Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
412s -
max time network
446s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/04/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240221-en
General
-
Target
.html
-
Size
146KB
-
MD5
3eba69cc700f0682aac512491faa302b
-
SHA1
9f70571adb21d4eaee83a32a0ee9e46b3f22a409
-
SHA256
e3d8efcc7d5d19f15bb2aa77ec15628e202eea25b89f8e96015de7be2219af2a
-
SHA512
2f19b192ee5acc058a89d898ff52edcf1b2613d0a9ec6a91e5f9bb4079bdf62dcf10f8187ee3914a9b5397508676cf0f002150153caef42135c3bc467b6af8ed
-
SSDEEP
1536:o9kud8LFVMUK4DgnVR4DBllKoVkL30vD9329s4DhHhqiS:ekPLFoVsllXmxPHhqiS
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Azorult.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths regedit.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blocks application from running via registry modification 13 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" Azorult.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" Azorult.exe Set value (int) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" Azorult.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 10 IoCs
pid Process 42084 netsh.exe 22460 netsh.exe 22256 netsh.exe 20996 netsh.exe 20360 netsh.exe 35580 netsh.exe 37408 netsh.exe 40040 netsh.exe 41588 netsh.exe 42988 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AviraOptimizerHost\ImagePath = "\"C:\\Program Files (x86)\\Avira\\Optimizer Host\\Avira.OptimizerHost.exe\"" Avira.OptimizerHost.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 41 IoCs
pid Process 3712 avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe 3316 Avira.Spotlight.Bootstrapper.exe 1396 ACSSignedIC.exe 2648 avira_spotlight_setup_pavwws.exe 2736 avira_spotlight_setup_pavwws.tmp 580 avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe 4240 Avira.Spotlight.Bootstrapper.exe 1532 ACSSignedIC.exe 2124 Avira.Spotlight.Bootstrapper.ReportingTool.exe 684 avira_system_speedup.exe 1244 avira_system_speedup.tmp 5752 Avira.SystemSpeedup.Core.Common.Starter.exe 444 Avira.SystemSpeedup.Maintenance.exe 5524 Avira.SystemSpeedup.Maintenance.exe 5636 Avira_Optimizer_Host.exe 3632 Avira_Optimizer_Host.tmp 5868 Avira.OptimizerHost.exe 6076 Avira.OptimizerHost.exe 3696 AgentTesla.exe 5728 butterflyondesktop.exe 3308 butterflyondesktop.tmp 5556 ButterflyOnDesktop.exe 3096 VanToM-Rat.bat 5988 Azorult.exe 2768 wini.exe 4780 AgentTesla.exe 4788 winit.exe 2016 rutserv.exe 1544 rutserv.exe 3856 rutserv.exe 3420 rutserv.exe 2964 rfusclient.exe 4920 rfusclient.exe 3416 CoronaVirus.exe 3016 cheat.exe 4116 taskhost.exe 5348 P.exe 2000 ink.exe 1920 butterflyondesktop.exe 232 butterflyondesktop.tmp 5864 Avira.Spotlight.Service.Worker.exe -
Loads dropped DLL 64 IoCs
pid Process 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe 4240 Avira.Spotlight.Bootstrapper.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\RuntimeVersion = "v4.0.30319" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\ = "mscoree.dll" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\ThreadingModel = "Both" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\ = "mscoree.dll" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\ = "mscoree.dll" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\ThreadingModel = "Both" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\ThreadingModel = "Both" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe -
resource yara_rule behavioral1/files/0x000200000002a2fc-30840.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\Desktop\\VanToM-Rat.bat" VanToM-Rat.bat Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp -
Checks for any installed AV software in registry 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\Download = "pavwws" avira_system_speedup.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Last = 56005400560054004e0004005500150055005700 Avira.SystemSpeedup.Maintenance.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\General\ Avira.SystemSpeedup.Maintenance.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\GeneralSettings avira_spotlight_setup_pavwws.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\DownloadSource avira_spotlight_setup_pavwws.tmp Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\RegistryCleaner avira_system_speedup.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\OptimizerHost\LogLevel Avira.OptimizerHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Number Avira.SystemSpeedup.Maintenance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\DownloadSource Avira.Spotlight.Bootstrapper.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira\Speedup\Logging Avira.SystemSpeedup.Maintenance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\DebugOutput Avira.SystemSpeedup.Maintenance.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\JunkCleaner Avira.SystemSpeedup.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "28" Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "30" Avira.Spotlight.Bootstrapper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\ApplyBatteryBoostSettings Avira.SystemSpeedup.Maintenance.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\OptimizerHost avira_system_speedup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features\NcpSmartScanEventBasedMessagingEnabled = "false" avira_spotlight_setup_pavwws.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Avira\OptimizerHost Avira_Optimizer_Host.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\OptimizerHost\ParallelTaskExecution Avira.OptimizerHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "23" Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "52" Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "70" Avira.Spotlight.Bootstrapper.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\UserInterface\SilentModeTimeout = "7200" avira_system_speedup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "77" Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Value Avira.SystemSpeedup.Maintenance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\LogToFile Avira.SystemSpeedup.Maintenance.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features\IntegratedIntruderProtection = "true" avira_spotlight_setup_pavwws.tmp Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Security\ConnectServices Avira.Spotlight.Bootstrapper.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\Scanner avira_system_speedup.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features\NcpUserActivityProductEvent avira_spotlight_setup_pavwws.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Name Avira.SystemSpeedup.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Check = 0700560050005700060056005200000053000000000002000d005000070053005700000007000100530007000100570007005900060050000000530004000d00 Avira.SystemSpeedup.Maintenance.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper Avira.Spotlight.Bootstrapper.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\UseGlobalUninstaller = "1" Avira.Spotlight.Bootstrapper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\UserInterface\UiLanguage avira_spotlight_setup_pavwws.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\General avira_system_speedup.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\Download avira_system_speedup.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Benchmark Avira.OptimizerHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\BootOptimizer\CleanupDelayed Avira.SystemSpeedup.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "22" Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "53" Avira.Spotlight.Bootstrapper.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\MyA Avira.SystemSpeedup.Maintenance.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\OptimizerHost avira_system_speedup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "78" Avira.Spotlight.Bootstrapper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Product Avira.SystemSpeedup.Maintenance.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features\NcpUserActivityProductEvent = "true" avira_spotlight_setup_pavwws.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "60" Avira.Spotlight.Bootstrapper.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\General\SpotlightMode = "1" avira_system_speedup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Bootstrapper\InstallProgress = "10" Avira.Spotlight.Bootstrapper.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\PrivacyCleaner avira_system_speedup.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Product Avira.SystemSpeedup.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Date = 56005400560054004e0004005500150055005700 Avira.SystemSpeedup.Maintenance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Type Avira.SystemSpeedup.Maintenance.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Check = 0700560050005700060056005200000053000000000002000d005000070053005700000007000100530007000100570007005900060050000000530004000d00 Avira.SystemSpeedup.Maintenance.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Version = "4" Avira.SystemSpeedup.Maintenance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Subscription Avira.SystemSpeedup.Maintenance.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup\Power Profiles Avira.SystemSpeedup.Maintenance.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\DownloadSource = "pavwws" avira_spotlight_setup_pavwws.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\Features avira_spotlight_setup_pavwws.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup\MyA\Version = "4" Avira.SystemSpeedup.Maintenance.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini Avira.SystemSpeedup.Core.Common.Starter.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Avira.SystemSpeedup.Maintenance.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 raw.githubusercontent.com 139 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 200 ip-api.com -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000000069d-4146.dat autoit_exe behavioral1/files/0x000100000002ad31-5026.dat autoit_exe behavioral1/files/0x000100000002ad3a-5114.dat autoit_exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_3A926AE3653F6808623E655D67F31779 Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 Avira.OptimizerHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_3A926AE3653F6808623E655D67F31779 Avira.OptimizerHost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Avira\Security\is-8L29O.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-O138D.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\de-DE\is-U2BFU.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-H6LRR.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-6MI18.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-REOHL.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-IJE45.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-5VJPL.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\ru-RU\is-4CUJN.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-0UDN2.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\runtimes\win-x86\native\is-NDUDQ.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-0TASP.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\es-ES\is-JCI33.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\x86\is-4BBAV.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\es-ES\is-4V7HL.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-GANA2.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-HDKOK.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-9LMC8.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-NSV5G.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-FDQ8T.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-K1TK0.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-1E5UU.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\Update\es-ES\is-U3AJU.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-2APTD.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-PUCEL.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-TN7LS.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\it-IT\is-1CFEK.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-AVG0A.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\System Speedup\tr-TR\is-IM1B8.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-6KKHH.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-CGQQJ.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-SCDS4.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-KPQ6K.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-A4GM3.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-QJRJ2.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\tr-TR\is-0Q8SE.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\Update\tr-TR\is-7M1U5.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-HEOFC.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-UB1VT.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\nl-NL\is-S98EJ.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\is-53MHT.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-GUPQ8.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-6HD2F.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-NQAT3.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-LC0KI.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-60B6R.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\en-US\is-Q0T1E.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-COF9A.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-9EAE8.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-SDJ0E.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Briano\UWPHook\UWPHook.exe AgentTesla.exe File created C:\Program Files (x86)\Avira\Security\is-V99O3.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\EndpointProtectionSdk\is-1MDID.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\is-3IMIQ.tmp avira_system_speedup.tmp File created C:\Program Files (x86)\Avira\Security\is-2C7JQ.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\is-65KV4.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\is-SS2IN.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\System Speedup\unins000.dat avira_system_speedup.tmp File created C:\Program Files (x86)\Briano\UWPHook\MaterialDesignColors.dll AgentTesla.exe File created C:\Program Files (x86)\Avira\Security\is-2JMBN.