Analysis

  • max time kernel
    210s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2022 02:48

General

  • Target

    https://www.avast.com/c-malware-removal-tool

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 64 IoCs
  • Executes dropped EXE 34 IoCs
  • Registers COM server for autorun 1 TTPs 13 IoCs
  • Sets service image path in registry 2 TTPs 15 IoCs
  • Uses Session Manager for persistence 2 TTPs 2 IoCs

    Creates Session Manager registry key to run executable early in system boot.

  • Loads dropped DLL 51 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 19 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: LoadsDriver 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.avast.com/c-malware-removal-tool
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca1034f50,0x7ffca1034f60,0x7ffca1034f70
      2⤵
        PID:4816
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1700 /prefetch:2
        2⤵
          PID:2080
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2024 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4824
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2316 /prefetch:8
          2⤵
            PID:4620
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3024 /prefetch:1
            2⤵
              PID:1204
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:1
              2⤵
                PID:536
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4300 /prefetch:8
                2⤵
                  PID:3452
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:1
                  2⤵
                    PID:1876
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:1
                    2⤵
                      PID:1988
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                      2⤵
                        PID:4460
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                        2⤵
                          PID:3328
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                          2⤵
                            PID:716
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                            2⤵
                              PID:5004
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                              2⤵
                                PID:1952
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:1
                                2⤵
                                  PID:1276
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:1
                                  2⤵
                                    PID:4068
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6716 /prefetch:8
                                    2⤵
                                      PID:1012
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6692 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4932
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6032 /prefetch:8
                                      2⤵
                                        PID:2172
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5656 /prefetch:8
                                        2⤵
                                          PID:4624
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6780 /prefetch:8
                                          2⤵
                                            PID:3496
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6716 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2544
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:1
                                            2⤵
                                              PID:4440
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1604 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3340
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4008
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
                                              2⤵
                                                PID:3812
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3496
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:8
                                                2⤵
                                                  PID:1864
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:8
                                                  2⤵
                                                    PID:4944
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5648 /prefetch:8
                                                    2⤵
                                                      PID:3444
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:1
                                                      2⤵
                                                        PID:4792
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                                        2⤵
                                                          PID:1880
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1
                                                          2⤵
                                                            PID:4728
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:1
                                                            2⤵
                                                              PID:2172
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                                                              2⤵
                                                                PID:4008
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                                                2⤵
                                                                  PID:1396
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:1
                                                                  2⤵
                                                                    PID:2708
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6724 /prefetch:1
                                                                    2⤵
                                                                      PID:4856
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1
                                                                      2⤵
                                                                        PID:1700
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:1
                                                                        2⤵
                                                                          PID:4640
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:1
                                                                          2⤵
                                                                            PID:4812
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:8
                                                                            2⤵
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:4644
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6836 /prefetch:8
                                                                            2⤵
                                                                              PID:2640
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4900 /prefetch:8
                                                                              2⤵
                                                                                PID:3128
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6736 /prefetch:8
                                                                                2⤵
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:4500
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6384 /prefetch:8
                                                                                2⤵
                                                                                  PID:4764
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6584 /prefetch:8
                                                                                  2⤵
                                                                                    PID:3952
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
                                                                                    2⤵
                                                                                      PID:4612
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5376 /prefetch:8
                                                                                      2⤵
                                                                                        PID:344
                                                                                      • C:\Users\Admin\Downloads\avast_one_free_antivirus.exe
                                                                                        "C:\Users\Admin\Downloads\avast_one_free_antivirus.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Writes to the Master Boot Record (MBR)
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:116
                                                                                        • C:\Windows\Temp\asw.095f3dba005d3592\avast_one_essential_setup_online_x64.exe
                                                                                          "C:\Windows\Temp\asw.095f3dba005d3592\avast_one_essential_setup_online_x64.exe" /cookie:mmm_aon_999_999_a6i_m /ga_clientid:8755827c-8432-43e0-83d9-1e5151083dd7 /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Writes to the Master Boot Record (MBR)
