:\Program Files\WinZip\WzPreloader.exe"
                2⤵
                • Executes dropped EXE
                PID:3744
              • C:\Program Files\WinZip\winzip64.exe
                "C:\Program Files\WinZip\winzip64.exe" /noqp /nodesktop /nostartmenu /nomenugroup /autoinstall /lang 1033
                2⤵
                • Modifies system executable filetype association
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookAW
                • Suspicious use of SetWindowsHookEx
                PID:724
                • C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe
                  "C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"
                  3⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:4084
              • C:\Program Files\WinZip\WZUpdateNotifier.exe
                "C:\Program Files\WinZip\WZUpdateNotifier.exe"
                2⤵
                • Executes dropped EXE
                PID:4776
              • C:\Program Files\WinZip\WzBGTComServer64.exe
                "C:\Program Files\WinZip\WzBGTComServer64.exe" /REGSERVER
                2⤵
                • Executes dropped EXE
                PID:2236
              • C:\Program Files\WinZip\WzBGTools64.exe
                "C:\Program Files\WinZip\WzBGTools64.exe" /s
                2⤵
                • Executes dropped EXE
                PID:5096
            • C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
              "C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2240
              • C:\Program Files\McAfee\WebAdvisor\UIHost.exe
                "C:\Program Files\McAfee\WebAdvisor\UIHost.exe"
                2⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                PID:4356
              • C:\Windows\system32\regsvr32.exe
                "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"
                2⤵
                  PID:4688
                  • C:\Windows\SysWOW64\regsvr32.exe
                    /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"
                    3⤵
                    • Loads dropped DLL
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:4708
                • C:\Windows\system32\regsvr32.exe
                  "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll"
                  2⤵
                  • Loads dropped DLL
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  PID:4756
                • C:\Program Files\McAfee\WebAdvisor\updater.exe
                  "C:\Program Files\McAfee\WebAdvisor\updater.exe"
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:508
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )
                    3⤵
                      PID:4068
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"
                      3⤵
                        PID:2832
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                    1⤵
                    • Drops file in Windows directory
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:5092
                  • C:\Windows\system32\browser_broker.exe
                    C:\Windows\system32\browser_broker.exe -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    PID:4320
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2700
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    PID:2156
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Executes dropped EXE
                    PID:2780

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Change Default File Association

                  1
                  T1042

                  Registry Run Keys / Startup Folder

                  2
                  T1060

                  New Service

                  1
                  T1050

                  Browser Extensions

                  1
                  T1176

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  New Service

                  1
                  T1050

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  5
                  T1112

                  Install Root Certificate

                  1
                  T1130

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  3
                  T1012

                  System Information Discovery

                  4
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files\McAfee\Temp1433196233\browserhost.cab
                    MD5

                    23082d82a631bbbbac8869ea72628211

                    SHA1

                    dce167ab01dc4a86c6e5f047d07a648c0990ac54

                    SHA256

                    3071081631b31b8d48a8dc76fb739fd28f4cad28c1eeb451e0172ba4e4fb79a0

                    SHA512

                    a1bb496a6875550a7fbaa782f68939befdae1edf5398952d639c09118d66bd9c7665b38bba199192e62168bc2365f79b14d2b79a5dc7d93a0813084a131265f2

                  • C:\Program Files\McAfee\Temp1433196233\browserplugin.cab
                    MD5

                    5a865b9f5d8a5d0afac937a1115abf15

                    SHA1

                    f87ce56345a43d837efcdb1e9c154258c96860d7

                    SHA256

                    8fb7273f818e2ab79353f5238d4e1b3d658c850923617b4dc68a9437356a259c

                    SHA512

                    aeb015dbf3b6feeaebbfa93775582c0646abea7d608193c323b0bb4fac3e8b0fd3b7aaf9d86eac075b064c2caf0c3044bee4bf21132497df02d1438a209d3573

                  • C:\Program Files\McAfee\Temp1433196233\downloadscan.cab
                    MD5

                    8bafa09c3fbc88cc192eea066ff51d60

                    SHA1

                    8ea1c3932016c182817461f22b5c9f5e9c6b7363

                    SHA256

                    54e83dfe9619a2c861777f18ea715f07479c64007f2ca1becb9c33d9f912e305

                    SHA512

                    0d3e00f8df34dcc184ec11a2a8b3c0c523cca96c8ef06ca0cecc2200bb20ba517afc7d40828565cf890ee5a8c2d529eaa19e058deaf0c6bdd092dc08cda61014

                  • C:\Program Files\McAfee\Temp1433196233\eventmanager.cab
                    MD5

                    e85e202b61f68821561986efc21c3314

                    SHA1

                    6aae4ec5eb81fe3b65809822b22dd652fb7d154e

                    SHA256

                    6392db15cb765cc62cf0cbfe2cc0b5462fbad7b7c2d651fcfeefa88e00950653

                    SHA512

                    8b10c2556c58e9812d7f0f754fed24666722350de5bbd1c89aec01d84111a38fecbf9235e5ee5596db8b233d75ce80c5f6cdd2fa8be28282f3280cda871135ab

                  • C:\Program Files\McAfee\Temp1433196233\ieplugin.cab
                    MD5

                    3d073baff1f834b8adb2d9d447fdcc41

                    SHA1

                    8afa88703133ada19c9fcc6a0f8c55f1edaa043b

                    SHA256

                    20bcdef47c2724e857821c468569aeae5d3b19460134400ae2353052002aaf12

                    SHA512

                    cd79f90aa80a25ea00f611f7d5adb345bd419b235673a2bae54d9acf7070c8b6620bae686d27b4a4774691832fa166c5d815313041f8c24439a3f8ea6e4de3d3