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Swu\is-4UJ7L.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Swu\is-GP96U.tmp avira_spotlight_setup_pavwws.tmp File created C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\Update\is-NG12S.tmp avira_spotlight_setup_pavwws.tmp File opened for modification C:\Program Files (x86)\Avira\Fallback Updater\Avira.Spotlight.FallbackUpdater.exe Avira.Spotlight.Bootstrapper.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\is-KT12R.tmp avira_system_speedup.tmp -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2996 sc.exe 1152 sc.exe 1992 sc.exe 5284 sc.exe 5368 sc.exe 39356 sc.exe 43240 sc.exe 2796 sc.exe 4216 sc.exe 5948 sc.exe 5248 sc.exe 4992 sc.exe 6104 sc.exe 5236 sc.exe 6140 sc.exe 35560 sc.exe 1944 sc.exe 5968 sc.exe 5996 sc.exe 1548 sc.exe 17452 sc.exe 2824 sc.exe 1584 sc.exe 6032 sc.exe 2480 sc.exe 42104 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000100000002ab30-3048.dat nsis_installer_1 behavioral1/files/0x000100000002ab30-3048.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1392 schtasks.exe 3052 schtasks.exe 6036 schtasks.exe 3368 schtasks.exe 4448 schtasks.exe 1056 schtasks.exe 41904 schtasks.exe 21752 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3704 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 41768 vssadmin.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings avira_system_speedup.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Avira.Spotlight.Service.Worker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\SecureProtocols = "10368" avira_system_speedup.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Avira.Spotlight.Service.Worker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Avira.OptimizerHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Avira.Spotlight.Service.Worker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{1A29DF46-C591-4188-AA93-1FF867EF6286} avira_system_speedup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\ = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.Security\DefaultIcon\ = "Avira.Spotlight.UI.Application.exe,1" avira_spotlight_setup_pavwws.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\ProgId RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\ShellEx\ContextMenuHandlers\SystemSpeedupFilesMenu RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" msedge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Avira.Spotlight.Bootstrapper.exe\NoStartPage = "0" avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959} RegAsm.exe Set value (data) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.Security avira_spotlight_setup_pavwws.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\Implemented Categories RegAsm.exe Set value (data) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (int) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings wini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\{80b8c23c-16e0-4cd8-bbc3-cecec9a78b79}\HasNewLocalExperimentId = "true" Avira.Spotlight.Bootstrapper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\ProgId\ = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\ = "mscoree.dll" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\SystemSpeedupFilesMenu\ = "{14cb2bd0-2375-3d10-9b5d-5e18865c8959}" RegAsm.exe Set value (data) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.Security\URL Protocol avira_spotlight_setup_pavwws.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\{80b8c23c-16e0-4cd8-bbc3-cecec9a78b79}\SessionId = "2bcb9be345b240f68b2d97e929153de7" Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu\CLSID\ = "{700866BB-C8E9-3E71-B359-ABB28BAED0E8}" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFoldersMenu\CLSID\ = "{700866BB-C8E9-3E71-B359-ABB28BAED0E8}" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\ProgId\ = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\SystemSpeedupDesktopMenu\ = "{0cab5786-30e8-3185-9b3b-ccefbf1b8afe}" RegAsm.exe Set value (data) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\{80b8c23c-16e0-4cd8-bbc3-cecec9a78b79}\bootstrapperRebootPending = "0" Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\ProgId RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\SystemSpeedupFilesMenu\ = "{14cb2bd0-2375-3d10-9b5d-5e18865c8959}" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\1.0.0.0 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.Security\DefaultIcon avira_spotlight_setup_pavwws.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupDesktopMenu\CLSID\ = "{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{14CB2BD0-2375-3D10-9B5D-5E18865C8959}\InprocServer32\1.0.0.0\Class = "Avira.SystemSpeedup.UI.ShellExtension.SystemSpeedupContextMenu+SystemSpeedupFilesMenu" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32 RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CAB5786-30E8-3185-9B3B-CCEFBF1B8AFE}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/Avira/System Speedup/Avira.SystemSpeedup.UI.ShellExtension.DLL" RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{700866BB-C8E9-3E71-B359-ABB28BAED0E8}\InprocServer32\Assembly = "Avira.SystemSpeedup.UI.ShellExtension, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" RegAsm.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 03000000010000001400000002faf3e291435468607857694df5e45b6885186820000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 0f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e0b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000006200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e1270090000000100000016000000301406082b0601050507030306082b06010505070308140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa22000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 Avira.Spotlight.Service.Worker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431 Avira.Spotlight.Service.Worker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Avira.Spotlight.Service.Worker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 Avira.Spotlight.Bootstrapper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 19000000010000001000000045ed9bbc5e43d3b9ecd63c060db78e5c0f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b03000000010000001400000002faf3e291435468607857694df5e45b68851868140000000100000014000000adbd987a34b426f7fac42654ef03bde024cb541a20000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 0f000000010000001400000009b9105c5bba24343ca7f341c624e183f6ee7c1b03000000010000001400000002faf3e291435468607857694df5e45b6885186820000000010000003a040000308204363082031ea003020102020101300d06092a864886f70d0101050500306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74301e170d3030303533303130343833385a170d3230303533303130343833385a306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100b7f71a33e6f200042d39e04e5bed1fbc6c0fcdb5fa23b6cede9b113397a4294c7d939fbd4abc93ed031ae38fcfe56d505ad69729945a80b0497adb2e95fdb8cabf37382d1e3e9141ad7056c7f04f3fe8329e74cac89054e9c65f0f789d9a403c0eac61aa5e148f9e87a16a50dcd79a4eaf05b3a671949c71b350600ac7139d38078602a8e9a869261890ab4cb04f23ab3a4f84d8dfce9fe1696fbbd742d76b44e4c7adee6d415f725a710837b37965a459a09437f7002f0dc29272dad03872db14a845c45d2a7db7b4d6c4eeaccd1344b7c92bdd430025fa61b9696a582311b7a7338f567559f5cd29d746b70a2b65b6d3426f15b2b87bfbefe95d53d5345a270203010001a381dc3081d9301d0603551d0e04160414adbd987a34b426f7fac42654ef03bde024cb541a300b0603551d0f040403020106300f0603551d130101ff040530030101ff3081990603551d2304819130818e8014adbd987a34b426f7fac42654ef03bde024cb541aa173a471306f310b300906035504061302534531143012060355040a130b416464547275737420414231263024060355040b131d41646454727573742045787465726e616c20545450204e6574776f726b312230200603550403131941646454727573742045787465726e616c20434120526f6f74820101300d06092a864886f70d01010505000382010100b09be08525c2d623e20f9606929d41989cd9847981d91e5b14072336658fb0d877bbac416c47608351b0f9323de7fcf62613c78016a5bf5afc87cf787989219ae24c070a8635bcf2de51c4d296b7dc7e4eee70fd1c39eb0c0251142d8ebd16e0c1df4675e724adecf442b48593701067ba9d06354a18d32b7acc5142a17a63d1e6bba1c52bc236be130de6bd637e797ba7090d40ab6add8f8ac3f6f68c1a420551d445f59fa76221681520433c99e77cbd24d8a9911773883f561b313818b4710f9acdc80e9e8e2e1be18c9883cb1f31f1444cc604734976600fc7f8bd17806b2ee9cc4c0e5a9a790f200a2ed59e63261e559294d882175a7bd0bcc78f4e8604 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254830300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 14000000010000001400000055e481d11180bed889b908a331f9a1240916b970030000000100000014000000503006091d97d4f5ae39f7cbe7927d7d652d34310f0000000100000014000000327fc447408de9bf596f83d4b2fa4b8e3e7097d820000000010000002e0400003082042a30820312a00302010202043863def8300d06092a864886f70d01010505003081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f7269747920283230343829301e170d3939313232343137353035315a170d3239303732343134313531325a3081b431143012060355040a130b456e74727573742e6e65743140303e060355040b14377777772e656e74727573742e6e65742f4350535f3230343820696e636f72702e206279207265662e20286c696d697473206c6961622e2931253023060355040b131c286329203139393920456e74727573742e6e6574204c696d69746564313330310603550403132a456e74727573742e6e65742043657274696669636174696f6e20417574686f726974792028323034382930820122300d06092a864886f70d01010105000382010f003082010a0282010100ad4d4ba91286b2eaa320071516642a2b4bd1bf0b4a4d8eed8076a567b77840c07342c868c0db532bdd5eb8769835938b1a9d7c133a0e1f5bb71ecfe524141eb181a98d7db8cc6b4b03f1020cdcaba54024007f7494a19d0829b3880bf587779d55cde4c37ed76a64ab851486955b9732506f3dc8ba660ce3fcbdb849c176894919fdc0a8bd89a3672fc69fbc711960b82de92cc99076667b94e2af78d665535d3cd69cb2cf2903f92fa450b2d448ce0532558afdb2644c0ee4980775db7fdfb9085560853029f97b48a46986e3353f1e865d7a7a15bdef008e1522541700902693bc0e496891bff847d39d9542c10e4ddf6f26cfc3182162664370d6d5c007e10203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041455e481d11180bed889b908a331f9a1240916b970300d06092a864886f70d010105050003820101003b9b8f569b30e753997c7a79a74d97d7199590fb061fca337c46638f966624fa401b2127cae67273f24ffe3199fdc80c4c6853c680821398fab6adda5d3df1ce6ef6151194820cee3f95af11ab0fd72fde1f038f572c1ec9bb9a1a4495eb184fa61fcd7d57102f9b04095a84b56ed81d3ae1d69ed16c795e791c14c5e3d04c933b653ceddf3dbea6e5951ac3b519c3bd5e5bbbff23ef6819cb1293275c032d6f30d01eb61aacde5af7d1aaa827a6fe7981c479993357ba12b0a9e0426c93ca56defe6d840b088b7e8dead79821c6f3e73c792f5e9cd14c158de1ec2237cc9a430b97dc80908db3679b6f48081556cfbff12b7c5e9a76e95990c57c8335116551 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 5c000000010000000400000000100000040000000100000010000000be954f16012122448ca8bc279602acf5030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a2090000000100000016000000301406082b0601050507030306082b060105050703086200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e12700b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000000f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e1900000001000000100000009f687581f7ef744ecfc12b9cee6238f12000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e75490f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e4140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f2000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Avira.Spotlight.Service.Worker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 Avira.Spotlight.Service.Worker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 190000000100000010000000ffac207997bb2cfe865570179ee037b9140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e40f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\503006091D97D4F5AE39F7CBE7927D7D652D3431\Blob = 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 Avira.Spotlight.Bootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Avira.Spotlight.Service.Worker.exe -
NTFS ADS 21 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\AgentTesla.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 281055.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 100446.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Local\Temp\.CR.7586\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe\:Zone.Identifier:$DATA avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 100864.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\butterflyondesktop.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Azorult.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\VanToM-Rat.bat:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\BabylonToolbar.txt:Zone.Identifier msedge.exe File created C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe\:SmartScreen:$DATA VanToM-Rat.bat File created C:\Users\Admin\AppData\Local\Temp\.CR.7586\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe\:SmartScreen:$DATA avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 674801.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 730907.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\MadMan.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\download.jpg:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 850795.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 206709.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 827596.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\CoronaVirus.exe:Zone.Identifier msedge.exe File created C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe\:Zone.Identifier:$DATA VanToM-Rat.bat -
Runs .reg file with regedit 2 IoCs