                                                                                          • Checks processor information in registry
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:3180
                                                                                          • C:\Windows\Temp\asw.4794986d48333567\instup.exe
                                                                                            "C:\Windows\Temp\asw.4794986d48333567\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.4794986d48333567 /edition:21 /prod:ais /guid:c3f1c0ee-1a40-4faf-89d9-f4fdcbc62fa1 /ga_clientid:8755827c-8432-43e0-83d9-1e5151083dd7 /cookie:mmm_aon_999_999_a6i_m /ga_clientid:8755827c-8432-43e0-83d9-1e5151083dd7 /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Checks for any installed AV software in registry
                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                            • Checks processor information in registry
                                                                                            • Modifies registry class
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:3328
                                                                                            • C:\Windows\Temp\asw.4794986d48333567\New_16091792\instup.exe
                                                                                              "C:\Windows\Temp\asw.4794986d48333567\New_16091792\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.4794986d48333567 /edition:21 /prod:ais /guid:c3f1c0ee-1a40-4faf-89d9-f4fdcbc62fa1 /ga_clientid:8755827c-8432-43e0-83d9-1e5151083dd7 /cookie:mmm_aon_999_999_a6i_m /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592 /online_installer
                                                                                              5⤵
                                                                                              • Drops file in Drivers directory
                                                                                              • Executes dropped EXE
                                                                                              • Registers COM server for autorun
                                                                                              • Sets service image path in registry
                                                                                              • Loads dropped DLL
                                                                                              • Adds Run key to start application
                                                                                              • Checks for any installed AV software in registry
                                                                                              • Writes to the Master Boot Record (MBR)
                                                                                              • Drops file in System32 directory
                                                                                              • Drops file in Program Files directory
                                                                                              • Drops file in Windows directory
                                                                                              • Checks SCSI registry key(s)
                                                                                              • Checks processor information in registry
                                                                                              • Modifies registry class
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:3496
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkGToolbar -elevated
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2380
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkChrome -elevated
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4740
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" /check_secure_browser
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3812
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkChrome -elevated
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:5104
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AVFC
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2064
                                                                                                • C:\Users\Public\Documents\aswOfferTool.exe
                                                                                                  "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AVFC
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  PID:2808
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AVFC
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4100
                                                                                                • C:\Users\Public\Documents\aswOfferTool.exe
                                                                                                  "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AVFC
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  PID:3140
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\aswOfferTool.exe" -checkChrome -elevated
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1212
                                                                                              • C:\Windows\Temp\asw.4794986d48333567\New_16091792\sbr.exe
                                                                                                "C:\Windows\Temp\asw.4794986d48333567\New_16091792\sbr.exe" 3496 "Avast Antivirus setup" "Avast Antivirus is being installed. Do not shut down your computer!"
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3816
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswRdr2.cat
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1364
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswHwid.cat
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4856
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswVmm.cat
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2656
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswRvrt.cat
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1912
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /elaminst C:\Windows\system32\drivers\aswElam.sys
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3996
                                                                                              • C:\Program Files\Avast Software\Avast\AvEmUpdate.exe
                                                                                                "C:\Program Files\Avast Software\Avast\AvEmUpdate.exe" /installer /reg
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4072
                                                                                              • C:\Program Files\Avast Software\Avast\AvEmUpdate.exe
                                                                                                "C:\Program Files\Avast Software\Avast\AvEmUpdate.exe" /installer1
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Drops file in Program Files directory
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4940
                                                                                                • C:\Program Files\Avast Software\Avast\avBugReport.exe
                                                                                                  "C:\Program Files\Avast Software\Avast\avBugReport.exe" --send "dumps|report" --silent --path "C:\ProgramData\Avast Software\Avast" --logpath "C:\ProgramData\Avast Software\Avast\log" --guid c3f1c0ee-1a40-4faf-89d9-f4fdcbc62fa1
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Checks for any installed AV software in registry
                                                                                                  • Writes to the Master Boot Record (MBR)
                                                                                                  • Checks processor information in registry
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:4168
                                                                                              • C:\Program Files\Avast Software\Avast\x86\RegSvr.exe
                                                                                                "C:\Program Files\Avast Software\Avast\x86\RegSvr.exe" "C:\Program Files\Avast Software\Avast\x86\aswAMSI.dll"
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Modifies Internet Explorer settings
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2260
                                                                                              • C:\Program Files\Avast Software\Avast\RegSvr.exe
                                                                                                "C:\Program Files\Avast Software\Avast\RegSvr.exe" "C:\Program Files\Avast Software\Avast\aswAMSI.dll"
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Registers COM server for autorun
                                                                                                • Loads dropped DLL