                  • C:\Program Files\McAfee\Temp1433196233\installer.exe
                    MD5

                    37284aafdb81d0344740c1f7a86856f2

                    SHA1

                    8e193589932e8ecf763e1a00f389f03979c4e075

                    SHA256

                    e6d1a7b0373a768a208e94868ea2c6405954b3a8ac78fcd6d1bf268f6ce0138f

                    SHA512

                    5743cc7d7c1903079ad9973484e005450c2af68bb2a9604ff078aedbe011caf2f031ddfd5b9863bb07bea97d87e2220759b5d27a9953a049c774b90c1f3d8ea4

                  • C:\Program Files\McAfee\Temp1433196233\installer.exe
                    MD5

                    37284aafdb81d0344740c1f7a86856f2

                    SHA1

                    8e193589932e8ecf763e1a00f389f03979c4e075

                    SHA256

                    e6d1a7b0373a768a208e94868ea2c6405954b3a8ac78fcd6d1bf268f6ce0138f

                    SHA512

                    5743cc7d7c1903079ad9973484e005450c2af68bb2a9604ff078aedbe011caf2f031ddfd5b9863bb07bea97d87e2220759b5d27a9953a049c774b90c1f3d8ea4

                  • C:\Program Files\McAfee\Temp1433196233\l10n.cab
                    MD5

                    f5ad9fcffcbb4d75353988984f29e52a

                    SHA1

                    715952f3c141681a988a6e42f34c3bcb34cf1341

                    SHA256

                    c1444bd3f5b430ee71480071b99c9fff83ab3cf12c3ce2003fdb68b8f55785dc

                    SHA512

                    f96e1cf6c0f9e4120ecb8c1dd64f558ca1e2d99738a0c4cee4b354dd11acb6e47c237f32b870822cb283bd97104aa749563fb46a3bbac2f17a73151454de599a

                  • C:\Program Files\McAfee\Temp1433196233\logicmodule.cab
                    MD5

                    f516abb9caf1e304aef64dc0c4289a36

                    SHA1

                    b216313c368c95b017860f7ad86c04b472b94550

                    SHA256

                    10cb07c32f80f7f93c277cf4bf3c5f5f17b9cf0e5234703eba0c9021a49bab60

                    SHA512

                    f6def8b40951411c09250ec46918cf4b179fcefa52fa13031b66514985e2b583b8484e457edd366288884712254253824a564b53c6a2a4fb3358f8f796ab6be8

                  • C:\Program Files\McAfee\Temp1433196233\logicscripts.cab
                    MD5

                    74b625b15b434c2dcad79ef8734bf664

                    SHA1

                    05b283685306c0a6aa4988735a077df63cf2e5e4

                    SHA256

                    ca75fdc5d662d57e1f0f55abb6a35c0b572feb8b8bfd3d657ff9e03a689dbab9

                    SHA512

                    3f7cbf39f14347291bc78e96181aa74885bf13009055d853141928cdbe757f7d30753ca1acec24102c02927c98ca22a319bef3eeeba0d62890c016770366e0f8

                  • C:\Program Files\McAfee\Temp1433196233\lookupmanager.cab
                    MD5

                    34c34c684bfd093ba04c0fe0c7c50663

                    SHA1

                    3531db5e432bef539647ee92fbf362f16f0ddf04

                    SHA256

                    3f848dae31c2992deaccc520316d76ec2f243bdbc7b011b089e21d2e34842969

                    SHA512

                    d0ab4194da0c80a6c1c70bae7143c127c67d18600ad3827e576e68e25067b00c212e9e4e20f8253d0569e4a44206a1a332c1fd226c882018f0c170a62ff68c76

                  • C:\Program Files\McAfee\Temp1433196233\mfw-mwb.cab
                    MD5

                    e7051f492e45285770316d7cdd6ad76f

                    SHA1

                    1f2177d6af4e7409b41526efaf54b75f5d3990fa

                    SHA256

                    d7a67bc4338998d614491b80f1fb647a4ac258476f567aad292d02e0adbf4c0c

                    SHA512

                    efcb8b6fae48f69d687d02469c71dd5627dbfdf24112ec2639c6654b736d1cd0e9d245842fd3430e7e1156c555ace624d05ef80ea6a5708ce8625e785641e699

                  • C:\Program Files\McAfee\Temp1433196233\mfw-nps.cab
                    MD5

                    15e2d12c50dafc262591ba7241ccae26

                    SHA1

                    9c08ef71b7f8d1669ce51785b9131b256c817a19

                    SHA256

                    4f45bcbefdec601c69721933bd7809e3888c5e2170329aae07551c8f12472721

                    SHA512

                    42f004c7d6d5758b71b222969593476df3e390df0276094695a287b91a145a8b2bb6a9dd0121a85c311545b42307ce4b669fb8d62497c8a67a8f8a9e14c58be0

                  • C:\Program Files\McAfee\Temp1433196233\mfw-webadvisor.cab
                    MD5

                    3ff57f2ebf96b8912826a762e94936f4

                    SHA1

                    97526d33bcd5a6e508e064cb1e5c611e82c0e4a2

                    SHA256

                    4e1180b48b2e944c1b93ca7f64f25c0bbcf822ab883912549c40942965a9d548

                    SHA512

                    34438146f6f1f33eca908b6df9387fe688bb8998ae7449c995d65aa14ff5ff28233e41da38b15635b49809fc3310dc17f3cb6ff7a7ccda7fd193163b767f65bc

                  • C:\Program Files\McAfee\Temp1433196233\mfw.cab
                    MD5

                    f1987cc41c144c2736b0728e1d2e50fd

                    SHA1

                    4bd093635fea012d8fc17c0e621180f5f0ef43ee

                    SHA256

                    a2f75a2ab1053491934d791720a0a18c231394f354853eaa4f6354fa793f4e09

                    SHA512

                    1f7c90c58281a72e667216515a7ab0ebedec8e66a63c7efeb3436c1168cd5c74f5f8f7ec0bce2c3b6b02c1026a231a6a4f813bc055c2fa6bcbc36d5aae371579