pid Process 3632 regedit.exe 5776 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 3852 msedge.exe 3852 msedge.exe 1628 msedge.exe 1628 msedge.exe 1400 identity_helper.exe 1400 identity_helper.exe 2568 msedge.exe 2568 msedge.exe 4876 msedge.exe 4876 msedge.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp 2736 avira_spotlight_setup_pavwws.tmp -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 44 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 3316 Avira.Spotlight.Bootstrapper.exe Token: SeDebugPrivilege 4240 Avira.Spotlight.Bootstrapper.exe Token: SeDebugPrivilege 2124 Avira.Spotlight.Bootstrapper.ReportingTool.exe Token: SeDebugPrivilege 764 RegAsm.exe Token: SeDebugPrivilege 1624 RegAsm.exe Token: SeDebugPrivilege 444 Avira.SystemSpeedup.Maintenance.exe Token: SeDebugPrivilege 5524 Avira.SystemSpeedup.Maintenance.exe Token: SeDebugPrivilege 5752 Avira.SystemSpeedup.Core.Common.Starter.exe Token: 33 5868 Avira.OptimizerHost.exe Token: SeIncBasePriorityPrivilege 5868 Avira.OptimizerHost.exe Token: 33 6076 Avira.OptimizerHost.exe Token: SeIncBasePriorityPrivilege 6076 Avira.OptimizerHost.exe Token: SeDebugPrivilege 2016 rutserv.exe Token: SeDebugPrivilege 3856 rutserv.exe Token: SeTakeOwnershipPrivilege 3420 rutserv.exe Token: SeTcbPrivilege 3420 rutserv.exe Token: SeTcbPrivilege 3420 rutserv.exe Token: SeDebugPrivilege 5864 Avira.Spotlight.Service.Worker.exe Token: 33 6076 Avira.OptimizerHost.exe Token: SeIncBasePriorityPrivilege 6076 Avira.OptimizerHost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3316 Avira.Spotlight.Bootstrapper.exe 3316 Avira.Spotlight.Bootstrapper.exe 2736 avira_spotlight_setup_pavwws.tmp 1244 avira_system_speedup.tmp 3632 Avira_Optimizer_Host.tmp 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 5556 ButterflyOnDesktop.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 3712 avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe 2648 avira_spotlight_setup_pavwws.exe 2736 avira_spotlight_setup_pavwws.tmp 580 avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe 684 avira_system_speedup.exe 1244 avira_system_speedup.tmp 764 RegAsm.exe 5636 Avira_Optimizer_Host.exe 3632 Avira_Optimizer_Host.tmp 5868 Avira.OptimizerHost.exe 5920 msedge.exe 3696 AgentTesla.exe 3096 VanToM-Rat.bat 5988 Azorult.exe 2768 wini.exe 4780 AgentTesla.exe 4788 winit.exe 2016 rutserv.exe 1544 rutserv.exe 3856 rutserv.exe 3420 rutserv.exe 3016 cheat.exe 4116 taskhost.exe 5348 P.exe 2000 ink.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 5028 3852 msedge.exe 78 PID 3852 wrote to memory of 5028 3852 msedge.exe 78 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4824 3852 msedge.exe 79 PID 3852 wrote to memory of 4584 3852 msedge.exe 80 PID 3852 wrote to memory of 4584 3852 msedge.exe 80 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 PID 3852 wrote to memory of 4880 3852 msedge.exe 81 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5136 attrib.exe 3180 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9af3b3cb8,0x7ff9af3b3cc8,0x7ff9af3b3cd82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6916 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Users\Admin\Downloads\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe"C:\Users\Admin\Downloads\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\.CR.12356\Avira.Spotlight.Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\Avira.Spotlight.Bootstrapper.exe" "C:\Users\Admin\AppData\Local\Temp\.CR.12356\Avira.Spotlight.Bootstrapper.exe" OriginalFileName=avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\.CR.12356\ACSSignedIC.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\ACSSignedIC.exe"4⤵
- Executes dropped EXE
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\9aed911c-de13-4516-b63e-49d3b800a96a\avira_spotlight_setup_pavwws.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\9aed911c-de13-4516-b63e-49d3b800a96a\avira_spotlight_setup_pavwws.exe" /LOG="C:\Users\Admin\AppData\Local\Temp\avira_spotlight_setup_20240406134800455.log" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP /LANGUAGE=en-us /SYSTRAYAUTOSTARTENABLED=true /WITHSERVICESTOPPED=true /SKIPSERVICEREGISTRATION=true /CERTIFICATESVERSION=V44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\is-MSMBJ.tmp\avira_spotlight_setup_pavwws.tmp"C:\Users\Admin\AppData\Local\Temp\is-MSMBJ.tmp\avira_spotlight_setup_pavwws.tmp" /SL5="$90246,34114875,924672,C:\Users\Admin\AppData\Local\Temp\.CR.12356\9aed911c-de13-4516-b63e-49d3b800a96a\avira_spotlight_setup_pavwws.exe" /LOG="C:\Users\Admin\AppData\Local\Temp\avira_spotlight_setup_20240406134800455.log" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /SP /LANGUAGE=en-us /SYSTRAYAUTOSTARTENABLED=true /WITHSERVICESTOPPED=true /SKIPSERVICEREGISTRATION=true /CERTIFICATESVERSION=V45⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create AviraSecurityUpdater DisplayName= "Avira Security Updater" binPath= "\"C:\Program Files (x86)\Avira\Security\Avira.Spotlight.Common.Updater.exe\"" start= delayed-auto6⤵
- Launches sc.exe
PID:5248
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" description AviraSecurityUpdater "Avira Security Updater"6⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /F /TN Avira_Security_Update /XML "\\?\C:\Users\Admin\AppData\Local\Temp\is-Q5J1N.tmp\UpdateFallbackTask.xml"6⤵
- Creates scheduled task(s)
PID:3368
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /F /TN Avira_Security_Service_SCM_Watchdog /XML "\\?\C:\Users\Admin\AppData\Local\Temp\is-Q5J1N.tmp\WatchdogServiceControlManagerTimeout.xml"6⤵
- Creates scheduled task(s)
PID:6036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /F /TN Avira_Security_Systray /XML "\\?\C:\Users\Admin\AppData\Local\Temp\is-Q5J1N.tmp\SystrayAutostart.xml"6⤵
- Creates scheduled task(s)
PID:3052
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /F /TN Avira_Security_Maintenance /XML "\\?\C:\Users\Admin\AppData\Local\Temp\is-Q5J1N.tmp\MaintenanceTask.xml"6⤵
- Creates scheduled task(s)
PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe" Action=RegisterFallbackUpdater AllowMultipleInstances=true UnpackInCurrentDirectory=true4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\Avira.Spotlight.Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\Avira.Spotlight.Bootstrapper.exe" "C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\Avira.Spotlight.Bootstrapper.exe" OriginalFileName=avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe Action=RegisterFallbackUpdater AllowMultipleInstances=true5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\ACSSignedIC.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\ACSSignedIC.exe"6⤵
- Executes dropped EXE
PID:1532
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "Avira_Security_Installation"5⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\Avira.Spotlight.Bootstrapper.ReportingTool.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\a94feceb-b924-49a4-963c-089e21896449\.CR.3225\Avira.Spotlight.Bootstrapper.ReportingTool.exe" /TrackUnsentEvents5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\679e6460-ffed-4c62-8d20-d52bdf2cb55a\avira_system_speedup.exe"C:\Users\Admin\AppData\Local\Temp\.CR.12356\679e6460-ffed-4c62-8d20-d52bdf2cb55a\avira_system_speedup.exe" /install /OTC= /EMAIL= /LOG="C:\Users\Admin\AppData\Local\Temp\avira_system_speedup_setup_20240406134818463.log" /VERYSILENT /SUPPRESSMSGBOXES /LANGUAGE=en-us /NOSTART /NORESTART /bundle=sptl1 /download=pavwws /Spotlight4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Users\Admin\AppData\Local\Temp\is-NJGLS.tmp\avira_system_speedup.tmp"C:\Users\Admin\AppData\Local\Temp\is-NJGLS.tmp\avira_system_speedup.tmp" /SL5="$B0246,35770327,916992,C:\Users\Admin\AppData\Local\Temp\.CR.12356\679e6460-ffed-4c62-8d20-d52bdf2cb55a\avira_system_speedup.exe" /install /OTC= /EMAIL= /LOG="C:\Users\Admin\AppData\Local\Temp\avira_system_speedup_setup_20240406134818463.log" /VERYSILENT /SUPPRESSMSGBOXES /LANGUAGE=en-us /NOSTART /NORESTART /bundle=sptl1 /download=pavwws /Spotlight5⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /F /TN AviraSystemSpeedupRemoval6⤵PID:5644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.UI.ShellExtension.dll" /codebase /silent /nologo6⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe "C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.UI.ShellExtension.dll" /codebase /silent /nologo6⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Core.Common.Starter.exe"C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Core.Common.Starter.exe" -umh6⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
PID:5752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\.CR.12356\679e6460-ffed-4c62-8d20-d52bdf2cb55a\avira_system_speedup.exe" "C:\Program Files (x86)\Avira\System Speedup\setup\avira_speedup_setup.exe"6⤵PID:5896
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /F /RU System /SC WEEKLY /TN AviraSystemSpeedupVerify /TR "\"C:\Program Files (x86)\Avira\System Speedup\setup\avira_speedup_setup.exe\" /VERIFY /VERYSILENT /NOSTART /NODOTNET /NORESTART" /RL HIGHEST6⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Maintenance.exe"C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Maintenance.exe" -validatelicense6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Maintenance.exe"C:\Program Files (x86)\Avira\System Speedup\Avira.SystemSpeedup.Maintenance.exe" -initbootoptimizer6⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\is-5DL2C.tmp\Avira_Optimizer_Host.exe"C:\Users\Admin\AppData\Local\Temp\is-5DL2C.tmp\Avira_Optimizer_Host.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5636 -
C:\Users\Admin\AppData\Local\Temp\is-V7B8P.tmp\Avira_Optimizer_Host.tmp"C:\Users\Admin\AppData\Local\Temp\is-V7B8P.tmp\Avira_Optimizer_Host.tmp" /SL5="$402AC,1578082,832512,C:\Users\Admin\AppData\Local\Temp\is-5DL2C.tmp\Avira_Optimizer_Host.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3632 -
C:\Program Files (x86)\Avira\Optimizer Host\Avira.OptimizerHost.exe"C:\Program Files (x86)\Avira\Optimizer Host\Avira.OptimizerHost.exe" /Install /Silent8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5868
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /Xml "C:\Users\Admin\AppData\Local\Temp\.CR.1293\Avira_Security_Installation.xml" /F /TN "Avira_Security_Installation"3⤵
- Creates scheduled task(s)
PID:1392
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3772 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7132 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6980 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3456 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7076 /prefetch:82⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7056 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6856 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3336 /prefetch:22⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7132 /prefetch:12⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7400 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1020 /prefetch:82⤵
- NTFS ADS
PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:12⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7492 /prefetch:82⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1020 /prefetch:82⤵
- NTFS ADS
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7088 /prefetch:82⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7376 /prefetch:82⤵
- NTFS ADS
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7464 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7236 /prefetch:82⤵
- NTFS ADS
PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7544 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7516 /prefetch:82⤵
- NTFS ADS
PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- NTFS ADS
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7372 /prefetch:82⤵
- NTFS ADS
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1252 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7380 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7448 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7112 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7288 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,6504845458866718641,10590523505691884567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- NTFS ADS
PID:1152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004EC 0x00000000000004E81⤵PID:2532
-
C:\Program Files (x86)\Avira\Optimizer Host\Avira.OptimizerHost.exe"C:\Program Files (x86)\Avira\Optimizer Host\Avira.OptimizerHost.exe"1⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5380
-
C:\Users\Admin\Desktop\AgentTesla.exe"C:\Users\Admin\Desktop\AgentTesla.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3696
-
C:\Users\Admin\Desktop\butterflyondesktop.exe"C:\Users\Admin\Desktop\butterflyondesktop.exe"1⤵
- Executes dropped EXE
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\is-QQ3AU.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-QQ3AU.tmp\butterflyondesktop.tmp" /SL5="$702DE,2719719,54272,C:\Users\Admin\Desktop\butterflyondesktop.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3308 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"3⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff9af3b3cb8,0x7ff9af3b3cc8,0x7ff9af3b3cd84⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:24⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:34⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:84⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:14⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:14⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:14⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,8323529996905662980,7150607193250782068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:5308
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5328
-
C:\Users\Admin\Desktop\VanToM-Rat.bat"C:\Users\Admin\Desktop\VanToM-Rat.bat"1⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3096 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"2⤵PID:35468
-
-
C:\Users\Admin\Desktop\Azorult.exe"C:\Users\Admin\Desktop\Azorult.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Blocks application from running via registry modification
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5988 -
C:\ProgramData\Microsoft\Intel\wini.exeC:\ProgramData\Microsoft\Intel\wini.exe -pnaxui2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"3⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Programdata\Windows\install.bat" "4⤵PID:2504
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg1.reg"5⤵
- UAC bypass
- Windows security bypass
- Runs .reg file with regedit
PID:3632
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg2.reg"5⤵
- Runs .reg file with regedit
PID:5776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:3704
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /silentinstall5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /firewall5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /start5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows\*.*5⤵
- Views/modifies file attributes
PID:5136
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows5⤵
- Views/modifies file attributes
PID:3180