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Modifies Internet Explorer settings
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2068
                                                                                              • C:\Program Files\Avast Software\Avast\x86\RegSvr.exe
                                                                                                "C:\Program Files\Avast Software\Avast\x86\RegSvr.exe" "C:\Program Files\Avast Software\Avast\x86\asOutExt.dll"
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Modifies registry class
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3456
                                                                                              • C:\Program Files\Avast Software\Avast\RegSvr.exe
                                                                                                "C:\Program Files\Avast Software\Avast\RegSvr.exe" "C:\Program Files\Avast Software\Avast\asOutExt.dll"
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Registers COM server for autorun
                                                                                                • Loads dropped DLL
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Checks processor information in registry
                                                                                                • Modifies registry class
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1648
                                                                                              • C:\Program Files\Avast Software\Avast\AvastNM.exe
                                                                                                "C:\Program Files\Avast Software\Avast\AvastNM.exe" /install
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3136
                                                                                              • C:\Program Files\Avast Software\Avast\SetupInf.exe
                                                                                                "C:\Program Files\Avast Software\Avast\SetupInf.exe" /catinstall:"C:\Program Files\Avast Software\Avast\setup\crts.cat" /basename:pkg_{af98c830-4f53-4176-a7b0-ec21fc603adc}.cat /crtid:9809A3351150669332CDB2A1412622D9FCFBC440
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Checks for any installed AV software in registry
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Drops file in System32 directory
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:3688
                                                                                              • C:\Program Files\Avast Software\Avast\avast_cleanup_setup.exe
                                                                                                "C:\Program Files\Avast Software\Avast\avast_cleanup_setup.exe" /silent /nouiafterinstall /source:avast_one /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4956
                                                                                                • C:\Windows\Temp\asw-8e28122e-16c3-462c-98d5-bf92b08063cc\common\icarus.exe
                                                                                                  C:\Windows\Temp\asw-8e28122e-16c3-462c-98d5-bf92b08063cc\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-8e28122e-16c3-462c-98d5-bf92b08063cc\icarus-info.xml /install /silent /nouiafterinstall /source:avast_one /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Writes to the Master Boot Record (MBR)
                                                                                                  • Checks processor information in registry
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:4680
                                                                                                  • C:\Windows\Temp\asw-8e28122e-16c3-462c-98d5-bf92b08063cc\avast-tu\icarus.exe
                                                                                                    C:\Windows\Temp\asw-8e28122e-16c3-462c-98d5-bf92b08063cc\avast-tu\icarus.exe /silent /nouiafterinstall /source:avast_one /edat_dir:C:\Windows\Temp\asw.095f3dba005d3592 /er_master:master_ep_6e8429df-9557-4fcd-9ae6-701f6d7ebb19 /er_ui:ui_ep_05445c63-c48c-425f-90ed-2cf885b05935 /er_slave:avast-tu_slave_ep_ca0149ff-25d2-46fe-b5ae-7c8b2ee86931 /slave:avast-tu
                                                                                                    8⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Uses Session Manager for persistence
                                                                                                    • Loads dropped DLL
                                                                                                    • Checks for any installed AV software in registry
                                                                                                    • Writes to the Master Boot Record (MBR)
                                                                                                    • Drops file in System32 directory
                                                                                                    • Drops file in Program Files directory
                                                                                                    • Checks processor information in registry
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:1688
                                                                                                    • C:\Program Files\Avast Software\Cleanup\pdfix.exe
                                                                                                      "C:\Program Files\Avast Software\Cleanup\pdfix.exe" /fixifeo
                                                                                                      9⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1744
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6448 /prefetch:8
                                                                                        2⤵
                                                                                          PID:3464
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5452 /prefetch:2
                                                                                          2⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:4076
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5884 /prefetch:8
                                                                                          2⤵
                                                                                            PID:1664
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:8
                                                                                            2⤵
                                                                                              PID:2280
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:8
                                                                                              2⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:2732
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,8309322579907845296,6889605324107855747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6600 /prefetch:8
                                                                                              2⤵
                                                                                                PID:1476
                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                              1⤵
                                                                                                PID:3556
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                                                                                                1⤵
                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3440
                                                                                              • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                                                1⤵
                                                                                                • Drops file in Program Files directory
                                                                                                PID:904
                                                                                                • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir904_149319513\ChromeRecovery.exe
                                                                                                  "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir904_149319513\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={28e18b4d-6fab-4171-92de-37043a0ecd1f} --system
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3952
                                                                                              • C:\Program Files\Avast Software\Cleanup\TuneupSvc.exe
                                                                                                "C:\Program Files\Avast Software\Cleanup\TuneupSvc.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Checks processor information in registry
                                                                                                PID:376