                  • C:\Program Files\McAfee\Temp1433196233\resourcedll.cab
                    MD5

                    72501aede996d6da9cb76975a29715e8

                    SHA1

                    f1a0d11cf4aa0811495c6fb7bd000ba979c90aec

                    SHA256

                    3234d758ec825185e26c7f63e4826b09b130abdb2e06081e2ef7ed4566739217

                    SHA512

                    5f68b87f365b206a59ab951dabd84df53b26a1ea59a8586a852d9865ba835f82e733386f1c480a21652cdb3289997a30d7a2ab1c50f5cf8f2bd48265313c5881

                  • C:\Program Files\McAfee\Temp1433196233\servicehost.cab
                    MD5

                    d1c16b4506540d7bc138563e9d061848

                    SHA1

                    24f5cc45bd7d04e6ff89eb1009778f183d39a7b1

                    SHA256

                    317c7d35800f4eafba7030db5245b821f4837e795c4bfe272d80a4cdfee81fe1

                    SHA512

                    ca08f4f84f5564adcaf86e7b3a2691999a63e8c1ba903110bd939d6f49d8f3c9af05f1b4a6490f53e3987e577a54dd92413ab91dccd29b0f85cf12da6b17f562

                  • C:\Program Files\McAfee\Temp1433196233\settingmanager.cab
                    MD5

                    8b50e76d2b230aa9212a9ae2003373a1

                    SHA1

                    48ab4257012200fa9ff5539a8c10208fa5ece465

                    SHA256

                    beecc7e20b95a05b458a28d966af60a5328f24de5730adeea5a22e244df8c1df

                    SHA512

                    434a9c2a2056431ff3db42d58df9da54cbe048fd30cd24663d1854c8f0424064c1c0b2822c5b8d2144d624c63a385f607f9572913eba6f2d792240d5dd164f83

                  • C:\Program Files\McAfee\Temp1433196233\taskmanager.cab
                    MD5

                    6dc7dc06db6308932b726986c091b003

                    SHA1

                    30421ecd96e643361457a69a5a23e63317903b1f

                    SHA256

                    72f75ed31221a9ccd8ec4ddac0f84b8d466c0224485de765c7d5e53ee3420dac

                    SHA512

                    7e125b38f5c8c2bee0c768c25ed14cd5dc77bc8362d8ecf510704f1651500ddd84e9eb3938dfe37ba7c70ecbda9ba28b5a25a1a9996cd70ef19a592ee82b1cda

                  • C:\Program Files\McAfee\Temp1433196233\telemetry.cab
                    MD5

                    ded62ffcb868f8a20665a22e517839d0

                    SHA1

                    26c20d321871edf75a63a3fc84375634f39c77d3

                    SHA256

                    581104a80e1efc5592dab9a0ea1dbc9161b477df9d1c80ed2b30443b4f37f6fb

                    SHA512

                    0b18c3eddd8d9add5dc1aa2476898979061ec604d38dc7e60a90cd1e379edd70869cd66941c65b8804fc9dc8b622b98e7817b1f104a7fc938ee58dedbdc934f5

                  • C:\Program Files\McAfee\Temp1433196233\uihost.cab
                    MD5

                    06ebaf5ce9a95cb16943f1a15a6f2a38

                    SHA1

                    a60feee38381f2f38ad550ce84c5b330b1420933

                    SHA256

                    cf5512c4259187a802afea53aa81edb3c52f48fd7cce305c79400537fc871b3d

                    SHA512

                    584be2a0b4906a40245ae18d055b189beed794fe2e04bb06fdca52f7943a29c3565c29939e0cd3d04d93f5ac1ec43431fd18b6bd5cb490569e63cdb013a65610

                  • C:\Program Files\McAfee\Temp1433196233\uimanager.cab
                    MD5

                    0293a495295efd284925d9c0c227cf02

                    SHA1

                    1e4a491fc781680a76fe8f69235c3241884db504

                    SHA256

                    4594100f2a9bda2dd4c8498a90648b443b9fa43d064b1639121760718463ba02

                    SHA512

                    166f0bf01435d2a077c6787135bb988f09332842536af2459a7e8280cd15c33a2e8fd49839cefddb13911c555e8d19f1cf97a4bc084aaa0615fd6113709bcd38

                  • C:\Program Files\McAfee\Temp1433196233\uninstaller.cab
                    MD5

                    c2aff4c1b50b3e1895112d1eca5ad9b9

                    SHA1

                    2746e23d30e799d4494e80ac5b7fbff391827ef7

                    SHA256

                    832b7f9c3c07e67c58991e787fab824b4c2dcc7419c0ab5796fd0d82b569a9b8

                    SHA512

                    9d2ef7d3c2c7423d37804060d6dff3deec75b5828d565b7ad9128860e6c6702a3ca9c7fc1aa2d20d195a623195ef31d68e34c8a420b182ca13a2bfe1e6634ef7

                  • C:\Program Files\McAfee\Temp1433196233\updater.cab
                    MD5

                    d522a22d07f3f9e803955b457e125796

                    SHA1

                    bebfc834168eb0a579f3dbfb25a5766b1d40ab06

                    SHA256

                    9ea1655197786b72f860fe3a15d00fe535653010407ee0b577e9cdf5e98f8e4f

                    SHA512

                    dd0ab120757a5516ed150c71901626d0dbd3427178e985459864aa92b62e85e23d10aa11ea800e950e7972449cb9418207e10f257452ba56808efe330d989f2e

                  • C:\Program Files\McAfee\Temp1433196233\wataskmanager.cab
                    MD5