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10005⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own5⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Microsoft Framework"5⤵
- Launches sc.exe
PID:5968
-
-
-
-
C:\ProgramData\Windows\winit.exe"C:\ProgramData\Windows\winit.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
-
C:\programdata\install\cheat.exeC:\programdata\install\cheat.exe -pnaxui2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\ProgramData\Microsoft\Intel\taskhost.exe"C:\ProgramData\Microsoft\Intel\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\programdata\microsoft\intel\P.exeC:\programdata\microsoft\intel\P.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5348
-
-
C:\programdata\microsoft\intel\R8.exeC:\programdata\microsoft\intel\R8.exe4⤵PID:49952
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\run.vbs"5⤵PID:39372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\pause.bat" "6⤵PID:21480
-
-
-
-
C:\ProgramData\Microsoft\Intel\winlog.exeC:\ProgramData\Microsoft\Intel\winlog.exe -p1234⤵PID:16620
-
C:\ProgramData\Microsoft\Intel\winlogon.exe"C:\ProgramData\Microsoft\Intel\winlogon.exe"5⤵PID:41548
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FEC5.tmp\FEF5.bat C:\ProgramData\Microsoft\Intel\winlogon.exe"6⤵PID:18900
-
-
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe4⤵PID:37416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 14⤵
- Creates scheduled task(s)
PID:41904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:21752
-
-
-
-
C:\programdata\install\ink.exeC:\programdata\install\ink.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appidsvc2⤵PID:1504
-
C:\Windows\SysWOW64\sc.exesc start appidsvc3⤵
- Launches sc.exe
PID:6032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appmgmt2⤵PID:5240
-
C:\Windows\SysWOW64\sc.exesc start appmgmt3⤵
- Launches sc.exe
PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appidsvc start= auto2⤵PID:404
-
C:\Windows\SysWOW64\sc.exesc config appidsvc start= auto3⤵
- Launches sc.exe
PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appmgmt start= auto2⤵PID:3368
-
C:\Windows\SysWOW64\sc.exesc config appmgmt start= auto3⤵
- Launches sc.exe
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv2⤵PID:2192
-
C:\Windows\SysWOW64\sc.exesc delete swprv3⤵
- Launches sc.exe
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice2⤵PID:4212
-
C:\Windows\SysWOW64\sc.exesc stop mbamservice3⤵
- Launches sc.exe
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice2⤵PID:3276
-
C:\Windows\SysWOW64\sc.exesc stop bytefenceservice3⤵
- Launches sc.exe
PID:5996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice2⤵PID:4240
-
C:\Windows\SysWOW64\sc.exesc delete bytefenceservice3⤵
- Launches sc.exe
PID:6104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice2⤵PID:1400
-
C:\Windows\SysWOW64\sc.exesc delete mbamservice3⤵
- Launches sc.exe
PID:5948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc2⤵PID:3308
-
C:\Windows\SysWOW64\sc.exesc delete crmsvc3⤵
- Launches sc.exe
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete "windows node"2⤵PID:5596
-
C:\Windows\SysWOW64\sc.exesc delete "windows node"3⤵
- Launches sc.exe
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop Adobeflashplayer2⤵PID:3540
-
C:\Windows\SysWOW64\sc.exesc stop Adobeflashplayer3⤵
- Launches sc.exe
PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AdobeFlashPlayer2⤵PID:4440
-
C:\Windows\SysWOW64\sc.exesc delete AdobeFlashPlayer3⤵
- Launches sc.exe
PID:5368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MoonTitle2⤵PID:2856
-
C:\Windows\SysWOW64\sc.exesc stop MoonTitle3⤵
- Launches sc.exe
PID:5284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MoonTitle"2⤵PID:4992
-
C:\Windows\SysWOW64\sc.exesc delete MoonTitle"3⤵
- Launches sc.exe
PID:5236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop AudioServer2⤵PID:1588
-
C:\Windows\SysWOW64\sc.exesc stop AudioServer3⤵
- Launches sc.exe
PID:6140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AudioServer"2⤵PID:2072
-
C:\Windows\SysWOW64\sc.exesc delete AudioServer"3⤵
- Launches sc.exe
PID:17452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop clr_optimization_v4.0.30318_642⤵PID:17888
-
C:\Windows\SysWOW64\sc.exesc stop clr_optimization_v4.0.30318_643⤵
- Launches sc.exe
PID:35560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete clr_optimization_v4.0.30318_64"2⤵PID:6264
-
C:\Windows\SysWOW64\sc.exesc delete clr_optimization_v4.0.30318_64"3⤵
- Launches sc.exe
PID:39356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MicrosoftMysql2⤵PID:6380
-
C:\Windows\SysWOW64\sc.exesc stop MicrosoftMysql3⤵
- Launches sc.exe
PID:42104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MicrosoftMysql2⤵PID:24256
-
C:\Windows\SysWOW64\sc.exesc delete MicrosoftMysql3⤵
- Launches sc.exe
PID:43240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on2⤵PID:12272
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
PID:37408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN2⤵PID:12760
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:41588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN2⤵PID:16772
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:40040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN2⤵PID:17980
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:42988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN2⤵PID:24760
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:35580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes2⤵PID:27488
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:42084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes2⤵PID:24340
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:20996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes2⤵PID:33116
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:22460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes2⤵PID:42224
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:20360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes2⤵PID:17476
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:22256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes2⤵PID:35356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes2⤵PID:39972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes2⤵PID:39004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes2⤵PID:36972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes2⤵PID:40492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes2⤵PID:41800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes2⤵PID:42152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN2⤵PID:42896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN2⤵PID:21432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out2⤵PID:20256
-
-
C:\Users\Admin\Desktop\AgentTesla.exe"C:\Users\Admin\Desktop\AgentTesla.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
C:\ProgramData\Windows\rutserv.exeC:\ProgramData\Windows\rutserv.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe2⤵
- Executes dropped EXE
PID:4920 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray3⤵PID:4520
-
-
-
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:2964
-
-
C:\Users\Admin\Desktop\CoronaVirus.exe"C:\Users\Admin\Desktop\CoronaVirus.exe"1⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:4768
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:11628
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:41768
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:41620
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:22440
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:21696
-
-
C:\Users\Admin\Desktop\butterflyondesktop.exe"C:\Users\Admin\Desktop\butterflyondesktop.exe"1⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\is-15BLD.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-15BLD.tmp\butterflyondesktop.tmp" /SL5="$703A2,2719719,54272,C:\Users\Admin\Desktop\butterflyondesktop.exe"2⤵
- Executes dropped EXE
PID:232
-
-
C:\Program Files (x86)\Avira\Security\Avira.Spotlight.Service.Worker.exe"C:\Program Files (x86)\Avira\Security\Avira.Spotlight.Service.Worker.exe" HandleServiceControlManagerEvent 70001⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
C:\Users\Admin\Desktop\VanToM-Rat.bat"C:\Users\Admin\Desktop\VanToM-Rat.bat"1⤵PID:5904
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:42792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD565da473143b60c33035fc776bdf6463f
SHA173d32624423799ff49c16ef3400404eb14382567
SHA25651423bd44b387ffec8db6d578db36c2981e3561f25b37cf79156ab5cd9bf121c
SHA512cdecc3ab9b0f4148dac2a552fb59d8af10e72dc7c8bdb23f3d4610c0814e5635f6f3789ed9b57a42cbc05232e442123edc7155d824e19935421c54b4fd2731b5
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\System.Runtime.CompilerServices.Unsafe.dll
Filesize17KB
MD5b2dba1c534224b91833fd1e3117a1ff4
SHA1db618865d9e398467b8649fc332a2f181da2a040
SHA25603b8a422818e1853766939b6af07b5871b4c492778d282cc6a525c1c0790e9a6
SHA51254316a3eb53601fb27d53034dbbdd1e3a231589ef24beb3a1432437ca67073313fa29bf5fb9aba4960739f4c3330505562637ebb59a3d11e6db1e913fade4bcd
-
Filesize
26KB
MD5e42284e23edd10da758182ee73085104
SHA11ef405a87eef05b75dcb2597ab60b57feb84f94d
SHA25699b76c29c2d5ea35f87cc43737a669b614f8e8004ad9fc62f12815bb4efc62b5
SHA512c2009cd38443eb91a727ca450b78f076948c6556c67d980dfef9bed8e70a108b3666380403aa3f990b4be880c3ac042c8a53a48e2b04837138f3690f90b11f84
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\de-DE\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5869652891e47014fd9d26fdf0397f221
SHA1098d3658eac1a1045d6695ccadbfb89ca8bcd8ea
SHA25613cbf13abbd8799716cca4e28f9c8375081dd77fd219acbf01b662b60ee01e76
SHA5122533dda551c02161e6427f8625d92eaf2e1d35b896e93909e2e199c936e5f58b5aa7086d400b68d613cd09453b7505289888df1d41c613ffbe1126123e7bb53d
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\en-US\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5272ea595dd40ca3256b7ff4e62d6f72f
SHA154a3e287161cf97dc6dfbec810327a71d28ebe81
SHA256c6759b36d392955cbf128b7ac50f8cd505c3750683dbb1c4b8fa42a35a753339
SHA5125605b080bfde06caa6e9eebf25f22e810ae9ae08f59f8c075e03a057afa86a5e445df3feea64386a9ef76b60258b49716be2c1e04e158b0bd0df98a42bc2d1c5
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\es-ES\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD551d7d27f9269212eb30fa1501d0c9c02
SHA11932131c8b7fba01fede6842c49db6b13c101daf
SHA25687e21788f17c64aaf0fc3e059d6bac6257354d67df928afca38c07b44c9f1e02
SHA51231a7a30b7ffa4e39d13296af8f124b80416968e155886661d47326d1bbe885db062e478a4f78daf96bb74b88ac43526e26993f6bc555ebd0b974baafb8756228
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\fr-FR\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5b6e41461e49b9dd5aa23fad16f76c769
SHA1a8dd02cc4d54c7711169d52e4742ea34b906a760
SHA2568dc967f0d4a44cd8830991ed83d5d9bb8c30e1af5013ab87f4bcd4fb3141f7e8
SHA5121a29eabfed7746f6a3cadecdcea6b7b4f004b034753b2291184594e6612f646324b66b33a760a15bfeefe36f428b4d26cd89d530a8c04d6f72865792658414bd
-
Filesize
168KB
MD5a158ae1f638054d5cc16f8c031f3fa0a
SHA18437e3e6b1528aae5479a9b03a0c41ffa3d3dcc0
SHA256c730ecc00fef2fe4643ed4e80fb758ae33f3e62ea5c0a24f9143d7190366532e
SHA51293fe2029c4d77a8a9376ab50068ad6c0c80f079a1d16b8d6ecc6af790bd0c23ae33a78acf083f71b6838c1d850f0ea500f5d1cdcb2976a8d8e02f79abae0320d
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\it-IT\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD57d150021ebd1aa0d3d06e25f872b33d3
SHA1af91a091a82b9f4e2aa7f5971e60637f589df44d
SHA256ae5eccb1d73e3719ca07651b893b908754eeb6a691555683a9bea8b0baf977ab
SHA512fd55d8aba9c1be556faef1f0d5950aa46a59b27bf9af1d5c304cd2777101cb286293d7d35787f146f13665a1b8da3221422631592483ecb06b58d4c9960aa299
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\ja-JP\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5d800689e5bb5ed7c7a58db2f91e84f22
SHA18af03f0d12bee443d14ecf9cca0eb0a8468473b7
SHA256381b28b9957e6eea0e6ea8fd36d8f4fefa33b787ed06b457106b03b58032dcb7
SHA51280d5c8d8bbbefa695b56ede256b593c2bb1cae3ed152546576a8431614d7493de239e4d610cf9714eaa0b768ea52f19b68f843a91c529ec0f5c51da07eaffeb3
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\nl-NL\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD51a5a7ff23ec7e6574b9e67bc9dd8c356
SHA15015f35ef27d2a0313de583e4c3cc0433e628d7a
SHA25688a17e873e7f2dbadc4bd9c88598122f7c03b5ccb9e253a354c5e934321190d3
SHA512a400e5176063758d26051fb2b98229fa17be781e3f6ca7cebba21a92e82220bb92c5fb62c476b8b669ec9be4dc176c1d3bdd61de167d517c106126224a35a3da
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\pt-BR\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5909abb5608edc6689d41acc732876c1f
SHA110de57886d61dff1073bd63ddbbe5af075bcc8b1
SHA256e29904d465be2e609b1907d734dc4dd961c4e0143435155cf8e5cc5a5b14cdaa
SHA512a868dc8c36d8fa05dcd9a96837f0e7c554319704a96b920ba8c93c7068c6aa9236d05ba9b3a9aa505993c91a165feff677d460b520f61e398c556f62a0283415
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\ru-RU\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5d134de319330d014911cfd4841408871
SHA1efd180fc37fcd1ea1098c4204bec499cc5997138
SHA256c5ca07677aefb3115d28d8203cadbb87d7cc0e39d75a1896fc36d7c75229b860
SHA51203481356d27a4954103e9bbeb71bbe679b5b1c3ef626df2b8669bda8cf2a9b25793333fdd9cb691ae9c0a2a24ad60d1a4060d8b5bdd7a8916c00812e8eb964a7
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\tr-TR\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD50128b3f690e58d784b1b73aa9f8a1e05
SHA1cda8f1d44ce8a22f8ab63401a19a3fcb78408ed3
SHA256f4e3d4f63c07db48b50920efdb71d3a7e3dc76a84b6a1ddaef7d76cb698cbf5e
SHA512ddadd8f0d25b7f226d9770f32a704aa16c86ebbe97170d5bba0ccaf2149ab2e31c0bbf20432c56e6b89a0818fddb822a182c7faec5cf74d030faf0d6c1187b42
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\zh-CN\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD580d55a0cbed36d89ed87af740edc0997
SHA11c1f02d15284f02078c5907d2892f924e7f63ca2
SHA256b41e0e7a0a9faed9bb3908a5a42d051785fd74840d4aa52db1a73774d159c79d
SHA51254eb2991968074ff6d59d0d7cff3345a750332935222df2a2910b33bfd5f66e98307e3f5a9216813bbd1e44e15381541d40599bc2a5a14c7ce04015777ee49c5
-
C:\Program Files (x86)\Avira\Security\Antivirus.ContextMenu\zh-TW\Antivirus.ContextMenu.resources.dll
Filesize14KB
MD5abf0c3d3933a2c4fced81876d7fe6dc4
SHA14684eff5ff4c33401bd11881deb05dd33d711581
SHA256d74a7acb146c1756a5412ee2902b75ac28c4a6be0179ba47c4609514cee54bd8