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v6

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\ProgramData\Avast Software\Persistent Data\Avast\Logs\Setup.log

                                                                                                Filesize

                                                                                                4KB

                                                                                                MD5

                                                                                                0422f529d30aab0a093ea92bdcda7839

                                                                                                SHA1

                                                                                                293a215d145a158d4f9949464b60d62f7b68e6fb

                                                                                                SHA256

                                                                                                9bad051737e9df4f5c3c4805a330399c694fc08011f89068764a05467e4432df

                                                                                                SHA512

                                                                                                6f18e335b245775572cb16d5b80a9b5081534c0ef5eda7ad445d9139f43e56d4b1d4998a454ccbc36ae1d0ed1cc52f2eeb54cf6ef6ff7dd0ae9cbcf7b7414ca0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches

                                                                                                MD5

                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                SHA1

                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                SHA256

                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                SHA512

                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                              • C:\Users\Admin\Downloads\avast_one_free_antivirus.exe

                                                                                                Filesize

                                                                                                262KB

                                                                                                MD5

                                                                                                efff813bf04eb81571158098edd0d760

                                                                                                SHA1

                                                                                                63fd6d4d7ada4e63ba44d9acad19c5871dcb81b3

                                                                                                SHA256

                                                                                                2d963d0ac1a323828e291183214d7e6df86569e54f814eb3e7e44b5c03328e1d

                                                                                                SHA512

                                                                                                9938c751731640a070d7284e41014650ae9d8952d2f4f7ca1d7b93c91f61a9246492d61bf5ada8296944cb569e84bcde50fc565d8866129ae13f8053259aaf83

                                                                                              • C:\Users\Admin\Downloads\avast_one_free_antivirus.exe

                                                                                                Filesize

                                                                                                262KB

                                                                                                MD5

                                                                                                efff813bf04eb81571158098edd0d760

                                                                                                SHA1

                                                                                                63fd6d4d7ada4e63ba44d9acad19c5871dcb81b3

                                                                                                SHA256

                                                                                                2d963d0ac1a323828e291183214d7e6df86569e54f814eb3e7e44b5c03328e1d

                                                                                                SHA512

                                                                                                9938c751731640a070d7284e41014650ae9d8952d2f4f7ca1d7b93c91f61a9246492d61bf5ada8296944cb569e84bcde50fc565d8866129ae13f8053259aaf83