                    1298bd77c859794e02a138a038d846af

                    SHA1

                    1470e44572df89f1d11ba4b0ecb789c387bb01ad

                    SHA256

                    b4b1435f081f675a05328b522d878d164262280ea97a2ad1ec5223a819b808af

                    SHA512

                    7756105beca9d2a44f3664c797ca00395ab18a334bf17f59bc1eea2c62c2dbd8ce94b6de65941189a446f4e782f85a94791dbb0ef96fcf4bbd13f194e804915d

                  • C:\Program Files\McAfee\Temp1433196233\webadvisor.cab
                    MD5

                    116cac18b4a276de51730c25a10cb3a6

                    SHA1

                    6dab71bd48f6f74f6a75a99f2db529a102f9155a

                    SHA256

                    ca2b088150bdb893020d5bb4f1a365334981635e4356d88ee04521bf855e89f4

                    SHA512

                    0828d98e5b917dd6e10673fd7076fecd64b7daf009564d29def0afd66b8e17ae02caef62f9cf9640c626589e08f619aff153f0797e565755def48e3e323423b2

                  • C:\Program Files\McAfee\Temp1433196233\wssdep.cab
                    MD5

                    08878314ea8a1a42f1ddb100a22b0531

                    SHA1

                    fa78da86a460894a21ef101d93f25f5a0e47d7bc

                    SHA256

                    4c802c9532946c84d0f3c55bb0995c0059bcca37183873ea8f0fb1b1ced8f60a

                    SHA512

                    2eb26ded5ee3ebf67a3e674f492210564a9be18877ce50dc3fd5739fb09510fc0cde67c75e27eec87d27f42cab63b3932457e56afa2b0623ef282f54b171a891

                  • C:\Program Files\McAfee\WebAdvisor\EventManager.dll
                    MD5

                    7fabf6673861b194fb74cfa56405a05d

                    SHA1

                    73ee821f7eff15a9909e99053590790ad8efef22

                    SHA256

                    d891f77c3f2d9266654cbba2192b190c64fa9f8be12fcfe9ecaec108e7936efe

                    SHA512

                    73d0a91d1a67bf1c4d0c89da9e63e8fdcd31cbe2eca26831acdb7f4189c823055885abd7c2fbcf586ffdc3908989943abd2760b676e970218e95c9afadd6352f

                  • C:\Program Files\McAfee\WebAdvisor\LookupManager.dll
                    MD5

                    bd7bb741f0b67b4874eadb685283e230

                    SHA1

                    409d86d9e8fb192e5cb38632742e89071dda0f18

                    SHA256

                    c09c3e639b3cbf891dd8a8df0001de2541601b4d272eec0941fa10ab9ab22e20

                    SHA512

                    9a8369dedf30b06b7dc008bf3417d7ed70a1267939ea8f7bfe9e3b8442081371bfa00c957f9ce1a088c9308cec983c2eb7b88fee473ad118db7f16fc54afd3ff

                  • C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
                    MD5

                    9c1c02d5247139cf58e0c05d869b78d2

                    SHA1

                    374397b16fe22a03eb9f0887ca3750bf2ebeb9ae

                    SHA256

                    ca0244aa3ebb3520d9e682e3ab8ad5186786540c342971ee2c35afa8bdf7a289

                    SHA512

                    3e92bfbabfd322420b6e6757b29bb4bd33fd854c594a17c1d7d4d6990a3c2824f8e1b4c0ab51619d7d317109488c4cdb53b067e3235a0e84b0bd09debd2c2a2e

                  • C:\Program Files\McAfee\WebAdvisor\SettingManager.dll
                    MD5

                    dca2e2268e01d111660e11b45fd62ca2

                    SHA1

                    30a3125c6452dc9aea6aad943a2bc545215dd664

                    SHA256

                    3947877592dd9e6f6ec900bd2287bbecf3533f3491e728a875fe9c726374ab69

                    SHA512

                    6bc5315a48d4d4dbfa7537b5b612ab27bd0029b57274c5dee01643d7de86078b28215e25a80235d80e860738e094efd313b5d4fb87ed6c0602d0a090c92ee81e

                  • C:\Program Files\McAfee\WebAdvisor\TaskManager.dll
                    MD5

                    77984e74f29aa26c84ecf57a26591a7f

                    SHA1

                    3e7ab536b5b9ae411803d75690b5fb586b006f06

                    SHA256

                    985019df73b3c8483faba01968aea2e68f75bd6f748b72e1790c9ef5d52b5b49

                    SHA512

                    ab324d6ecbed91eaf9e0b9c2e01c972097362c83b3a7710c56c02f94349201448eafbec092b2348888f94dbbbe29db15211835c8c351f293697712a8443bb582

                  • C:\Program Files\McAfee\WebAdvisor\mfw\core\class.luc
                    MD5

                    8e7b66f17bde1dc1c06dca6104e7f480

                    SHA1

                    1dc71e1c9fa656fb02b715a03b2ec6ad972243e4

                    SHA256

                    156d69852bbb0aaf3ab2b106f764b186241824ec796f06e0751577a81b0216be

                    SHA512

                    fbee964fe399b3107c8d4f84fb33793d5642b760474ccb0557004a87857592f563a327afaa21a55bf55c7f7606dbaf78101cdb25411cfe0c6aa10467486d0018

                  • C:\Program Files\McAfee\WebAdvisor\mfw\core\dkjson.luc
                    MD5

                    83235a426aa44d23731ffdbe76b2f01a

                    SHA1

                    5dc348407f37963f3e09599e9bbe2ded2a346125

                    SHA256

                    cc63ad6adf453c0e2b06c1d0860c7538c601d7b4add31319c0843b6b09e956a4

                    SHA512

                    3e2c2d7165b4e82dca3a20ce4eb1208d192cc118e3b63c7dfac8f0257ab4324b15884d77076ccfefda1ce752fb4b715eb574214deb3e48652802dde52d5ef268