SHA5121a62219947192a5af450322d044e8e0e0553a92fc9b1cef71a552674e799c24cb79ee1b191b43e88e85a3cdf9978777c3942108f7126a0696b48dcb7f63b52fa
-
Filesize
222KB
MD5f6108a15746f7373471901628fbc2edc
SHA1122dae16e63106ef055e92f99538c74d963db230
SHA2560ce55d80d15615102887b4af512fd626875a2ed8c31d35026711550c4c9a334f
SHA5123e619bd737896f260880499bd5f8cf9efa03ab69cb45bac8eb3ca191bda67073bd5c5c2d275b1b6b63763d25b59a19bfb93dda692adb5ac95039c12ac9a5476f
-
Filesize
55KB
MD577b0a911627287b65737685479924bcf
SHA151516b4745f845d864d2962d272a52ff0a304a8c
SHA2563efb7cc5a04c8cf2f68dae8c0ede91848d643fc232233f078d2e15b51dc5c78a
SHA512698d93559707db3480f9893517b62e542dcb4433df1822f757db99ff1f268e945e3256e5342075a9a7efb8aec3f41de2462eb6a22d88dfbf7ce835382076fb3c
-
Filesize
323KB
MD54fc82b452c82854f84f9a3e34bbda7cd
SHA1e2ae93656203b5e0f80c0e35bcccfa689e573e91
SHA256473198b9ae35dfe3e62b299136d00f2095a51f9c9114e5e9b4a660168ddd9150
SHA51211895b785b74c8cd7b9c656042d1a800b8d519cee21287c3d8d8a6071923128eb2db8d9b0a34ec14147d1ab4a963686d252afa4e58ddfaf25acc1ff412c1bdcf
-
Filesize
347KB
MD5cec6cbe43b2175d53063c84ff2209862
SHA19922c769f157bcad6af2222f800d11a2a1995e2b
SHA2566e5cd435b5e99f9c626f0cb3e2b3dbeba867daea8af2df0e229250c05583518f
SHA512bc73329771bd0b0e2f737d49dfc8d5b3385a0a044c9305c653e6660cbb60810b256f1c6593588fac8781b6ec4ad17a19405c9ce4cbe66eed5b9a575ffd34c597
-
Filesize
1.1MB
MD58df37e56713cdbffc8527c23aad51361
SHA1b52cf7960164f551ced4efa22e49b23e36660e47
SHA256d7150836a4e2e0e113e2650da50c5e4529c5dbaa96b6ffa89bc1b382635f4606
SHA51247989103af5b0303e201c404dbde54cd717fe43a3c8c5007512dc43ef84da197c54adb13409bedca3901081daaa409b2f6d68ca1a34a865a276b51ab46938063
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
C:\Program Files\7-Zip\7z.dll.id-301DD3BF.[[email protected]].ncov
Filesize2.5MB
MD53719bae2950144a6ad69df03ab7d2433
SHA1bd000fe1e18be2b378c1c8c19065580ef58e817d
SHA2561a791497c93d86677cce88ca69a3558f357cdb29760b38984cc2e6c56ae0e26b
SHA512bd0413c2c444a426590bf62928eda76d2239a8602ac02c9cb010db456541f800583225a291d1c594c0f62b4fd5d9811b20de8097fcba18b75c5ba619243bd972
-
Filesize
3.6MB
MD5c5ec8996fc800325262f5d066f5d61c9
SHA195f8e486960d1ddbec88be92ef71cb03a3643291
SHA256892e0afefca9c88d43bdd1beea0f09faadef618af0226e7cd1acdb47e871a0db
SHA5124721692047759aea6cb6e5c6abf72602c356ab826326779e126cda329fa3f7e4c468bdb651bb664cc7638a23fca77bc2d006a3fe0794badc09d6643d738e885a
-
Filesize
35KB
MD52f6a1bffbff81e7c69d8aa7392175a72
SHA194ac919d2a20aa16156b66ed1c266941696077da
SHA256dc6d63798444d1f614d4a1ff8784ad63b557f4d937d90a3ad9973c51367079de
SHA512ff09ef0e7a843b35d75487ad87d9a9d99fc943c0966a36583faa331eb0a243c352430577bc0662149a969dbcaa22e2b343bed1075b14451c4e9e0fe8fa911a37
-
Filesize
961KB
MD503a781bb33a21a742be31deb053221f3
SHA13951c17d7cadfc4450c40b05adeeb9df8d4fb578
SHA256e95fc3e7ed9ec61ba7214cc3fe5d869e2ee22abbeac3052501813bb2b6dde210
SHA512010a599491a8819be6bd6e8ba3f2198d8f8d668b6f18edda4408a890a2769e251b3515d510926a1479cc1fa011b15eba660d97deccd6e1fb4f2d277a5d062d45
-
Filesize
152B
MD5c65e704fc47bc3d9d2c45a244bb74d76
SHA13e7917feebea866e0909e089e0b976b4a0947a6e
SHA2562e5d6a5eeb72575f974d5fa3cdff7ad4d87a361399ffdd4b03f93cdbdec3a110
SHA51236c3be0e5fbc23c5c0ad2e14cfb1cf7913bea9a5aeb83f9f6fcf5dbc52a94d8ccb370cef723b0cda82b5fba1941b6a9ff57f77ff0076a2c5cf4250711e3dd909
-
Filesize
152B
MD55c3ea95e17becd26086dd59ba83b8e84
SHA17943b2a84dcf26240afc77459ffaaf269bfef29f
SHA256a241c88bb86182b5998d9818e6e054d29b201b53f4f1a6b9b2ee8ba22dd238dc
SHA51264c905e923298528783dc64450c96390dc5edbda51f553c04d88ee944b0c660b05392dc0c823d7fb47f604b04061390b285f982dfcc767c8168ccb00d7e94e21
-
Filesize
152B
MD5120bc76454bc553b8ae856163b91176d
SHA1aeca5fde8a3d5d4e9ccecf655214d1aca3475116
SHA2563e049fe6105275616d97a03bed63b0129e99f33df0e478e05aca917e96243db6
SHA512455008a792306205f8a82916667ab5f46741f4ce499bdd3046c5c2b13ae9379b495b4d56a67eb4fc0a6f9e2c9d83ace7367c92fce23d9fc77e1031b1db491a4a
-
Filesize
152B
MD580bf9241653b7e063015dd846718e941
SHA157ea54e76f8927801a7b6d8cda1e06906eb4526e
SHA256d78ec956adaf325a565b49a789a92bdd5448a906054f2e1b117d9557b6d46f81
SHA512a13d2c848ba0223a2587d5634f80383f95e273ae9fe76f356f78d40bccfbe7d806236cc3f6b0dc5dbab6e3b2ba4e2d82a97c076045fb0fa489429dd9e9e08daf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\50edd4f1-1091-4c4e-ac14-ad6a61eaee2c.tmp
Filesize1KB
MD5096d9e3b6cb0e65942bece0283e25c53
SHA196163c8f07bf0664d19d39a8baae046bd8706bdf
SHA2564aa4e7500caf9fc2c80217592cd9cc88eb149744ce8492334c7e82d7427b8480
SHA512b180c69a9636d1eb5f18938eda9c9a15a1dc1c6780e2c7ee499a3c46d719ae3028688e998714b899f59b6d0a3fc1662bb0e84e888a76f4ff08540737af45c219
-
Filesize
62KB
MD5c3c0eb5e044497577bec91b5970f6d30
SHA1d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA51283d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38
-
Filesize
69KB
MD5a127a49f49671771565e01d883a5e4fa
SHA109ec098e238b34c09406628c6bee1b81472fc003
SHA2563f208f049ffaf4a7ed808bf0ff759ce7986c177f476b380d0076fd1f5482fca6
SHA51261b54222e54e7ab8743a2d6ca3c36768a7b2cf22d5689a3309dee9974b1f804533720ea9de2d3beab44853d565a94f1bc0e60b9382997abcf03945219f98d734
-
Filesize
35KB
MD533f16061edcc51b2108450ed8ce2693b
SHA1c096bc1bbb71f438f873f5625a26d2a6f37f8873
SHA256d5a5afb6501328d76447419b8e72f11c788bd7cff9cfdeefe78bda6a008ccf0d
SHA5126ad89c4401d97974e089bd7e64df85552ed993b9cf9a249e544f799639089467633dd66f7b6262d029ac35289c82646dfae60478813116ca235448bbc7df9bb3
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD58f4b4d5d848b49f72ec9d45000e45fb0
SHA16517ec20d81ce901746076948417cfafdbcc2d20
SHA256dd35fa6ced81d040a5aaa4726885204f44abc7ff1f7a83874b76f34bcc4d1598
SHA5129704356124a9f7df23cc91ff93b13fbcfbc0d09d92fa0a5d4c1dec65f7ab78ad2786ffd9ddc304bc24df4a0cfe43afa24cc0c6cc3c721088320feb5c6f7e7baa
-
Filesize
32KB
MD5bbc7e5859c0d0757b3b1b15e1b11929d
SHA159df2c56b3c79ac1de9b400ddf3c5a693fa76c2d
SHA256851c67fbabfda5b3151a6f73f283f7f0634cd1163719135a8de25c0518234fc2
SHA512f1fecb77f4cdfe7165cc1f2da042048fd94033ca4e648e50ebc4171c806c3c174666bb321c6dda53f2f175dc310ad2459e8f01778acaee6e7c7606497c0a1dea
-
Filesize
75KB
MD5cf989be758e8dab43e0a5bc0798c71e0
SHA197537516ffd3621ffdd0219ede2a0771a9d1e01d
SHA256beeca69af7bea038faf8f688bf2f10fda22dee6d9d9429306d379a7a4be0c615
SHA512f8a88edb6bcd029ad02cba25cae57fdf9bbc7fa17c26e7d03f09040eb0559bc27bd4db11025706190ae548363a1d3b3f95519b9740e562bb9531c4d51e3ca2b7
-
Filesize
10.0MB
MD55df0cf8b8aa7e56884f71da3720fb2c6
SHA10610e911ade5d666a45b41f771903170af58a05a
SHA256dd396a3f66ad728660023cb116235f3cb1c35d679a155b08ec6a9ccaf966c360
SHA512724ce5e285c0ec68464c39292be62b80124909e98a6f1cd4a8ddee9de24b9583112012200bf10261354de478d77a5844cb843673235db3f704a307976164669a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5ae0f5489a2c34896862cf4de505660bb
SHA112d2ba0968a0dc370b9d37149e575241cd5041d6
SHA256f00f22dc2af2b51ede83ed69a0a0b4524e791381cbcce599b27c97224d902d3b
SHA512d1cca7e4c084a160b22a5b2e47240711e6f14e49045db66aeda37283e514fd2a162252130a6f444536b5b17ca3a8885f229e43b8b90cbf8da884bcac018b3eb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD59da5f042fe98e4f2b616b1c8a1dafa13
SHA1da2145a05d04d0db4f0bd4c994d7c06ae0dff616
SHA256bd839c91159b440ddac979d293cd35a9e26b9430513cb42a7683913e9f24fa1b
SHA5121f927e46e91f9d68822c38a382d0bc955f9015b48cddd98104a0398dd0b15e46e9d8cb057b8b9acc47188d502bc7780628fd760775e314793769538f103bff45
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD56e60c1e8fd44c69b8829a8bdfdf2075a
SHA1e9feb6e011631d8ad622c2ef88700e8e60af6ee1
SHA25609196586e30cda0f03e139385e419d37a82e69be61e54da6d3e61171900ee5ca
SHA512d9b258d94a1272a4cda9a37f3d325d286c2d350ba1f9c5dfd7dd622f5db36ff57071ba67415bd78e57cec9689514aab65eaca4cef35002234fb781b95c8bb2c1
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\de\messages.json
Filesize235B
MD5768369121f39ce9e9473cfe0b983ad69
SHA1f600379a1ce1e2daec7f16af08bb23046f2a07d1
SHA256c0288cdb437e7c1bdad92b320cf32c6298c0b1e89011921d636e40cfe21ce9e6
SHA512a221210341bf30c082890ce9dd8ca059980603bf166f361252c4d52343f2935db4305424261823c9ef167da4a47d5b6ae67ff746751e22670a2d502b0e3fe9cc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\es\messages.json
Filesize236B
MD5acd2d1ac6478ebc6f3d2f7f166412e7d
SHA11efd577ccf46fb0472e68c0aabcc247c0f176cab
SHA256333b347d71442b11441ec55e050ba9edad9d4bb6cb45f0172c0de9d61ce38351
SHA512159652667b5b05001831d56fe9230fd2fa6c458f14bdfc8f1b8221fd16c276e24e06cacb50169547cb119b26b62b65e934a8e33efad809bb5b5b5008b0a239ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\fr\messages.json
Filesize239B
MD5b7e4a95b829941608b828b6c7dc8cab4
SHA10af5cd453d2c74800b952026302a4689209d2405
SHA2564f246339bafe69d6473b6bcc942189fd883cf17d1d9ae0cd61fa7f342271b069
SHA512cbb6290bd0cc8e51687e9f369eddfdd9fd52ebc97135db6ba9b9be6c495613c35b3fbf5e9aa568ad0f9327193403b7a8718480ceed0c83109001feba49f1800b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\it\messages.json
Filesize235B
MD51ac3794f94c3edfc69b586825b61fc24
SHA124f3e1d0e2132c1ddd62335ebcc73da7e5c5cf69
SHA256f55e4ed4292e7d995d340627f8a38cfb6c3f9ea4fb8e5f71fe00a2a84237831f
SHA51255be5d984a456ddcffa74176be51cb6cc76bd48695e948e532aaf9e9bdfe26cbb17edca0644d4ef0198051eaa7fe521e0d73051ca19f99b1306da1a11e0f9bbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\ja\messages.json
Filesize261B
MD524ab2f16eca45188d6462f8b4592becc
SHA10602d1f2437bb220a202f57132d41911b3654802
SHA256443f86a79a9592cde1947f341176f3d92704b2b3ab1af8047cb1765549bb1685
SHA51209fb65d58ddd6d3d8b672641831a78cf3b634c71c698da80eec22b41a81ade06d72255a85cb8b537da8a8f0392b7be4b8f604d590b7698e980d9341a771d8557
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\nl\messages.json
Filesize235B
MD5b2c3f903c5a400a968f4a954e3b4cc13
SHA1009e302331853488d8a64990eca0c815d50a89ea
SHA256887eec981fa27ffb3a07a0ac9043a8518bd8e12dda99bf5dba50b4d3a9d6a42c
SHA51223c40629184944491efd9f929d93d25ca449ff3196ca63cc09e3f4c21c107cde5f756f9a8bdc7d745015356d3df4bd9225438dd3b9d203597c2c47a9cd42ae84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\pt_BR\messages.json
Filesize236B
MD5eb765b13ee1b5de1e8badf8adc24367f
SHA19e9039a6efa71b0742e9b77a1a2da96c5fefc145
SHA256e1addaa5cb17e403e6c7a339a9a8bee205004c6bc7388d5baa9356c7e9cfe858
SHA5129e2767cdf38387e3a1cdd173573c20236e43029362aaa56d2dfaee01227b98b0559f789d1b7f342ce77f5b262715690df8d31f1b84edfb9efb43447f8e42c49a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\ru\messages.json
Filesize281B
MD5da5861bc863584ae7669d140630342e7
SHA1846e3c381bee1a96bc310dc869ba10eefc2d88b1
SHA256079ac944d60018ea0ec88616abf1f615e71cfad83174816f27d72d0c02f4dabb
SHA512c4d8b47e1a340b556c0b18f281f5d3b65bae975924318374fc927d70e0ad126c84f5d4197a4bef1c8a125d0499b93397933554e8064b394431e82a13c823f810
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\tr\messages.json
Filesize240B
MD5afaff63933a028c193227fd69133c395
SHA172c6158a9a77da70a611d54ecb461f62d9cb5539
SHA2569325255feb4645167259ec59fa9a8266280fd49a186878e8167dbd0c168d3b1a
SHA5126e5ab9bf77003fdfcf8ffb993d27a1b1cb9c1505b03e852ed60164cd3021c300f3210c318d3b8060259bcf7e9bef971551ae2ec83e546aec716b76893ac13e20
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\zh_CN\messages.json
Filesize231B
MD59431ff93b0022eb853f6464d15bd1d92
SHA15f040f4d34fcc90287b8be565f0c41eefd48a917
SHA2567f827b1ada8499437aa79f429f581a9f6f0f5f50e90607c50517c6b4fa8e84d6
SHA51238885e2c37eb0cf9bcceccc9955fe4edd85924c6e552fcc5ebf775852b04268ad8ec7929405dd0fa5e9527a4d678b6e0e2632e7ae4a53cd6268b3fccc6bec802
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_locales\zh_TW\messages.json
Filesize228B
MD54305706c833e2f09eaffde9e21f6e487
SHA1be46012c07c323b847f17792495b69d373cc3dea
SHA2562d1957cfd7c2cd4216221d27b26de74978e682de207947abedaba6f2fcc34699
SHA512be35190cf91797acaa0a8e1231dbe0c540ede607d1ac3fe3820d5a0aaecb73c1ec9dafddde1d36e515294c5c78ff4d9ec49a90bad76e15cc8fac2bbe1b88e161
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\_metadata\verified_contents.json
Filesize17KB
MD5d5de46f9808c0b6655bd7f5bbee70ce1
SHA1ca2f3592e68934d7142918a5b8f1f629c8ceb6a8
SHA256fa686f6565a5a277f1c244c04d4db34eb681bdbef6871fb75486535cca2121a4
SHA5123ef8a17994839e490f9d710b7a395d18a046ee39fbdf5f6ac261acf5723a5dba83c290d8b65a7a834168169c507b01a60d250dc3ae52ec0f8fe4e60359828290
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\adguard\adguard-api.js
Filesize1.2MB
MD57710357fdbda37e7198b22171a5923f0
SHA1688f20729d4f08165d98e916dc47191f6395171a
SHA256dd68d572adfde2bd5dcb25da06696b1fb86cbf78a97c4253338ae5a8c98022ca
SHA5124cf396dc02192a71d6c73075b9316ec3835d9d4255ca0980696387a7db464b03f290c2116a7eacd1d0ae0280d535acd3c55d82dc2a8626edaa399ef211086572
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\adguard\adguard-assistant.js
Filesize9KB
MD5179aa237df539cf8209f05b042a6348a
SHA118409da7dd08d3822b555c3819e0fc7a89057e1d
SHA256e2077bbf36602a43735d574dc84a91475bd1f02bc13b71907f661ab119dd277c
SHA5121fd8b90d1678a51405965eea6f4cbb5a9623d349a782ca88be4acacf434f6d4a38c8179c58a09621853db4ce03b6e749ddfc5dafcc23007f3e64e522118ef52f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\adguard\filters.json
Filesize50KB
MD55fbbb1eff53ff9ab11c9cca6669d0aef
SHA1ec9bb17e2d87f5b1dd0a1e60490afdf2bf43a69d
SHA25682fc71eb962b234562ba7c19ec7c5a694908678a876a66a5f0c7cc1e5d388d65
SHA512c51652ba1090edd580981f4d637eae94716b9edd86efb96c4860f0814ee0a0832223a1f275ea0dc13d1358e363507b96c4b130fcf35857ae35d6d12bcdca35ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\adguard\filters_i18n.json
Filesize437KB
MD5bed667ea66007f8e69db252844e406eb
SHA15291764d69c35fbde4bc97902c7753a11b415bb8
SHA256fa8990401281d12b5e5706f92495b20cc78a23208e36c283e4f05264caaab2eb
SHA5123be7b8a8db01458ed4bf9557ce5dbe29de75575b61eb0247e49b6eea8f0a368aa0bc664a1252900f1b3b28366f256bb29d96e49f7a262d1124a42b87d6946647
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\adguard\redirects.yml
Filesize63KB
MD5cba3c373893a8ec71edd2922a433f85a
SHA1259554a2b327f93a6896e63b61c47e7e823c2360
SHA25674898ace1f0b1175e27bfef0f7c0b68aea8fc035408f2658823046d364991869
SHA512184d2998663f369eccfef0bc03bf988379fe6f14f7fca11b9e4e82d083626fc8f09d2858036a5ca34e54c8e640064e43ef866f0ad176e42cea6f4bd82d618033
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\abs-page.css
Filesize12KB
MD5278f720401936303f75525e8066e6268
SHA10d27ddbfc05053fa1822864f12ea57976f391fd9
SHA2564811ddabeab4cabfae7bbef0aae995cbd697a6ab5390454d13051b66fe2f1b4d