                                                                                              • C:\Windows\Temp\asw.095f3dba005d3592\avast_one_essential_setup_online_x64.exe

                                                                                                Filesize

                                                                                                9.3MB

                                                                                                MD5

                                                                                                5b6eff947184c8cf998ea6a2e418b674

                                                                                                SHA1

                                                                                                09504db44358cc1e32d5992475b7f461d6a60238

                                                                                                SHA256

                                                                                                4232208444c5c3b76ba4ad1fc32bb3483d5eeb9ac77539e76205f51a4fb3e31d

                                                                                                SHA512

                                                                                                561c544d91543ebe1314de5c9fb26af8cfc4c9667fd5f82fef1035c5516b4c3cb96aebce8bed8b6844ce34b10ddb9880e3962d3092f1fbf42574df2d4abd96f5

                                                                                              • C:\Windows\Temp\asw.095f3dba005d3592\avast_one_essential_setup_online_x64.exe

                                                                                                Filesize

                                                                                                9.3MB

                                                                                                MD5

                                                                                                5b6eff947184c8cf998ea6a2e418b674

                                                                                                SHA1

                                                                                                09504db44358cc1e32d5992475b7f461d6a60238

                                                                                                SHA256

                                                                                                4232208444c5c3b76ba4ad1fc32bb3483d5eeb9ac77539e76205f51a4fb3e31d

                                                                                                SHA512

                                                                                                561c544d91543ebe1314de5c9fb26af8cfc4c9667fd5f82fef1035c5516b4c3cb96aebce8bed8b6844ce34b10ddb9880e3962d3092f1fbf42574df2d4abd96f5

                                                                                              • C:\Windows\Temp\asw.095f3dba005d3592\avast_one_essential_setup_online_x64.exe

                                                                                                Filesize

                                                                                                9.3MB

                                                                                                MD5

                                                                                                5b6eff947184c8cf998ea6a2e418b674

                                                                                                SHA1

                                                                                                09504db44358cc1e32d5992475b7f461d6a60238

                                                                                                SHA256

                                                                                                4232208444c5c3b76ba4ad1fc32bb3483d5eeb9ac77539e76205f51a4fb3e31d

                                                                                                SHA512

                                                                                                561c544d91543ebe1314de5c9fb26af8cfc4c9667fd5f82fef1035c5516b4c3cb96aebce8bed8b6844ce34b10ddb9880e3962d3092f1fbf42574df2d4abd96f5

                                                                                              • C:\Windows\Temp\asw.095f3dba005d3592\ecoo.edat

                                                                                                Filesize

                                                                                                21B

                                                                                                MD5

                                                                                                e45f114602f5dc736515f22121f167e8

                                                                                                SHA1

                                                                                                42a26fc0aa3b0fe1b697d7b49d50ae1030817a64

                                                                                                SHA256

                                                                                                84cae5fc103e4a16df95224c351386db251281292e9b4b301b38ae77f6c09780

                                                                                                SHA512

                                                                                                7ec67fd274be919df2a3c35a24670bd91666527c08deca5a264e7d174a1db5791e9c5e59d5dfbadb831cbfc4661c07e59310a10a4aa0d438b594c36a2b1f8c62

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\HTMLayout.dll

                                                                                                Filesize

                                                                                                3.8MB

                                                                                                MD5

                                                                                                46766c2980fabbe18891f34015eb6448

                                                                                                SHA1

                                                                                                18c10f90379038eea21b665dc2d9c9943ef5466a

                                                                                                SHA256

                                                                                                d0e2d5b5cb1db0a0fffd1947595e5dd684eb99b5b38c0514cf9c210b9e62787c

                                                                                                SHA512

                                                                                                6597ec2f8c4b6fe0bea8a86ba5a145c77f27d472fdd9967c81612e3cd373cb9e1f3f98c5cf3712b3bf8a3f852ab62d8e0e804430347cf0a007046e8e79b152d4

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\HTMLayout.dll

                                                                                                Filesize

                                                                                                3.8MB

                                                                                                MD5

                                                                                                46766c2980fabbe18891f34015eb6448

                                                                                                SHA1

                                                                                                18c10f90379038eea21b665dc2d9c9943ef5466a

                                                                                                SHA256

                                                                                                d0e2d5b5cb1db0a0fffd1947595e5dd684eb99b5b38c0514cf9c210b9e62787c

                                                                                                SHA512

                                                                                                6597ec2f8c4b6fe0bea8a86ba5a145c77f27d472fdd9967c81612e3cd373cb9e1f3f98c5cf3712b3bf8a3f852ab62d8e0e804430347cf0a007046e8e79b152d4