                  • C:\Program Files\McAfee\WebAdvisor\mfw\core\logger.luc
                    MD5

                    ce0b0ec6e446e738b6e6a1fff5919a1d

                    SHA1

                    ac284eb831d1bc1eb9f9624cffb4e3bb4e15e013

                    SHA256

                    2018a369edb4a9ef0d5341b44d6d613885316128592d16794c246a6bffc60c14

                    SHA512

                    12ac72f8f1c3ff4c9073a60a8e996de90bd9976f459b15eb9654e780a932f1a47e20942dadcb1fcc805b78a5ae6da1d403b39a5f6db992b523df6a3b7b3bd709

                  • C:\Program Files\McAfee\WebAdvisor\servicehost.exe
                    MD5

                    9c1c02d5247139cf58e0c05d869b78d2

                    SHA1

                    374397b16fe22a03eb9f0887ca3750bf2ebeb9ae

                    SHA256

                    ca0244aa3ebb3520d9e682e3ab8ad5186786540c342971ee2c35afa8bdf7a289

                    SHA512

                    3e92bfbabfd322420b6e6757b29bb4bd33fd854c594a17c1d7d4d6990a3c2824f8e1b4c0ab51619d7d317109488c4cdb53b067e3235a0e84b0bd09debd2c2a2e

                  • C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryConfig.luc
                    MD5

                    57c4fe0457c550aaa7c35a48b979d433

                    SHA1

                    6400f9c457e906a3a38d935bc424a22445722e12

                    SHA256

                    75e3d869cc62ff8d2c0137985385f119b372d2443581586a1d4b2c38e59dc1db

                    SHA512

                    e53499874d3ce8b28e80286bed811416df7d744491c9c919cd7b235284db02823b2322e6b1dfd8f292c93919a5f13a06a68f83a17e4bb6d078173a15499812ad

                  • C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryHandler.luc
                    MD5

                    6c6ad8068e81e9dd39285a9311475c70

                    SHA1

                    0f2e1d07cad0d3fd75072541a2d990e126fc69e4

                    SHA256

                    70415e7589378283a6fb242db17286882dcf3af796b885bad3fd98668b33e8a3

                    SHA512

                    b625934d0679745909a1dfc6ed08ee0f9ad4292654b07efb59db59c5a66c31f422fa6e4cd505a1a2d86750286d93897b52f695fa078a4590c55f61aed985ccaf

                  • C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll
                    MD5

                    2ae6e93d352bb3064a4f13adfa717821

                    SHA1

                    74ab77903e4b81fec7a2d04a55efc9460789c3f9

                    SHA256

                    31ed165aa5dc3c074fb285e99a446bcf1107ed0550d79cded3daa8af1f26aec2

                    SHA512

                    5807e0391545c157bd8dc26f39a28fd0cd300c2538d0b835d533a921023ffce14778881f46c91560836f2d59e54a6d8d5539a49b1800d62b32ed85db8c061eda

                  • C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll
                    MD5

                    2bcc8b19399d239791f3f1fa1c10db58

                    SHA1

                    fd1d784f46f6bdaf2d133a7330ffffc62bc64bf5

                    SHA256

                    1ac0076b14551f9c3c510215a495a8bf8f53706ea22659211a37c30c0f0aa9f9

                    SHA512

                    af307a3257b086c6f8101c048b55c33185aa1440c4d405f84ce0b868f5bba62c1b12c60eb4a85ac629a9c88bf16fc3a8d20948f57dc9d01ded3439614ddc8108

                  • C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll
                    MD5

                    50d59fd9a7771aadcf9ae3c75a382774

                    SHA1

                    b3c8b4ee3b47d222e681bdd9285089b9798d5614

                    SHA256

                    f5ae2b83c42d0c93b853e4315d35fe1a02ca24c18c8174a1b5029574d2355278

                    SHA512

                    ea5dfb70450fc4d366b78fe90bf86c400dc0c40b0fbc921a21dbfcc2c4fcc82d017ba78763a757a15315b1a315d8d48f15e582696cf876025492239c27cacf2a

                  • C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll
                    MD5

                    6c0e4143cb5140e093b70c1d0c6ed325

                    SHA1

                    defabffad832df333969f31656f0a33d8246fa81

                    SHA256

                    ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755

                    SHA512

                    96c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83

                  • C:\Users\Admin\AppData\Local\Temp\MSI4b338.LOG
                    MD5

                    c85d0bacf059f831758d9355f855db8f

                    SHA1

                    df595362ed814b55300ee0f1c5e0d53e9812fb32

                    SHA256

                    0bec29537bc71959e02f2ed8ab6d3b575e545fba62e1b5ed15caaf3d5dd7b16e

                    SHA512

                    183e370fa8adfa30e6098aee9485fa042e5071771d0c27c4aff6ff51e2c85134b80678252c216a1dfef19551b2f0e8b3c0c185c0d2e70dc25c4afaff88b01898

                  • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\installer.exe
                    MD5

                    196b1b7dfbedc8167618371593cf5767

                    SHA1

                    8bc876ffc756f349a1919a3c6086499e964db9a1

                    SHA256

                    5e5fe698ce7f998cbbef3223ff5773dcc19623b78d5fc250ad5c04bc81346258

                    SHA512

                    58d98a2c29734768bd513c586a4cf07d8c8404cbe6d6f088c46855fc8b07de5f225143633c87d0d11e312e186005088a8e3f3e905e5c26550d3b77be18a9e3b0

                  • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe
                    MD5

                    211f842d6081bba42c3e7fdd372e0986

                    SHA1

                    fa96b4b66bf3f37b3bf6ba322213003dc0198d9e

                    SHA256

                    d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5

                    SHA512

                    bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0

                  • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe
                    MD5

                    211f842d6081bba42c3e7fdd372e0986

                    SHA1

                    fa96b4b66bf3f37b3bf6ba322213003dc0198d9e

                    SHA256

                    d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5

                    SHA512

                    bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0

                  • C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod1_extract\winzip_mul_64.msi
                    MD5