SHA512ab5ad7f037c1ca692934861ca46482b263eb818e8c8f281e8b6e72bb509a3b3510ad6c7440a704595bdcf34e2fcaf717e49e16deea928a13703586fe42ac0bc0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\app.css
Filesize35KB
MD5cdda1f06d04b256418ebea89af3e1563
SHA187dcc3c48cbc71f4799f5bd66bae2fa6702e6d53
SHA256f4cccfafcb7ec914b6952d581c4a543104ae03665229ed60a886df0828ee6002
SHA5122c4585e1f326fb195a01d7050eebd9e64a731cd0ca92d907599255915f01f6cc70b0e5c86e3112db15b381d709e8f1049953803d87997abd8882737f4b13950e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\blockedIFrame.css
Filesize2KB
MD500ada3be5477feec7856fbea07b673f6
SHA1a14641685fe48af82ae4d51ef2342e29a9fa181e
SHA2564182e6a2069509bc20848d95dcae49413a811848587f5dcc3377b503ecebc9b3
SHA512dc378ee98524ea5cea8f28a6df793e6eb2f8cabb01f4b51c44515aec9e0910bc17a9feff1403d8aa348f00b6b30ad96af6a72ef5870c1140d500e70af566793a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\external.css
Filesize3KB
MD50e17c269f64b863d1502ba449e6b4f48
SHA1158bffee84ccb892288ec5a2f6048eb580dbc1b3
SHA256cb3fc2ff2a457d26c6139ecb68d2d9e414dd3337d0a126e518dd067f5d78dbc2
SHA5120af53de74de76d02bda0497c3daee515dda867e6ef1bb64df0374197947e6bc33a35d383c957488176f27529743f4adcd5de65aae668e907baa432306180386f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\KievitWebPro-Bold.woff
Filesize55KB
MD58652745947b62f03147b76cd5db508fb
SHA13fc62cd4eb74c4fd350bc559897ffeb576a88ffe
SHA25616b555282ea8c779478cb1d8674dae40f689dcdeb4664cd762cbdfe47c476d8b
SHA5124c518beadd3179daff850af3a3e95293c050a86dba3483426bd11c44aeed2dd737f031eb8a28da40ec1492f343918d474fe2fec11101ea8b1d36a84ddc3cc515
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\KievitWebPro-Light.woff
Filesize54KB
MD5a8a9d6aaf9f3940badc66e2a2aa21047
SHA18d2cd2f4fd9fd36f19033c01272dc3fe43bccdb7
SHA256a791aba3842d3766494ad0aa2a1b9cdbd2bb8aa8b2235aedea82e993c851a1ab
SHA51246561f0b8f178e4e4cc836a4561d12f6a0670543ac5567bcede9cb193bfdb4bf654e3f01372210f158ae3de58643e4c963c1e1cb788f497ee817877a019fcfd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\KievitWebPro.woff
Filesize53KB
MD5cb0b064a6f71ca79ea66c595c22211cc
SHA1681567e2764d6e5c7f3d851e77063b9b47ece64d
SHA25601fba482f08656e11cbf03333b07048a33b574dc7024d5651f94b0b3cff89c3a
SHA512ec1517a4c564a4baf1c353143ada7db4fc8d0933d1757e239b67e5aeed5748c2c905ef90b1124deddc0a3316c0acdc136938032660e5489640c85f0345889984
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\OpenSans-Regular.woff
Filesize58KB
MD56fde2eb6728eb97fd914dcd0641d332b
SHA1fdd99dcf9469dcb61a4faf9d42237f75acbe6a64
SHA2564f5c5dfcbbb7f9a09d7e27232c922994a6a82227e11e4299e922e4c6d9f2119c
SHA5128576a69b6d85f93b3f12372665a1709a7738d716ff83ffc2bd767fa36302aa27bb3628e3094c9977e164e734d29d3dcd938e384a8f4a2524d65000198f5f5d39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\OpenSans-Regular.woff2
Filesize43KB
MD55d5735e57127db2f7a2ad879fc6056b8
SHA11e55dbe4e381353b147bf963e97bb60a43b0f28c
SHA256408fe165dff48eb2f8cb3a2fcbc1dd92b94d56b4ab11813be55c776871c691cf
SHA5122b777359ef42e42554688227d03de7b0d571d17e59808fa5389bb51a86ace9ac4821e2d741c6625fdb0a81ba80d5d6d91acb47119403763f4070cf605e687245
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\OpenSans-SemiBold.woff
Filesize60KB
MD5fe241c6c4f5a190e821b7c03e337d756
SHA134cb39f498daea83e4575b41d54c0536c2496714
SHA256029855f6870fb95f6331f9d8510e4b36cba265a694ebd643824bcc48a219f170
SHA5128f73787ba84e8f441ee4a836ca90c351afc4766ba29b4c45ab58b5b24d73c522c44429f076c69df2b3fe6ff844c6874faad0122fb1b6b01167e5c85004c2c111
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\fonts\OpenSans-SemiBold.woff2
Filesize45KB
MD57106bb83a0e767e12659de9cfba3926d
SHA1b869c145806c2b7ab5e0603db32c6d48b19faf79
SHA2567a32484e166e1337fbb0cf4f4262bb385ed9081f1ac20f9efe39e8e50490367a
SHA51227a983d80c7f0553b60b047adbc1a22ecc9f48cba76fee8170512287fc7544d15ed038aa6679ae01559406aa74ccbcc16a51fd2128811bcc794a6bc4dcc994f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\loading.css
Filesize605B
MD5141647baae089ae82d48cbe41fe05587
SHA1520ef2e9b384c7951c65c7457b358de07c3533e2
SHA256a75340fb208ed7435f8398e400118e4ae6df8550eae19615dbf1ee79ca990af2
SHA5126b04e63c43eb384a2365aa684e26b50f45f880cddbdf4fc2ff16e65b3fe500c98d4289844ca4275d236d82575926c398f1b96b0666593fcb5ba1c5cba8e0fefc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\popup.css
Filesize28KB
MD53ffb8bc021134070b11492ee9f4c96b7
SHA1bd975bea946bae402ebdc835422c0c375fe60b64
SHA256f639dd60238a462058e9f788c77f908fae9d783d1c2edc0bab5594b72cc93baf
SHA512e3034f34d616b5b05f5078e1abd24769d1d897749419d90aade7d6222628d32c1468174acebcf6ab9d677e4bcf3644e835616f8631ceb282047261660a2e2074
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\css\vertical.css
Filesize3KB
MD5bafce6027ea2815a98c23a78c461dd40
SHA1282655940842946f1588d7ddbe1f46cd4c2e12e6
SHA25662969c5cf436234078b317b83ade2cef84da6ff864857c8bff6b4d86352219ae
SHA512cf03e251c0174f85ff6de7d6be1af353b8de538477c29c99c1a9a3c6f0b01c3e1ba854b44d2cb3c2e1d328604881d3fa86ce37bbbbd7ce62afdc0d96b6340382
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\ExtPermNotification.html
Filesize609B
MD59302990e04ea201a8674bfd300b585d4
SHA1e03756903189b92a429af87937d8d4db8ad6f4d5
SHA2563d56f32de79184fe57c3f821134135d3d8d73b2e63dc4159926f73e4141fb129
SHA5126ca8c817fd9af12791328ea8f8d4bb4c69c99c49dcd2fb7d92807e5f153bd1ec243f169ca57391c67c151b284c16dd930cdf73d5db917add12290a89db64d5d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\about.html
Filesize955B
MD5a7d9407fd276bfc656a6977b5a957fcc
SHA185d1307784f35937b14422647a578819d7b00524
SHA256693c2c387a95641d5b326f9c622cc737d0c5b8413d4f9d67739c67fddbf5ec24
SHA512a63a83c7001173743cfb3b97cd56bb29d21fd383c88842adcbf289b0a2c90b7f9811b068425aa35d268685d5bb0930f7bf4d5056e96fb966f38896d444decfe5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\absLog.html
Filesize1KB
MD57e6076798609bea02deb6fd42561fd7a
SHA1042a8538fb16d9311c930dcbd9a22f52b77d5d01
SHA256505d536d6ad2b17081b0733cd46be87e05aa593caa110e6ff21b95774cd133e7
SHA512fab49aacaf3e1af696cc1d424118d39517a6ced74c518a7c97a1df75954933a620b945d6cdb92a029963266325cd8f7a82ca9b7a4e9717d7cc863f4f41e364e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\blocked.html
Filesize320B
MD57b82d8e14f98c0133d4e5b43cf93213b
SHA1196f6d5ce425f46b9a37be119f7fe2d53939ea21
SHA256837f56c30fbf15f104d35552163ceffcc26bb1ca0196341f213a6b9b46774df3
SHA512b468054f45b94f085b699c76d7a3035fd3714b2179739f556708118701f11245bacd00472779e76bc8e9859fb315f3c87c5458c0dbefaa6e514e0b9ea0101d2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\blockedIFrame.html
Filesize361B
MD5c5f80f2511dcd4d85d6a4121226bd669
SHA11da1a6397cd2fe7af31b74d75ec834078441f0b4
SHA2561594d272506b1a93c8100488c44bc64436407dc58c9f9d5b64cc9eb6c2ea0fc5
SHA51238679cbd0045f1d3a4f3cd116da390d249c6c22f7cefc949b4f61d6c2d855dc533017de6aad9ef7f017a851df597b2eefb6f8ffa631856ca2f8c881bec30fa8b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\card.html
Filesize592B
MD51d94cf3e6574c0d8eb19bd0fbd95ff87
SHA15b61b920306e1255284458a574e8a460dd1add53
SHA25667e778413af1b332c6cffee9942ca68838b805dfa6a6529231c691db5564d595
SHA512a9e1eb8396a3d39d9ecb2f9978039e15e42d4e649db37e5516c48d6e9650a40f6bc4610334cd0f1c212faba69605533a20459712111e0eb4e6543ffbcb9a98fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\external.html
Filesize597B
MD551bac360495415690f3ee5a3bda5356b
SHA1c6ed0ddf194ccd6e97e0c60fde645c6a6d2b75f3
SHA2566ddb5c8e2c6ccbce556f28f854881ece3efb3562c3d8b3e190f0a77b97f5ea21
SHA5129368c2fb0b73e247c4a5dde9e752f564bba06f11dcad8e12ae5e969bf170178f5d1ddc9ecab618bfd7a27dd5e978bf88b877b80e5af490ca3ad243cbae5416a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\loading.html
Filesize424B
MD540c22d754b3ba1c0abf88a74a94de82e
SHA119963348e09e1749b132853c490ec849611bca62
SHA25670994d24863e27a8ebd783771d447a56119d0d6e6162aed1ff85323a656d8767
SHA5128f161f199b322c4edc6e08f893ecd558b08ebb97ab4694c4f28306804edae06394694e20a61c3bf9865ec36c825f55ab463189512b3dfc7f0a83e203e533946d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\popup.html
Filesize772B
MD5575715b2babbe58af5055fd214118ba1
SHA14018d09168e46e575f98ae149e27d461c899d4e2
SHA2560cf5d796ef3e9843f65fcf1558ff57afb90d252c5aa4640bc2a06d01e3f13dce
SHA512fc0a3f21ba317be88bcb0ff15358ce6c38f3f97c9a37679263a183eb528486914b7cd8790dec4c019a147a5284639766695a0eaa7b066ee4d91a9bcd71a83123
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\top.html
Filesize577B
MD543b8ef104c1b05bcf16e939c20b251d5
SHA1ddf0931e5626d3c0f2f3ddf46c50c5d50d2bc619
SHA2569000981a015ef6373cffb830a76480db05e9bc2bcb2870b1fcabe9c12bd491a8
SHA5126fd8c2d9404fc8c31608df8ca2fb832bdfc589b26a075a9f5528cd36b8377c334049daad2ae489ce5b2b4e03ea34123c65514ca94234a15bc5f5705fc27481c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\html\trackerNotification.html
Filesize608B
MD5f837b03fe465f18daefac626b3a498d8
SHA13f362f1f82e9173b03b3725f71ea97a7fc4f1895
SHA256643a1f7a63657a6fce9a2e117f3d990a65682e1ca58a922314f3b106a9dc6e63
SHA51256f7b59f4169be37ad04dbc918e33e46b8f7adc6a49b04f9fe039826b33fba0d313b3c73e8f8596955030cab4ee1391bbf3949f37e6b094dcfb7669399ebff97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-ads-blocked.svg
Filesize2KB
MD5edce6db6043a46545f1db7f76e8569ff
SHA161ac052b05585b8c1052af0750467ef97ea3977e
SHA256e336dd768b43b8998613c3b0aa21b9df68e444b55b936d78cdde057d3328ca90
SHA51282b10ab3f7b555d32fac57de50dde4094382f877cb92a91d50b730817bf9420d7edf52388dfb07cff0400996ade86cb4208f662801f8eaf5ebdb24230eaa3b88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-attention-small-yellow.png
Filesize322B
MD5096a1defdb6d121457a984a638656b16
SHA1761cca1118ed7c56ab09f2899c77b0fba2998aa3
SHA256d2c167d2dcd520cc2c3e811b38dd2a6910f20ea2a8941f022531cecc2344fee6
SHA5126761225e948b8f2fc0aa641ed882a7a538e10e093f4f16ddc825f63de247f6fa80708d615579e6c7fad002dcb37b480cf863669c87ada2cfbc80c205325c3712
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-attention.png
Filesize3KB
MD538b66ec6515e30ec167041661a4a996d
SHA11cc89ebf5cc4558bc5f9886a90f4240ae2dc885f
SHA256c729663d6b86abef0640f1c636102c3c22672c39867b0aa4b8b850386e9eeb72
SHA512d5e8ebae653609891cf98219a94f865b7f914b9188332c7f1373e6f3bb8a67516ee382695a2af2436227dc1867a4cba37bc95a017e7aa3f8b59e625b7ef945a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-check-small.png
Filesize450B
MD5028d7264fed3ae88326227f4e63c5339
SHA179414c0431561214ccd3fe96be8267b1518a4df4
SHA256b25c550ccf4551386baf8e9d7f0bd3a7f5164af0ff27ced82e213f788ea8ef43
SHA512d2bac76ce970537947496b11e6d2eca44461ec4899c72aa53dff577e08b1b734dc7c7009df2a376aa2ccdc49832fbfc9acdd8546b15fdb22e3cbcf42d4ec102c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-check.png
Filesize3KB
MD59f83bc5aa81337291609ba57f3e7e431
SHA19f71519e4fbceb28d29a503de71d8fec0d5fe54e
SHA2561c30bc9cee8956c1e53b6068ae489414b7b7be764ebe54430f0568eb71ef2788
SHA512e5b1ac7353c5bdb049575e0914f392d3c16070b772f03b89422208cfc6b5e403debe06b090e60f6bc3374622a3fe91bd2ba998eaa08a833c72e0af6231ed233b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-checkbox.png
Filesize542B
MD579e61d16ab8bd2093f6d71b9f2126eda
SHA107befc0649f56879910a2c05833f757296c50eea
SHA256731cc89589e63418b6e4c2b1d5fb29ee90496ed1ee7a48a7d180288251cacad4
SHA512ad83ccd30f46ce73a9f47627b948d459abc157e769603885f1c2c1bbd65d19d7844891ffec386061f6a92ca0463e39ed4ee246af439e3aeb62778c84f50ae2f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-close.svg
Filesize704B
MD5efef07118c3f6b6714a51e1f9a0a52ef
SHA1eceff182e43d106460dc2a0a7f0c9595ff199ade
SHA256d245b82012e36af73493b6a19ff75d413a99a94ef4000258f927c2c933d3fc2a
SHA512c23ba695045f2ef54e0cc228e9dc1ad589224a89dad2aec5ef59cc4f4b20d453f4f8891b002240d7f5f37ebd36c2cf27220c1b39b0f8bd3875787d7d3872057d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-danger.svg
Filesize5KB
MD51d0c23d3a3df0450a824d6b6125a5da8
SHA1c2e8579370fd9f9c045fc674b36aa89c76980702
SHA256a14331e5319102332854b7733def47b904f432b2da3108332d1c6089f2bd61f1
SHA5126b07977e6933db42313f16c06306faccf169ae5ac52289afab31b7cb05395f0ec53867ee636b3ac59a02e42dc538472f740cdb81b29538c1fc2306a119b22de4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-info-badge.svg
Filesize1KB
MD5b853fdb03fae71ac1078ef067e1382ed
SHA1bc471366eec8ebc82b2a3e1ce5f57b01cf3b1e5d
SHA25622ffd29dbb44509ddc46b0a07935169999f39e2c36c4f861df4ec1ebe36e5cc5
SHA5122ed4a572451bbcf446886a8415f17d6c121fda69cd72206e5449d7c6bbef6e93fc7cc48d8b74881a5333a0578f9d45b71de0d4446b582c7f82da4d1204b9ebb5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-menu-close.png
Filesize232B
MD57c0d1689c3fe745687cfd01ac024d1c7
SHA178f42cd6678a38bc3fd7828e16c24ccd57dae12d
SHA25681955385b42701de114434ade08e7a734805461a8599608f1d424eee493b571c
SHA5127b603a486ce463bc6cd22089900c5c6ac8a1c1cf4822761a44c9d6ff27c587fb324f29e01915941419355a9e4273fe47849dd14e732a42a498f145c22f34f9c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-menu-help.png
Filesize230B
MD57d9bdccfbb5224dd023623178b461ec1
SHA13152b0a349266d84659bc0af705bdc9964f4e104
SHA256e8e9a356841705900ffb68a0e3e0a5779fb91e1d57d99e76321d582e90212885
SHA512d80b63e3f7f111de4cb5500bbd47bd8ef4543fd4825e25a79d386e0f40c80ca55b07e17351c68d97c0e4919d4c57255b953f5374341e51d68d8663efea787ad3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-menu-settings.png
Filesize379B
MD59ef6962f93b27eaf94ca003757eeb4f7
SHA14a19af7efb0fbde69004d6b7b6e6e291e648cbdb
SHA25667bbb5c10a75aef381a30df66d2084d2f188e08d2a109358cd1567425ecd8d4d
SHA512fd3740f6a4fae3d3057c81cc251b64b3cd8c02bec1f91abc58bb5a3c5d2089a7f9078020dbe4929a3d11d50ecded4402fa49a3b0a3d6d2fe11885ca8cff0cc59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs-trackers-blocked.svg
Filesize11KB
MD5b140200e56df096f16857c6e4d3c203a
SHA1e7930ee1cd0deed8acccff3c32e8bdccfafad6d4
SHA25665ba0bb6492f913720037f9305a6b548b94bee7c8a83014f6d105422852e8f94
SHA512ffa7a276b7fcf7ea8d8e834b060b11b07d035f3458f42f2c1c638e43d153d751c191cb70869003c3af0a369340899ac2645dd2e4fa600e090bb895d4cb020d11
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\abs_logo_small.png
Filesize1KB
MD582516d2af5768d8bbc28e22612e62387
SHA17fce1dcf46d820aff313169b93992108c80dd17d
SHA2568bf36ea0ab8264f7c610cfef27d7d6f02640fb63d020a0d1d47df9fbefc8c071
SHA512251f04083683104697b9044f0a84c3cd6fb29ce2c6aa0230ec4c6b08d5eea240087950e29888d5130b18521928f8ceaaeeeb14a92429af48272dbf086f519980
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\absb-checks.png
Filesize972B
MD58e54aa861a9bfeca5abc9a0473e01e7e
SHA11b0f0b2cd84b2ef6fff296853ed00ddead75d01f
SHA256255e63f5a3d6fad430830b7d45e998681f11151bddf2ec984ed6753fc5fe24fc