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\Instup.dll

                                                                                                Filesize

                                                                                                20.3MB

                                                                                                MD5

                                                                                                bd903d66bfefd015993b0bae58ed9dd9

                                                                                                SHA1

                                                                                                ac9d8584ede4db6b4e8e75fd7b9fe295e4f5635a

                                                                                                SHA256

                                                                                                9f4c0f979cf6451cfecc2ab60b0c504a02acf4548923a923e5ed5b7a4580bccf

                                                                                                SHA512

                                                                                                4260cae21eb082c606aa09b4e870939f87e2adc1e593b9ba7f347a9217ddcadd667e65f72ba6ae2d2dfc031ad9a14fbcdb672656b4726f1ccf91724bc2b3e309

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\Instup.dll

                                                                                                Filesize

                                                                                                20.3MB

                                                                                                MD5

                                                                                                bd903d66bfefd015993b0bae58ed9dd9

                                                                                                SHA1

                                                                                                ac9d8584ede4db6b4e8e75fd7b9fe295e4f5635a

                                                                                                SHA256

                                                                                                9f4c0f979cf6451cfecc2ab60b0c504a02acf4548923a923e5ed5b7a4580bccf

                                                                                                SHA512

                                                                                                4260cae21eb082c606aa09b4e870939f87e2adc1e593b9ba7f347a9217ddcadd667e65f72ba6ae2d2dfc031ad9a14fbcdb672656b4726f1ccf91724bc2b3e309

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\Instup.dll

                                                                                                Filesize

                                                                                                20.3MB

                                                                                                MD5

                                                                                                bd903d66bfefd015993b0bae58ed9dd9

                                                                                                SHA1

                                                                                                ac9d8584ede4db6b4e8e75fd7b9fe295e4f5635a

                                                                                                SHA256

                                                                                                9f4c0f979cf6451cfecc2ab60b0c504a02acf4548923a923e5ed5b7a4580bccf

                                                                                                SHA512

                                                                                                4260cae21eb082c606aa09b4e870939f87e2adc1e593b9ba7f347a9217ddcadd667e65f72ba6ae2d2dfc031ad9a14fbcdb672656b4726f1ccf91724bc2b3e309

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\Instup.exe

                                                                                                Filesize

                                                                                                3.4MB

                                                                                                MD5

                                                                                                954bacaf8c8b28cc1f3993619dceb362

                                                                                                SHA1

                                                                                                f3e0a5fd31212eab7d7fdca85f1d362744d05ddb

                                                                                                SHA256

                                                                                                a2bb7c45815f3359b5886fa0099e56a7622b699e340d428e8e924ee1993f48f5

                                                                                                SHA512

                                                                                                41e8e353580f82a6b02ab2c0f15d859d8a962206bb4eb7d7c2d8a50e17891fda559af7ef919b1b1c887c44e530f63b20cd5fbc743c741ac1f859a4af43fd8897

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\config.def

                                                                                                Filesize

                                                                                                24KB

                                                                                                MD5

                                                                                                a75eee45a03497944d9238a661acd66d

                                                                                                SHA1

                                                                                                35bd746be9276167d15be70fe29995b24742b366

                                                                                                SHA256

                                                                                                19751b4db72a8b48fc072e5d3d25e56cacbe7922c8a0e2eb7dc4172589a4f1b0

                                                                                                SHA512

                                                                                                69d0b7f89fae1db8ce3f2e7fbdfb84de5897d32696e49f102c94fc56cc8af4927687bae049f50266f1d01f87af7cfd9550901c15de2bab2e047adb506325c2e0