                    4bb4e7a963bf8ee519e6d67c6b5c616d

                    SHA1

                    3fc5790a746d34930084672924a5853e9f56c07d

                    SHA256

                    800b8e0414441f26cb383b38711ee1ffee55d02a07819a76b9cf3c0518124f50

                    SHA512

                    a76c3a51d1e1f48cbf96806167c2a2dc0949b1444a08811e6e28dc7cbc3c90339ade8aa18dd799dcb853c5cf20a66cd6a54776e5770d1e81a6fb068ab48b3886

                  • C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmp
                    MD5

                    47fe613751fef2c83fda48877d90300f

                    SHA1

                    d950ebcbf8621baef45f21198ccc72c59a524e53

                    SHA256

                    e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1

                    SHA512

                    c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92

                  • C:\Windows\Installer\MSIC6EF.tmp
                    MD5

                    a1b7850763af9593b66ee459a081bddf

                    SHA1

                    6e45955fae2b2494902a1b55a3873e542f0f5ce4

                    SHA256

                    41b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af

                    SHA512

                    a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1

                  • C:\Windows\Installer\MSIC9BF.tmp
                    MD5

                    14e63c3425987b4e9a0409b7d4e59010

                    SHA1

                    c89eedb1e195b285a875710c9851bde696e29b6e

                    SHA256

                    e264441c9b49c5c73c6e4882e978bf233af915a636132a25554ff8ae924f5b89

                    SHA512

                    d46235629bed45157d510485e3255f38e98b948697178d1092d646c3ccd63b1a9d49df27db255198ac0679f69979712ec6fcfaa2cc1066ef41016ca20434f093

                  • \Program Files\McAfee\WebAdvisor\eventmanager.dll
                    MD5

                    7fabf6673861b194fb74cfa56405a05d

                    SHA1

                    73ee821f7eff15a9909e99053590790ad8efef22

                    SHA256

                    d891f77c3f2d9266654cbba2192b190c64fa9f8be12fcfe9ecaec108e7936efe

                    SHA512

                    73d0a91d1a67bf1c4d0c89da9e63e8fdcd31cbe2eca26831acdb7f4189c823055885abd7c2fbcf586ffdc3908989943abd2760b676e970218e95c9afadd6352f

                  • \Program Files\McAfee\WebAdvisor\lookupmanager.dll
                    MD5

                    bd7bb741f0b67b4874eadb685283e230

                    SHA1

                    409d86d9e8fb192e5cb38632742e89071dda0f18

                    SHA256

                    c09c3e639b3cbf891dd8a8df0001de2541601b4d272eec0941fa10ab9ab22e20

                    SHA512

                    9a8369dedf30b06b7dc008bf3417d7ed70a1267939ea8f7bfe9e3b8442081371bfa00c957f9ce1a088c9308cec983c2eb7b88fee473ad118db7f16fc54afd3ff

                  • \Program Files\McAfee\WebAdvisor\settingmanager.dll
                    MD5

                    dca2e2268e01d111660e11b45fd62ca2

                    SHA1

                    30a3125c6452dc9aea6aad943a2bc545215dd664

                    SHA256

                    3947877592dd9e6f6ec900bd2287bbecf3533f3491e728a875fe9c726374ab69

                    SHA512

                    6bc5315a48d4d4dbfa7537b5b612ab27bd0029b57274c5dee01643d7de86078b28215e25a80235d80e860738e094efd313b5d4fb87ed6c0602d0a090c92ee81e

                  • \Program Files\McAfee\WebAdvisor\taskmanager.dll
                    MD5

                    77984e74f29aa26c84ecf57a26591a7f

                    SHA1

                    3e7ab536b5b9ae411803d75690b5fb586b006f06

                    SHA256

                    985019df73b3c8483faba01968aea2e68f75bd6f748b72e1790c9ef5d52b5b49

                    SHA512

                    ab324d6ecbed91eaf9e0b9c2e01c972097362c83b3a7710c56c02f94349201448eafbec092b2348888f94dbbbe29db15211835c8c351f293697712a8443bb582

                  • \Program Files\McAfee\WebAdvisor\win32\downloadscan.dll
                    MD5

                    2ae6e93d352bb3064a4f13adfa717821

                    SHA1

                    74ab77903e4b81fec7a2d04a55efc9460789c3f9

                    SHA256

                    31ed165aa5dc3c074fb285e99a446bcf1107ed0550d79cded3daa8af1f26aec2

                    SHA512

                    5807e0391545c157bd8dc26f39a28fd0cd300c2538d0b835d533a921023ffce14778881f46c91560836f2d59e54a6d8d5539a49b1800d62b32ed85db8c061eda

                  • \Program Files\McAfee\WebAdvisor\win32\wssdep.dll
                    MD5

                    2bcc8b19399d239791f3f1fa1c10db58

                    SHA1

                    fd1d784f46f6bdaf2d133a7330ffffc62bc64bf5

                    SHA256

                    1ac0076b14551f9c3c510215a495a8bf8f53706ea22659211a37c30c0f0aa9f9

                    SHA512

                    af307a3257b086c6f8101c048b55c33185aa1440c4d405f84ce0b868f5bba62c1b12c60eb4a85ac629a9c88bf16fc3a8d20948f57dc9d01ded3439614ddc8108

                  • \Program Files\McAfee\WebAdvisor\x64\downloadscan.dll
                    MD5

                    50d59fd9a7771aadcf9ae3c75a382774

                    SHA1

                    b3c8b4ee3b47d222e681bdd9285089b9798d5614

                    SHA256

                    f5ae2b83c42d0c93b853e4315d35fe1a02ca24c18c8174a1b5029574d2355278

                    SHA512

                    ea5dfb70450fc4d366b78fe90bf86c400dc0c40b0fbc921a21dbfcc2c4fcc82d017ba78763a757a15315b1a315d8d48f15e582696cf876025492239c27cacf2a