SHA512a50c6df4aee05ef50acaa9478613cb24bd9ebbab28346b0a2d301a76f6deaf23ea8274dd93b02f99648bcb28c01a0a69e9373e073d1bb67c8483e5e091597531
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira-app-icon.svg
Filesize27KB
MD59a763eb5f14d0b7437b02be35e2d328e
SHA17d75e52cf966a2679bc9e4b96660330fca6a29b2
SHA2568a7c8542da69184612838cf0efeb813ff0efa8162d835ca72746331dc408e44a
SHA5125ecc6dbc105117be2c35d83ab4a00a57f6086e5d177f956d577edecb718891d4de07976cd8ed223aae0a11ea3b7edbc04740ec35bbe1c80b6fabcb074ff3f2fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon128.png
Filesize3KB
MD53101317f028ea2740884f0aa55f9781c
SHA17d1b34e1aedf419b70e0d46b6ebe9cf028dae645
SHA25647ee5af903d69612254f523890fd8b656f778d4b80677ed277b02ece84982098
SHA51263026fe7263ce2fd756c4babb23183ca9db832f2a2b93efa992be44ef626a0baa2dcb316981aad1cc35c1a5ec47bef2435bb0175d02574e76681aaff8be261bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon16.png
Filesize508B
MD5104f27c287c0f1bb046688829b8f00fd
SHA17fcf07b8eb37ca5d628548b2eb4dc09040455bbf
SHA256c02b11f4c6d5926f754ef3bebc80f233c963aa09da1d785c25a46320d60fdbee
SHA5123348a372b8fe9ff0216cae6dec75bfb2ba18f8a2396c05fc109d87c092946f58dbcc9749e0af2fe3305c9874b8b9e68c218d236fbe204026c87d20498b94ad77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon19.png
Filesize573B
MD586f836b6f293fee135bb57744114eca8
SHA107b0c19fc641c0f5a15f907067f300990fa28421
SHA2569d457f30e2acd76f4579a3ccf66b7beff2f7d827f6bae10abcfa3b1ce4e8bd2c
SHA512846aa90b4997c034aaa2d64a8bad1456b8277c01be914462d20810ea13658f6293ef3f163d50e962a2c303e939a87047475cb4fe4be0667885f6f18dffcec32d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon24.png
Filesize822B
MD53aeb9edeec50c029b01a41025e09f595
SHA140a640d7a106ac3877e3a753de91b9b9fd02b6ec
SHA2567ab25fa2cffccc5535417758f0d4a2b69313cd06d80ce542b414e9f63a03b007
SHA5121c8de0178ea99144f752bb6d5bc4bbe2ea06dcf680ad4b202d72f5572e90014db3fb5a56dd81e54e079ea642fde2da0f9da6123462694887638edf0e05cebdda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon32.png
Filesize1KB
MD5bbeb9470bf3bc1e3bae38f51e349623f
SHA11778963beb82522f90f12b3651714282d7ac00eb
SHA2567f8bfdddf9d85030f6d03c843e67096cf5cd5e9739cfdf7e1e93b9e6033113c6
SHA512f36975d2c092a2eeefaeb788b359accee4ee7eff8aa7a47a82826d95711f76e4d24ed2db5f7900cff0469713279c3fc6af60026334c6670610023af45fb634f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon38.png
Filesize1KB
MD5ab679669b9da45447253f8062a3d4432
SHA122c87db70ee3673b7bb46ea2548eac1f4f22ff34
SHA256865c80e73b32aca16252fbc7fe763f71e54b234426982aa2f66e34a855b0527b
SHA512ed795644d4bdd49f35999c6365d6af6c7901e8e4e2c9a06796a51cfc08671b8c83ace3dcdc78ca8ee6c07b75252b971aac81258549a5f3afcd242a1d4b8ef4eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon48.png
Filesize1KB
MD5f8000bc39ec098931f7cb34e8ab4e75c
SHA1af109a664b578c12f79448f300d70822c6d0564b
SHA2560df8862dddc9535b3ca7bcfc154703912ddcb4f36e1c717a965e2e009dbfc654
SHA51210fdc380dab3c39eb059fd33079f940a72cc6de09b7bdd18290c30d8d7e30f21672489bbdaa543a91a4ba1e17d2f92c69efe2aa39501805703c45b76515f219f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled128.png
Filesize5KB
MD5a481d57ddf210931c690b6b3dcb4ee38
SHA1c1c08f1b9cff3aa6d592ea5a515277e66ddadd08
SHA2566297323de5a389eb073dd96fe03a6c05a0f68e1deecf8eafdc6543a1500cd0d0
SHA5128f476b7df7f2c0fa2dab3be104adfc63ea35c557cd14bad6a8c80395adae67dc8b0531acdaaa7e5a1bba7e4cda737714254a9ebb369e09469d28ce747a467a5d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled16.png
Filesize1KB
MD591f6bb1edf4571e2bbdf4490a9e85d22
SHA162364368eb79a958539fb3f9d5101fa9e33f5ec7
SHA256e4dbf87ef2db4cb0f8cc806023392e7ca2d5e7c2ba608dcbc1b8295490f050a4
SHA512612039a7c53626b6b1d6c4060e221cf328e47826bd53c44d8008b1f5d903fa7c8608201150e8441ae94a8e5da617fe213103b539940b9dc104a610195480b002
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled19.png
Filesize1KB
MD5c3cd627d48f5f5381c90659f440543a7
SHA19e92748315b338b75d934290c5b1907253069ec9
SHA256ca5f081a0bb06588edcd13af2456d0177152c845ea13a0dd72552dbf83286f0f
SHA512e079193af5dac587e1c57d9045ae59caef2a7d90801a8ee9d9f8950e99115271f686fc7b39e14b72fcf882c39d4b7f4bc2f3585848007cff6ee71ab12e1a4cad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled24.png
Filesize1KB
MD5be4904a5b37ff6e6ffe7b271e4bc20cd
SHA1dcb0dfce2330c1d2081ab647877c0b2a560572ab
SHA2565cf30354fde8ddd8b7f7b47b71b18ba5b4ea82d5a2d1042f7bc17aeb400781d6
SHA512c50255aea9d69cf0e595a2dca98aa2e8009984d481b2267849ce1428c9befd14fd649963b94c8eb7a0a7af34e80c392dfa862a99981c524a2e084589ca3421a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled32.png
Filesize2KB
MD594a738417631064593c41c2e440ffc01
SHA1e68aecde30fd8596ab0fd14f008309807d7f88cd
SHA2568e9dca75124746521e8b9f67346a9170594fa7e6384797568de0b660826e186c
SHA512ff46df7250445199316b8eb293770dd2197822814e0d1dd800511af9e33241d00a2f5e1c53b11dc0345a211077f198f6983115063058dce4247e91af64623bdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled38.png
Filesize2KB
MD5b1f6d89a1e590f900a95e07dc4d24ba0
SHA1e85ba2880de4d778af803913302e3488bd19b071
SHA256f7987bfc8d4f2bf2444667e6a8d03efac3251ade9f43db65a2b247b68ab6403e
SHA51291ab7a44f96be6c61355610cae14761dcf1310d3796a0d0cdb68ab83fabe04b80555a76c365bff313c45c63ccd4f0f07eea5671a53805691b34d50997d3984e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_disabled48.png
Filesize2KB
MD5deb9fa07c2e7652d4badd63d254738e4
SHA1f55fd50d9f1fc0d4d924261eddbdc8b4f16e0229
SHA256d7138b944859201614ef45adb012def08f4a14b8eb978b368424059f58a0f455
SHA512148ec8b6d1aec173b78a224623740b64bc577843186f93bf64bb4e0f1ced89a0f43b0adad036496213afd40d18644976828aa421d33d14a4f570533df06bf96e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning128.png
Filesize6KB
MD5764cd5156f5a3c5f1b34ff234eb7d0b4
SHA1c3d481fb25e5935fdbc1f3b231e5f8c006daf97c
SHA256f19d08278a8ffab999c351e49e0619d98f1e6c45bad265443e98c3ab131d5c0b
SHA512f51d5b9214f2caab087dd9694284ea4301d745176fe15e3aa6024f9ee42b868f8f85eb2b44b0ffd53feee93e883b0444fb6548dd1f600b7398aebf483278cfd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning16.png
Filesize1KB
MD5d1b3ee92b38f022783e6e600f1821001
SHA1ff65d7a57ccec845014ea0fa243192851d94aef4
SHA256ef1b7e0adea468b4d14b4943f4c2d18b4bae21d27e0fd80b43e1aa1c684caf8c
SHA512137f7ea7a45473c2ccfe4045b883edd4bbecd09ea1f97da6fd629d4f99dedd88ed96ec4516d417ac7d30bba87814a617e0300f09a0897a4eb7a4e9004d2934dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning19.png
Filesize1KB
MD5df468472e9708cec59993e2782ac0f48
SHA1012ad2428c84287b06f18b83ba998ac80dd6f6e4
SHA256adb4565b71e75d722d97f9807a24be11efc506dedc832e899cf8390d88ef92f3
SHA512191f14fc74c8861c0f4cd040b82279896074b174d4f8589153b0504d416e67c958519ae68941156a42c66ac5d6295aee32088d5645779de6a04cfbd23b495ebb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning24.png
Filesize1KB
MD562e4b3c25f6706ba7a4e5ceb3416b3fd
SHA12fa250c68829716524729e4545bcf250aa6b8b48
SHA25621eb246086e164401033e380fe63ed12b5aec676d1ec666a9bb03aa47dbab46e
SHA51280ed2ef22e222eb0a3ea169435274aa9cfe2e895295fc99058a2491b7d868bb1cc341cb3db8b42fe21ff719c4f620408d719528efc88633a7b283b28c0cdf952
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning32.png
Filesize2KB
MD5123dc55bce032f7a6a78d25839176505
SHA105b6f572395749ec1bb22d12c45e909809743c03
SHA2565c785d1bd5a3283027248bba70ed3f51d787416b2a89d73b271c9c3acfc41a78
SHA5122299ab1c70b6c9851444880a49e0dd7fcf063aed5322ab16193106ca2f48a84fb9ec0a273f82f1643ba90ba951787318ac680f9624185430d9b223941db5a256
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning38.png
Filesize2KB
MD5ccfac542db190600e7f2e81fae2ef5a3
SHA1ce2356e85dd94ebc912f56008a3e6bad719be9a5
SHA256b4c961b5f5ec23901def2de93bfa7dbcb859211278daf7057285f420f97d789d
SHA512b8e3536bd2aab3f0f15ef8889489bbe15f529cbeb789b7db9543a59cac5e015571d5a028195234d5bdb5360d0deee4929c451673a60141cf5d21d1e5c8ce92ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_icon_warning48.png
Filesize2KB
MD50e7f35907ce8dc52fbcd7d18122200aa
SHA1cf2319f359cbd3b476208cb5409b04e0984857b9
SHA25679e6c321e672379984652c073858c79d5538b059145b97e5b2a6da1295e19ce0
SHA512abae9874b72a25b70a6129d0a26a9b3795dd175c0d396c6346242d0760a8dbebf77800a12cdb986a439249864243618b567a0d8a3d8edd8cc3464092a5158446
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\avira_logo.png
Filesize1KB
MD5a1f8933d968d1d436c137a502f032b88
SHA1e696db4d2dd296c26ab6c22ed804295cdc3076e4
SHA256ed5d230d1873f584e3db681a5ec9de20de041471f185c19030ce12b28f76c565
SHA512ddb6efc80adc6aebf233406d2f74b105349261854e3d5b15346d3ff73568ceeff5c02b2a42c66ce4d437408977cb5fb18e6c7f41145757546c43f5d5f4f6b541
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\classification_safe_lg.svg
Filesize1KB
MD5a3e7de968c143166132af3b92ec4d1bf
SHA1ae05c5d16aae3f2e299e58b344f774b9a3fafe92
SHA2567e21228879ce8134bc996752e4787addd4d86eb436ea7ca3e82af8fbe8118e13
SHA5125068fc9d0c99e402e9758c0ae35bdab3cc7103b44926ee3af14f715d370cf384f2ab51402d26e2642e5f9d0d3186bf4da9882939be6d45f46655d18329a44524
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\classification_unsafe_lg.svg
Filesize3KB
MD5eef8ec3bd25b2fc8c82b44e4342956a7
SHA1f2b435d0195a25db0fec7d91416a21422da37ed6
SHA256b0a49a28ac0d9c6af6474398914a53b100bdc74ff0eb8d095b7ea374891d492d
SHA51255dc03a815c036ec97c169695793f4280a911f1affd0919ab7abf5f7c21c57680beb4c749ede53ddaa39c6449496e9f9733b884dc0a1143701fea2b352aaf14a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\close-offers-bar.svg
Filesize1KB
MD5289d573a8b113aacd2813ce1dee22e8a
SHA11922e429d6884f684573f19ec15bcc7c56eb61ff
SHA25622c2c102f04eb02727aed25210803b9e71df6a2b5d2852c0f78bca4ea2faa54f
SHA51259adb1898d8edaa90ecf615604fb8861701aa6581c04a026f36b7f80294ed500a51de2bc8d869aa8ecab9a629c32ab4401c898a3191885a9e5b138485949fd77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\close.svg
Filesize1KB
MD543274fe45f06f51c23b0a83acae3dc27
SHA13587339e055509e48224e00a48cff97eb925990a
SHA2568cd490aa33cfb692920b422d275aacc2481c23ac28d39dfc8644334a7a24d230
SHA512d9a8a2c7ebaaa261155751ef1b5fbd33002d37ae4712ed2ff147a8d00183546aac4bf3a8822e020beff0e7329e6ec8caaf2895dd390f55b459684a073035b240
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\ico_tick.png
Filesize4KB
MD5990387175950ee6e7205ca69ba54b22a
SHA181cc157667213486281e09e343a492d464360321
SHA2563597d9c7edb983c73dc7a49352a3781f8822b405338df08bc77931346a7ea877
SHA51222753fc1cacfe1e8ad1887635b7e776f1ffdcb68cdf626b03451eb89ce08d3e11c055cdf85eaf0c618e067c10d07126cd2d136b8b0565d74cb3af984eba15dbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\icon-facebook.png
Filesize348B
MD5dfc9fd42d5b37321918b52ed3b4f468c
SHA18f78b140774e96c1ee255d2f5d03c49b3613781a
SHA2564929d0b2ff33e77e2ce83907667157000726ef6463c9c798d6faa6ffadf6662e
SHA5121e1bc48ba6d240517624b43a1a7732893315775d6d8202eac5c30a92819835d6ae762383857a73e94ad3a16436a13d78ee0c180a28b8698eb1553969d529f0d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\icon-facebook.svg
Filesize1KB
MD5d9eb94b037c28fe6e3f7501eca0acb85
SHA1c6f259bdea67a6ef7111facc3eb22013afa7a903
SHA2563fe37b00c10fcf84f37e82315ae5bf4e895a598e6554455b105e87a1bbc7c5a3
SHA512295bc5eaddc07af3c10bcf7f779482ad1a5d0ef514386f4a68162746180b337211eb7328531fe4e1f4c96968828e87d31ee2dc8cc48ba7172a47402b1c1432c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\icon-tab-alert.svg
Filesize903B
MD538e2c64a7152a0f945ad017f5de5f2dc
SHA1c29a0c6837ba7bf11abacbe8037577091330a99b
SHA25613ff0e548ee018c0b696599debd453b66a69697883cf76bf738bcca31c90deb5
SHA51235c8b067abcd945405597fb44bd2e1d8d0cde1c76450970b8818e14320f4c244bae1f1de308dc367090df1a525cba66823772885a2a0519514b6f26d066feaf5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\icon-twitter.png
Filesize620B
MD5a5ea8f5764315fb6b4fe78c08374d12c
SHA1ca92b664750000c2b1751bc6076e21d88fab90f1
SHA25621429131a8d20a91367bcf989179c27a407a288703e9f0d5a083a17efc75e058
SHA51237549e299601c8a89e9ac3edb3ceeaec00b0579fbe8091fa46dc20cb1bddd525e49a35f3a63e77f8bf140eb55662812d9a249d8b6b7b5f604ae9eeb35dcc4553
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\icon-twitter.svg
Filesize1KB
MD53f5dbfb34d7b83ed182fd8e5cef2c8a2
SHA1553adbb234ce87fd9cdcfda49ed1f1763faed349
SHA2567e1ee1ddc297260c20f418ce5562cba892c984e4d35ec4ffabc59de1a29774a7
SHA512e3f4fa51e303065825db710d2c9d448681d7fb440f5e5ea3a63e15dc8c418eecb165bcfe0a3df532693a248475f865cb1ba1ddb88401a5ee23fdc5bef4eca5c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\info_empty.svg
Filesize874B
MD599214cb6cfb576ea571317f1253a799a
SHA1e913e4fd5b3d2b4885e5fca62fbdd2c011f70f42
SHA2566e64269fc58d3aa150fee6f72eac7eef391b414c794b1f6ad745b2039e7ac4a5
SHA512cf02d408d37589521438a3c65fe55e35d84aedbfaeadfffddd1f42ff72f9b1704cb12a21b611a9bd725624b55de4a84045e6c7824d75f229ff2ac679b1e0d095
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\info_full.svg
Filesize1KB
MD5c3bb811cc62383835f671df55787e136
SHA1fda83b89e87aabb4ea80de473c0d163867aab9af
SHA256dbde26f6347cedb6e96c6bf657c451d15896a0392d960cc7f989d640cf41f951
SHA512326e7c7821305b0c8055d858ca018052fe353d6c9a7cd4e9658552ce6322307fdb996395b8062f748c5105b2876a14c9e12c0b9377c309ad22df6427a68cf8e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\logo-avira-antivirus.png
Filesize840B
MD5e2db107f9448a33652e11c32dae61df0
SHA1e293903d826f13d46167d90afd8bdb64ed4a552c
SHA256054d3344e60e8d3e76150d829f6a7bd555de218a3bd57ff1b127c1a01575fb06
SHA512ce064889bb68218f28129a67ed44af9a5a6f8e331b1e58997fc2604c4e8d67aa023263f8dda8921a8252db72ace9d7c63c8059e8b8d588a690c4eb02001d566b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\serp_info_safe.svg
Filesize256B
MD59186187679112c42384c521136db2b63
SHA120765282093df3d82d97ff933cd3c08ba627d6b2
SHA256af7f5412f18ea3af7ec1f46393fcb875f88d37cd98b55bb4547a5f158c08bb9c
SHA51268929441dd39830d4ac36e8557d9c72ee9eecc3b84a4f62fdcf040a3850885f8ca991135d021a6ceb876a7301c5858acf9ecd08d5ad59586c1d0b8a252ed5515
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\serp_info_unsafe.svg
Filesize231B
MD58cc50dc5a444ebe378c4440f8d4b8fe9
SHA10518fda87170d17d601458dfedfcbb976344c400
SHA256c920a9fce3aa568b5604e57798395a3fe40a74ee2bf47c7edb435405e249738a
SHA512dd779fa1e21b340340ade922488ce95158004b60a53fda45f23955a58f045eb86817e1a0b4155ee05f4efd6d7f879fcab17e54c079698c64a8075ae90fcfdc7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\serp_info_warning.svg
Filesize437B
MD516dba44567b599779c8e16b81adbe0c8
SHA10b8ca6f931213baaeaaf5cddaddd9e183927d3b2
SHA256d6c72240ceaaa88e4ba8d5767c1de986c47ba65782dc159c863d6d459ec17025