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\instup.exe

                                                                                                Filesize

                                                                                                3.4MB

                                                                                                MD5

                                                                                                954bacaf8c8b28cc1f3993619dceb362

                                                                                                SHA1

                                                                                                f3e0a5fd31212eab7d7fdca85f1d362744d05ddb

                                                                                                SHA256

                                                                                                a2bb7c45815f3359b5886fa0099e56a7622b699e340d428e8e924ee1993f48f5

                                                                                                SHA512

                                                                                                41e8e353580f82a6b02ab2c0f15d859d8a962206bb4eb7d7c2d8a50e17891fda559af7ef919b1b1c887c44e530f63b20cd5fbc743c741ac1f859a4af43fd8897

                                                                                              • C:\Windows\Temp\asw.4794986d48333567\servers.def

                                                                                                Filesize

                                                                                                29KB

                                                                                                MD5

                                                                                                2bac3d81306aaa10e8b07c90172c6dff

                                                                                                SHA1

                                                                                                dab46d826105cf9d7615d93bda3ad625e687052d

                                                                                                SHA256

                                                                                                a210b0c6d0ad739cfb186e57bbf6360f1d47f7b8090a74340e812a68deb71a38

                                                                                                SHA512

                                                                                                cc6b759b4ff1334fa2e19a03aacb77c37f5459c613351cdbe1a9fefe4a4c21f587045041fd7b44c77e8142341bcee3bb3e6ccf4dc8a1600b55665b2041c94ab8

                                                                                              • \??\pipe\crashpad_1112_TIFESESQQEJQRYHJ

                                                                                                MD5

                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                SHA1

                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                SHA256

                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                SHA512

                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                              • memory/116-134-0x0000000000000000-mapping.dmp

                                                                                              • memory/1212-163-0x0000000000000000-mapping.dmp

                                                                                              • memory/1364-166-0x0000000000000000-mapping.dmp

                                                                                              • memory/1648-177-0x0000000000000000-mapping.dmp

                                                                                              • memory/1688-182-0x0000000000000000-mapping.dmp

                                                                                              • memory/1744-183-0x0000000000000000-mapping.dmp

                                                                                              • memory/1912-169-0x0000000000000000-mapping.dmp

                                                                                              • memory/2064-159-0x0000000000000000-mapping.dmp

                                                                                              • memory/2068-175-0x0000000000000000-mapping.dmp

                                                                                              • memory/2260-174-0x0000000000000000-mapping.dmp

                                                                                              • memory/2380-155-0x0000000000000000-mapping.dmp

                                                                                              • memory/2656-168-0x0000000000000000-mapping.dmp

                                                                                              • memory/2808-160-0x0000000000000000-mapping.dmp

                                                                                              • memory/3136-178-0x0000000000000000-mapping.dmp

                                                                                              • memory/3140-162-0x0000000000000000-mapping.dmp

                                                                                              • memory/3180-138-0x0000000000000000-mapping.dmp

                                                                                              • memory/3328-142-0x0000000000000000-mapping.dmp

                                                                                              • memory/3456-176-0x0000000000000000-mapping.dmp

                                                                                              • memory/3496-153-0x0000000000000000-mapping.dmp

                                                                                              • memory/3688-179-0x0000000000000000-mapping.dmp

                                                                                              • memory/3812-157-0x0000000000000000-mapping.dmp

                                                                                              • memory/3816-164-0x0000000000000000-mapping.dmp

                                                                                              • memory/3952-165-0x0000000000000000-mapping.dmp

                                                                                              • memory/3996-170-0x0000000000000000-mapping.dmp

                                                                                              • memory/4072-171-0x0000000000000000-mapping.dmp

                                                                                              • memory/4100-161-0x0000000000000000-mapping.dmp

                                                                                              • memory/4168-173-0x0000000000000000-mapping.dmp

                                                                                              • memory/4680-181-0x0000000000000000-mapping.dmp

                                                                                              • memory/4740-156-0x0000000000000000-mapping.dmp

                                                                                              • memory/4856-167-0x0000000000000000-mapping.dmp

                                                                                              • memory/4940-172-0x0000000000000000-mapping.dmp

                                                                                              • memory/4956-180-0x0000000000000000-mapping.dmp

                                                                                              • memory/5104-158-0x0000000000000000-mapping.dmp