                  • \Program Files\McAfee\WebAdvisor\x64\wssdep.dll
                    MD5

                    6c0e4143cb5140e093b70c1d0c6ed325

                    SHA1

                    defabffad832df333969f31656f0a33d8246fa81

                    SHA256

                    ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755

                    SHA512

                    96c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83

                  • \Program Files\McAfee\WebAdvisor\x64\wssdep.dll
                    MD5

                    6c0e4143cb5140e093b70c1d0c6ed325

                    SHA1

                    defabffad832df333969f31656f0a33d8246fa81

                    SHA256

                    ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755

                    SHA512

                    96c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83

                  • \Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\botva2.dll
                    MD5

                    67965a5957a61867d661f05ae1f4773e

                    SHA1

                    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                    SHA256

                    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                    SHA512

                    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                  • \Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\botva2.dll
                    MD5

                    67965a5957a61867d661f05ae1f4773e

                    SHA1

                    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                    SHA256

                    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                    SHA512

                    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                  • \Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\zbShieldUtils.dll
                    MD5

                    8b03d5f13240d4395654ac0074a95728

                    SHA1

                    89d0f5039379fdda7719fa8b5ab3a46a92e3a064

                    SHA256

                    f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6

                    SHA512

                    bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3

                  • \Windows\Installer\MSIC6EF.tmp
                    MD5

                    a1b7850763af9593b66ee459a081bddf

                    SHA1

                    6e45955fae2b2494902a1b55a3873e542f0f5ce4

                    SHA256

                    41b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af

                    SHA512

                    a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1

                  • \Windows\Installer\MSIC9BF.tmp
                    MD5

                    14e63c3425987b4e9a0409b7d4e59010

                    SHA1

                    c89eedb1e195b285a875710c9851bde696e29b6e

                    SHA256

                    e264441c9b49c5c73c6e4882e978bf233af915a636132a25554ff8ae924f5b89

                    SHA512

                    d46235629bed45157d510485e3255f38e98b948697178d1092d646c3ccd63b1a9d49df27db255198ac0679f69979712ec6fcfaa2cc1066ef41016ca20434f093

                  • memory/508-213-0x0000000000000000-mapping.dmp
                  • memory/508-123-0x0000000000000000-mapping.dmp
                  • memory/516-329-0x0000000000000000-mapping.dmp
                  • memory/584-164-0x0000000000000000-mapping.dmp
                  • memory/588-169-0x0000000000000000-mapping.dmp
                  • memory/724-247-0x0000000000000000-mapping.dmp
                  • memory/804-129-0x0000000000000000-mapping.dmp
                  • memory/1208-128-0x0000000000000000-mapping.dmp
                  • memory/1300-235-0x0000000000000000-mapping.dmp
                  • memory/1344-330-0x0000000000000000-mapping.dmp
                  • memory/1516-115-0x0000000000000000-mapping.dmp
                  • memory/1516-118-0x0000000000700000-0x0000000000701000-memory.dmp
                    Filesize

                    4KB

                  • memory/1516-122-0x0000000000D20000-0x0000000000D2F000-memory.dmp
                    Filesize

                    60KB

                  • memory/1736-229-0x0000000000000000-mapping.dmp
                  • memory/1832-217-0x0000000000000000-mapping.dmp
                  • memory/1832-328-0x0000000000000000-mapping.dmp
                  • memory/1976-168-0x0000000000000000-mapping.dmp
                  • memory/2236-332-0x0000000000000000-mapping.dmp
                  • memory/2256-236-0x0000000000000000-mapping.dmp
                  • memory/2632-163-0x0000000000000000-mapping.dmp
                  • memory/2632-176-0x0000000000000000-mapping.dmp
                  • memory/2684-220-0x0000000000000000-mapping.dmp
                  • memory/2720-226-0x0000000000000000-mapping.dmp
                  • memory/2780-218-0x0000000000000000-mapping.dmp
                  • memory/2808-234-0x0000000005790000-0x0000000005957000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/2808-228-0x0000000005200000-0x0000000005202000-memory.dmp
                    Filesize

                    8KB

                  • memory/2808-227-0x0000000010000000-0x0000000010112000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/2808-173-0x0000000000000000-mapping.dmp
                  • memory/2808-221-0x0000000005690000-0x0000000005857000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/2832-215-0x0000000000000000-mapping.dmp
                  • memory/3172-114-0x0000000000400000-0x00000000004CC000-memory.dmp
                    Filesize

                    816KB

                  • memory/3608-166-0x0000000000000000-mapping.dmp
                  • memory/3628-177-0x0000000000000000-mapping.dmp
                  • memory/3672-181-0x0000000000000000-mapping.dmp
                  • memory/3736-245-0x0000000000000000-mapping.dmp
                  • memory/3736-241-0x0000000000000000-mapping.dmp
                  • memory/3744-246-0x0000000000000000-mapping.dmp
                  • memory/3744-250-0x000000001B800000-0x000000001B802000-memory.dmp
                    Filesize

                    8KB

                  • memory/3744-248-0x0000000000B30000-0x0000000000B31000-memory.dmp
                    Filesize

                    4KB

                  • memory/3748-186-0x0000000000000000-mapping.dmp
                  • memory/3920-222-0x0000000000000000-mapping.dmp
                  • memory/3932-219-0x0000000000000000-mapping.dmp
                  • memory/3960-216-0x0000000000000000-mapping.dmp
                  • memory/3976-126-0x0000000000000000-mapping.dmp
                  • memory/4004-191-0x0000000000000000-mapping.dmp
                  • memory/4068-232-0x0000000000000000-mapping.dmp
                  • memory/4068-214-0x0000000000000000-mapping.dmp
                  • memory/4080-172-0x0000000000000000-mapping.dmp
                  • memory/4084-276-0x00000272CFE0B000-0x00000272CFE0F000-memory.dmp
                    Filesize

                    16KB

                  • memory/4084-293-0x00000272E8A80000-0x00000272E8A81000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-319-0x00000272EB8E0000-0x00000272EB8F3000-memory.dmp
                    Filesize

                    76KB

                  • memory/4084-318-0x00000272E8878000-0x00000272E887A000-memory.dmp
                    Filesize

                    8KB

                  • memory/4084-316-0x00000272E8856000-0x00000272E8867000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-317-0x00000272E8867000-0x00000272E8878000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-315-0x00000272E8845000-0x00000272E8856000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-230-0x0000000000000000-mapping.dmp
                  • memory/4084-313-0x00000272E8823000-0x00000272E8834000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-314-0x00000272E8834000-0x00000272E8845000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-251-0x0000000000000000-mapping.dmp
                  • memory/4084-252-0x00000272CE140000-0x00000272CE141000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-255-0x0000000000D40000-0x0000000000D41000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-256-0x00000272CFE10000-0x00000272CFE11000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-257-0x00000272CFC90000-0x00000272CFC91000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-258-0x00000272CFF00000-0x00000272CFF01000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-259-0x00000272CFC20000-0x00000272CFC21000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-262-0x00000272E8880000-0x00000272E8881000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-265-0x00000272E88D0000-0x00000272E88D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-268-0x00000272E8AE0000-0x00000272E8AE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-269-0x00000272E8CB0000-0x00000272E8CB1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-271-0x00000272EA2C0000-0x00000272EA2C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-272-0x00000272CFE07000-0x00000272CFE0B000-memory.dmp
                    Filesize

                    16KB

                  • memory/4084-273-0x00000272E8D60000-0x00000272E8D61000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-274-0x00000272CFE00000-0x00000272CFE02000-memory.dmp
                    Filesize

                    8KB

                  • memory/4084-278-0x00000272E879B000-0x00000272E87AC000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-312-0x00000272E8812000-0x00000272E8823000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-281-0x00000272E8EC0000-0x00000272E8EC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-277-0x00000272E8E10000-0x00000272E8E11000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-282-0x00000272E87AC000-0x00000272E87BD000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-284-0x00000272E8786000-0x00000272E878A000-memory.dmp
                    Filesize

                    16KB

                  • memory/4084-280-0x00000272E8780000-0x00000272E8786000-memory.dmp
                    Filesize

                    24KB

                  • memory/4084-285-0x00000272E878A000-0x00000272E879B000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-286-0x00000272E8F70000-0x00000272E8F71000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-288-0x00000272E9020000-0x00000272E9021000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-291-0x00000272E9450000-0x00000272E9451000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-292-0x00000272E90E0000-0x00000272E90E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-311-0x00000272E8801000-0x00000272E8812000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-294-0x00000272E9160000-0x00000272E9161000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-295-0x00000272E8A40000-0x00000272E8A41000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-296-0x00000272E9260000-0x00000272E9261000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-298-0x00000272E9310000-0x00000272E9311000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-300-0x00000272E97C0000-0x00000272E97C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-302-0x00000272E9920000-0x00000272E9921000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-304-0x00000272E99D0000-0x00000272E99D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-306-0x00000272E9A80000-0x00000272E9A81000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-307-0x00000272E87CE000-0x00000272E87DF000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-308-0x00000272CFE06000-0x00000272CFE07000-memory.dmp
                    Filesize

                    4KB

                  • memory/4084-309-0x00000272E87DF000-0x00000272E87F0000-memory.dmp
                    Filesize

                    68KB

                  • memory/4084-310-0x00000272E87F0000-0x00000272E8801000-memory.dmp
                    Filesize

                    68KB

                  • memory/4356-207-0x0000000000000000-mapping.dmp
                  • memory/4688-225-0x0000000000000000-mapping.dmp
                  • memory/4688-208-0x0000000000000000-mapping.dmp
                  • memory/4708-209-0x0000000000000000-mapping.dmp
                  • memory/4756-210-0x0000000000000000-mapping.dmp
                  • memory/4776-233-0x0000000000000000-mapping.dmp
                  • memory/4776-331-0x0000000000000000-mapping.dmp
                  • memory/4792-231-0x0000000000000000-mapping.dmp
                  • memory/4844-239-0x0000000000000000-mapping.dmp
                  • memory/4860-211-0x0000000000000000-mapping.dmp
                  • memory/4892-240-0x0000000000000000-mapping.dmp
                  • memory/4964-242-0x0000000000000000-mapping.dmp
                  • memory/5004-223-0x0000000000000000-mapping.dmp
                  • memory/5036-224-0x0000000000000000-mapping.dmp
                  • memory/5056-326-0x0000000004C51000-0x0000000004C52000-memory.dmp
                    Filesize

                    4KB

                  • memory/5056-325-0x0000000004C50000-0x0000000004C51000-memory.dmp
                    Filesize

                    4KB

                  • memory/5056-327-0x0000000004C53000-0x0000000004C54000-memory.dmp
                    Filesize

                    4KB

                  • memory/5056-324-0x0000000000000000-mapping.dmp
                  • memory/5092-323-0x0000000004E23000-0x0000000004E24000-memory.dmp
                    Filesize

                    4KB

                  • memory/5092-322-0x0000000004E21000-0x0000000004E22000-memory.dmp
                    Filesize

                    4KB

                  • memory/5092-321-0x0000000004E20000-0x0000000004E21000-memory.dmp
                    Filesize

                    4KB

                  • memory/5092-320-0x0000000000000000-mapping.dmp
                  • memory/5096-333-0x0000000000000000-mapping.dmp