SHA51241a3660a75247a4cccad05afd6f5f6eacd92618b2b138196e34aa82653d5190b6403b7cb4a8df0636c976b15265f0b76425b731c8820615b4012b69bd4d7286a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\tracker-milestone-confetti.png
Filesize6KB
MD59e79b9aafdf25646fd3b5b6ea75a61c7
SHA1e71b4130eb3019a3b7356e3c6faa0318ba7d3c77
SHA256bb66e678fb57e2216d6b595b12402afccc197b7a4cdc013133541510884dd64e
SHA512c4d008a1d41548abb0c27beabc17dee827c74a6fd1f155c053fcd4c60a431e9f7a13a073dcf5afc3b72ad8fd4b786924e5f81f685a663f7a6cdc14fc9ffe7be0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\tracker-milestone-medal.png
Filesize1KB
MD57b7cfda26d9e37359c6e3e36cba333d8
SHA1e35a64770404722bbd90e2df6e2370b61b21b5de
SHA256918d521185d8fbafe24c2b151b7b6a8d0939a454b14bdb18594e6f90a7806edd
SHA51233a67fa61c594293846d4f57b66821a4fcb50c1b734b84fec7d2a5858fed57e482966159f4869895e4c7c3b6c4c881ce1b1c8bc7cc2e86c5613c4929b73a5859
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\tracker-milestone-medal.svg
Filesize2KB
MD51e89bf2d0bbce7df8472f46f8b4acc7d
SHA19192b23c47c174227a9d308c21f1ff3aad0d71a5
SHA2566f3e6c9c71314393bb919fd98e586d0819fb1accc4ed01662ff3f2c75220a61e
SHA51239b9e779997f14445487a804cc7dee87bc244159f1ab5858cf305672b5857b6d314ed0749be0aefcd24cdf6b5de1158bd71531b2600e3ed0f697b6b0c31da070
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\tracker-milestone-ribbon.png
Filesize1KB
MD5dc7976dc0952eaf15101816cb6abd2fa
SHA105282b84f7eba5593e2b1edb1ca66dc5d8fe4591
SHA256a39905dec7e6e5a521b8553d519b5cd7aced1f15603343eb6e4d666530fd3744
SHA51295bc4abfe255b47b1c4c742cc9e7cd7b79349e45b874dfa58c5020498006b446cf7a41f277e83a736d1d0831bba2d10608be0e72dc52680c08e92b5c2daeabdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\img\warning.svg
Filesize1KB
MD5d60bc06c2ec496fc59a76d60fac11ed3
SHA1a3327d3adf65d6df6032f4c0e30bb96ba7261cf1
SHA256166e48f491c2cf4858544208342972d4bb7391d24f5a45a2156a37581eb8c1c4
SHA5120caa088d4c14f8c59c58f057e9278e5a7cca640f5b22971a6b7b3110aabd91c9107fa027c55c1ab23d35979a66e9e917a55b006ff2695a997d068418e40faf93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\absLog.js
Filesize9KB
MD52b89745ecc5de4e13f1fedc43482557a
SHA1ee9101dc206971ff75f18589d0630caba7f480be
SHA2563eda81f84ea2b76545e074d33b55023d781b80d72d2601b234ac9d609486eff6
SHA51232ae9fd14a5ce4c2e8639429162a9b9434ef205b3f4d538c7db7dcf89c0c819c7e09b0be8b67baf5f598e5a4a5049dc7375fd846c344e0c7c8de62eea0dca16f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\background\background.js
Filesize654KB
MD50683bc8a30e5c842dc69834cd7bac0df
SHA171bb1b2f40659e2a52ea810b6580be497a5e8029
SHA2565e6956f28c168c98459b1e3cd6c79aadab906e3d36b2a328da0155a2c9a6b277
SHA512f09938cce5955e2c17b4521ad607a2a7cf40a3c9387ed8c4d2bc05bff22773d1b2550360949c14f291fd4e131625173349d0b9480473699b2f4cab843080d4ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\blocked.js
Filesize208KB
MD54bbcce3657c1e18acebc06f5b06efd6d
SHA1dd72dce88228ed524805cb3389a30afe17f33e39
SHA2561784c13c352e0894f635adc49feb978dffb9e297df0463475973fcf28f0f49f5
SHA51237c460c0c8212b60a6aa05921c255c17d19eb163431e205b8868eefed9f59cd626f6b479ac5902ac5940f307db5497311eb9c61731608cd502b43a4b5c87cf66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\content\about.js
Filesize45KB
MD5f233e608bc4e2a77a532683a824ad6a5
SHA143d1ff919c1f1ed9561427bc8db8c038fc3f8a38
SHA256d88784529791b189ccc07e6a8da77342fdef534b7c1d4aad4d4aed573211b512
SHA51285b9f960f7ab8167fd212df72ee36455cdf1c8f2caeb30448ecec2f4d55cd8948d7a904b0518cbbd7f4d7f992c9328edf69b4cd226d99f9cbbb942c648b9a810
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\content\app.js
Filesize335KB
MD50e7d00902415353e9d2f26baa1f406a7
SHA1aa2b666e59ca4e1bcc67ee1d6ed8e66c54c5c3bc
SHA256218760626cce8aaab50ebf8d4a50e4fa361048ac210382811b3680593270317c
SHA512b38d75038458d66a60ebef0a3ee11bdedc451869d18acf7b03d479ee3fa4c9db1cf770ecf8d775382e308c085d1fed6ba072602a8076042f616ff94f4e37574e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\content\content-safety.js
Filesize51KB
MD5a5e71adc2dd64778b08ef86d4f3a0916
SHA115a7d9c605212da688f98962de89b17b1d6026d2
SHA256de4a6d7a43e25e94b8ee362d6ffca461067ee096d2981b7c84895fd363bd2d05
SHA51206cfb3f8221535a7b393364181483fef5e0577d9fc8376eb2398003d3ff597d87ef5cf2f6b05b36d5d797d120cee8935c7ba7bea6f770eb7b8024da6ce13a89a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\content\trackerNotification.js
Filesize177KB
MD54f5ae6f0a6ba1506293173ccd7771033
SHA17088679a1c10846a4dc52387fcae540faa765121
SHA2560be4261b6b9c4a2d3643875aa974b00c838083f628e0c80524444da662e0353b
SHA512d6f04f83a40951ce54660ce1fb98614d303130a948a168829a64c46cd9e71f78bbb3b3dbe2ffeeca751c0a09d242593e6ce7c0097354e43fe4ef300f579af1f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\content\verticalApp.js
Filesize332KB
MD5b73f7bd62220b9c65578925cbee1afdc
SHA1784b450b310c76acb222f62cac9bbdc311f03024
SHA256a65f64f7a053d9dabc2c38a7fe3d847161d1c7840ac28b9b74fadaeeb9f3899b
SHA512a01d5402a8f0939ebdd9638218ff6f9ddebb625d1a7119a6f758edb7271134ed178b87863d41835445a758cef64a5d87a930a7a354f9c166f24b14bb8efe0f6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\modules\offers\content\iframe\external.js
Filesize10KB
MD5e9db2c42f256276317d2a5b8a0298227
SHA1594d0fa32a319c48ec3df9757e09f790f0670c74
SHA2562f9155a3854d87ee4fb9ee6c601f6b0e8b3d82035e844ab7a474f9e3eea1ecc5
SHA512b461c32f0227050914aeb9b9f65633241885e05ad318a900120dd84566e90a6e791e17a4f54e56fc3b691f64b7804e9de1bbe20af47ee7b2d38c0a9058407226
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\popup\popup.js
Filesize357KB
MD58d977bcd481571f1a0f2afb96ae29bbf
SHA180e9c458e3af9cec62dab4d493b83feeefbde161
SHA256867b688b0ca8e66dbb6f98b9455a8bcdcf7e1c22e8f7a6d4ae0b8d14bda0ec33
SHA5124efe04ad875e0ba81fe13d08cbed3c9e58531f4ace7bb9b86e0f4f70223de47218633618753c17d35c42f69d04c5d913101770223c88c400a3e4448ec5042142
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\js\webRequestListenerWrapper.js
Filesize1KB
MD50aa31d222e3e532d08dade874060386d
SHA19f70f33d57063ff00be4a42b904826f0439508bf
SHA2566812d26dea89315371c21370d25d2cf702d2648459571f25c2c0aaf173e8198e
SHA5121abe07a44c5da2bb5ea15ad4f663fb6237a866d40e6f6bcf04fd976af0b1e351c3776f22936ce672e91bacc8c9fe8213ef8805130f7a9095fe0cd95c6d3d8526
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\offers_js\cms_ao2.js
Filesize22KB
MD5c3c1b39922ad43546db6d0e25259ed1c
SHA12212d82a25efe009f4bd2095f0615c7e6cda52e4
SHA256a12fd518bdadec21a2dcb06c5af2bc42491c4b118d584622d9b383b8fa2ec7e3
SHA51244e6e62a962669184cf5510232484e371a2e9697cc913988bc1f7c360f9894129faa31533fcbb6c116c226ce64084bbc93a259242e12a926137928be94e15119
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\offers_js\cms_aon.js
Filesize8KB
MD59c32a76bd0a53f822a2636d05128caf0
SHA1a5269df2021deb7e53fc6a2e9a096269446d520b
SHA2563b7deb17b3868e08e3b0d0bfa55988e66a1e59bfb2d22479941ef856a35779de
SHA5127d0829ba3a6527f0352892f03365509d06207e5dc15b3942c5cc63905e763826dc9bc4d16a92094a496905844dee9260a4b3c111988cce051b304d459201e5d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\offers_js\cms_ass.js
Filesize8KB
MD5eae4adf3bedc7e449fe9ff1a83cda946
SHA15fee2aa4ff51fc307c554e954713a37b23ab4dcb
SHA2561cc480d6702efdfcbf54a1408fe53cb84749a4ede31600b79ce2c697684ba03a
SHA51227c06307a7009b9c35ab1c7a36b0fc28bc04ef0e8a60a1db419b7a7e3cbc484cef5bda95dc7f7eada74d9dcbda62694ad206464e1ab38ec608e51e24e8c59ee9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\Temp\scoped_dir3852_859409213\CRX_INSTALL\offers_js\safeshopping.js
Filesize92KB
MD50d0f8899de5aa533ad82e135e0bb1cef
SHA15e61091673e64fdfc7352e8277fe1806c9bfaba4
SHA2566b42f062b3d29d10554d1d688b61a549ddb8cd72d3f6945c62dda03359d253f1
SHA51204301400b4bfcde4dd108db6d979299993107aef20fd0a4d05c20e074aa5d9d17d7fd45fb1a5e18c90ae0e4c167002b5942e27800f13558767d44e98b3d4fab1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\caiblelclndcckfafdaggpephhgfpoip\4.2.7.2353_0\js\content\content-offers.js
Filesize129KB
MD5ae174ef8fc9b5556d35cdbb66efcd3db
SHA1a6e0f69591618925063cd552dd2e6b1e8e80ac43
SHA256e75eccb2a78b3a8448e52d03d22e6c2d0489e4e429f0e5536370f0424fa5b56e
SHA5123d552c1eda031774df63b6b0b4f6815ab5c83712e5a028fb9b3e8fd7848ed3b69ed6897e5972f40625034544f63de3bbd3b7695512555d996de9ad29f370b56f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\caiblelclndcckfafdaggpephhgfpoip\4.2.7.2353_0\manifest.json
Filesize2KB
MD5c53baa16050867e10a4ca63e54395085
SHA1809f1522b9aad15092c9d8ae48870bc00c01eb73
SHA256f8cebafa8009406e5a1cc63355c102a8a3a839e93b12922d7345973ca2c0db11
SHA512f5a488d787d4a6a3b24026a1a91cadc249f5914c00e6e9708da290b36240de2a572f87c7691909b16819b0c2cf842f8921ddcbfd8117c1c6f105fe2eef16093c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5620b61bf12e8e24c3409a63f7209afd8
SHA1773c163ce25cc6190c037b02583d808135dca39c
SHA256c794238023241682957ce85a4299376ba125f41b8250caaea5b28b55cc5491f2
SHA512b1bf6f8a985cdf4f1032c36c42f05dfc2b4c80277f4a47d5e189f4d70d7fdd159df07db648c0fa8a6ac4580620189c8cf28cbf00419dcd0d264fcff23760cab4
-
Filesize
4KB
MD577d976005dd919a37e4f4dc9a7ce206f
SHA1c090591a9fdafc5b02be9761465ea0fd881ea05e
SHA2568b3703f595e89071adb58ee1b3af012803790892895ee6ff560ee0eb25e17af3
SHA5126a3e45039ec178f733f34b9fa4644556107e10b61629140a9cc19abe827dc58881256ce1cbb025c5588b726e80e2878038db0d2072dd3a7a71a6d49aac2dd36b
-
Filesize
5KB
MD550520c77700fe828446d10eb75d31fcb
SHA1709c7e5468688618e0fd70290bc52aa5e8365b41
SHA25641e80b9692e06706382cd09078c26db57e78907d273054c41f0c3231b55426bf
SHA5120b26617b4b463c8c5078dab71ddf382b36f8932d1835dd5b872d74bfa0b49238fb77de2425d01e74d65d107f9a44ffcc06e7ffafd932a68f268e0b84fde137db
-
Filesize
6KB
MD5feb9c3376ffad89e571d9fc9656a8668
SHA155d29d984bbe8460f12b526b6d7dc3911f1ae07d
SHA2563065153e61dd2f6f8af2ac271dea01e63aba15b67b5929a25a18f1a18027c1a6
SHA5122892c5a55384708abda44538556d7095379b2ecab4d5143870157673a5fa1cb3bfa7aa77e4a5841e158a6586a62cb31c574e783f7a1b35cda6e4b2fc6694e83e
-
Filesize
5KB
MD5a787d7238be5528dcc90ba4cedbb6ca9
SHA1d5a8adf53869af0d7cb96a330ce1a48705f131d2
SHA256ef5cf75014818db1961332b70dc0e96a0fa2fa9204bf4c5327b735c634f5e3be
SHA512adb8aedf0066d84f0900fa66a02ddae23cab3fe5e073bd2843416b07c1b1652646f7327be0137d9357f0f66adf3858d5d0b7e5c619c0b186a2dd41a4bfc25c97
-
Filesize
8KB
MD5328e31f98f922d620b0b0d45c948e3bd
SHA189bfb981f3679301b117799f2508314a7227f878
SHA25633e8923d88b8006b8f7c80c6f187be8d8e9a226c55299746dd67550daf6ec931
SHA512d0b9e2a4a5fc19cfb749afd03e3fdf7d3c2fc7de61c9d9287da0e6d5eaae819f0142e7da6f1567bc819276af570304ea91130d579390bcebd3038bc3631c7065
-
Filesize
9KB
MD57cf3fabc209a33cf832cb4d0c6d6f154
SHA131e52c2726f73739dcac53c7b340a30051e35f4c
SHA2562c69104679f271119e6e1b12d8b8b786ed0bdb480bd7772ee4d5e69d02b70043
SHA51281b5d43801ffcb10b82ba7d3c0a3ea45f363646cfbf962129932a9aa37843fecc73ffa64013e357f9c4d2f62ba394c419a342a1692447b581e9cd080516c513a
-
Filesize
5KB
MD51b3dd0e1a940aefb85246b17f5af191d
SHA1becac8f1b4272896dcad158003d3635296351762
SHA2569bf523ee7b02b21db87dd9ac4b9da165783de8d6fe3cb73cdd5f49392b6ca265
SHA512e9bc35a1392cbfe1a6b95fb9de649009866befc48d8c25a1c4b9c1787d9bbd617fa03e2982081fd03c6c77ac70d48ddd893880b6382027cd9d12a3909f4b4cc2
-
Filesize
8KB
MD5b01e621023c3742aa363e4f68b961452
SHA13ef30dfc9e2773cf0b8b847ea2aef52d1c09b1e1
SHA256b7a831c121f8cbe72f96afaef699a0bd9ab3994af21f51ad9d6d5d36f5a7608a
SHA5121f65eba672b2dadd4720110cc5868dfe4ecd867cd7502d11e78b0f4c1a68419e176697f41f116a8f34197dc3e33d1403357af6c4640fba4054c2ab3c5ed521cf
-
Filesize
9KB
MD5d452c759b4f0ad8534afc1bcdb808f76
SHA17e78a721c48d934372d67f1224bc1f6cf4b288da
SHA25638d895a825c1e12021c054614b832359573db55dbb132dcf8ac39f0f07d1e651
SHA512917d13d0c0a48040bf1a47c969de4d143d4d358c64442484d9bda64fb9b1652adb4620b12016f4ba2cb52c6e2596c752dab8886f91470a79c0ac278279829e4e
-
Filesize
9KB
MD5530461c0ba6a6d7d6b19607cdcaaeab2
SHA11c01ab24dab27425f2f95e77a86669d820d199d4
SHA256257ebfee1a7e141d78e69c03492a8109e41d0cdff929610a2eaae2e32c9db812
SHA5122c990f8e55a8a83aff197608e3cd54104589d2ce1a257d206aea07834bb981fdf908a4e709fddbf3fda6e74e327329a97aee045700bcf9f38a4fbd376b25b943
-
Filesize
9KB
MD509f0d3b0c7722ddc29b74a56f73ee388
SHA1334238b2a9d5d3f26374115d8eb93084d74f167f
SHA256fdbdb494f13d5f4c5746121f80c7dec2ce527dc3214b24a80e327afd4bb4d5a5
SHA5128b9b8a0e8c39599dece9fb9d2bb5e9842535978f8683af62342740000071c81b3ae69e40f1fd26e797cb1c964a39063464398a4747dcecc13e0caabda9c1f5a5
-
Filesize
10KB
MD5ca4be1b0785a84334135a73b30a14a29
SHA1eb783b0ef04736886b83880847f53a24da6ec5cc
SHA2565c49341ca93d80c5eea84a4492c340ee8de91cf4bd6b02648ffec4eeaf93963d
SHA51224d5556495c7525a842b8cc0e604083f2c57b88c3d831f3b7131269d6bb1c09a12ac88abc4fc2293b40a072edb191cd530a0919532ab7141e5081911e0bca0bb
-
Filesize
5KB
MD51690da2300c8fcaa689b69f0e08a01fa
SHA195bfcb03ec4034e8fa4f30cc9d877803bc201052
SHA256d835a46675e16706422121eb2286b3ddc8d2154f082ff7ca88b25617a0607578
SHA512bb8e8dc53f11a6cae1afc8d1ff5ad1c27da9704d55eb54efbdc102f0c69346834ae900c39b09ea1daa237fdd3b912b0c9109a2c19d9bcb4e849865127451292e
-
Filesize
6KB
MD541a165f2845617f8448024d208b430bb
SHA108ae22d4af91f707912c9cec3d9ae5b02814f7e4
SHA25656e8de80b6aff6bfa41515e0fa5e88c97f579139ad83a3012efa3c88bec4956f
SHA5123009f2e06e51923e6bc7fbc6abed3fb05425aaf6d459cad061e720457b13b0d0d19e9c2e7d130a8fc6a20f7a9e13c08fd9f7dba4a856c334769cf27c98c4e353
-
Filesize
6KB
MD55b7d1325e3b666e88125bdec1dded8e8
SHA1425a27cc440217f1aadf4c0db0cb845b5680d146
SHA256a91b0df4f13355787bd07f641d805fd8ecb23cef3c55174d4d9d044efc5709cb
SHA51253b6437cfadec440f5a257357f1b4fdbccdf47506861f88c907bcbbffccca5cb22f6834bb853343ec9bd7d664fb3e246ee77a9179a48cadc8b43e2bfae5da7b4
-
Filesize
8KB
MD5029426402f4808cfe1cd517b78339f72
SHA1233d306fe3d4581716010dbf88e2383b05e1ce12
SHA256b40510cee257cb1198d0374d601eaa2b6082faef2012ad7a7edb4959e98b2ed2
SHA512cbf19858697849060252d15071846f7d6725f594bb5859f8633686f4395fca1651f4d72bd7a414b883b61f72f461a4704f9781d0159d7ef9f9e5816a1c4e2311
-
Filesize
9KB
MD53455a43cd78e74e9b22188ed9d1c9373
SHA1c8b76579d606f4cea3f23f11821928a1e9319174
SHA25649e6e9685bd9ed5630139bb4c54594a300c32b99c8b65d0165b3e6ee66020fac
SHA5127035ad7da4bdbe89c9df629a0f59fd8b09f181260b351b65040ed74a31fc834b77a23c836920f8450146d730811a5814d50c4abdf3b0cc9cfb43a9b292b25024
-
Filesize
9KB
MD5c5a007b7469753845244768bee3d9f1d
SHA1e8e6f50ebc27000486a90d30dd30a3fbc0167be3
SHA2564750f3d6ebde4424c54cd430ddc1b354673395b0569aa00b90c3c988123056b1
SHA512cc67e3d271540bf8866682ac99effbba6ca2980eaa05fb15b2ae6f66a526030c8f519b85d7c6b92df5086947153e9e7562d8c5387a5721adb3ad1d8f857eb46e
-
Filesize
31KB
MD5fdac723898937732a3e6e596afc5b57a
SHA103efee62355aca014b902fa11312c2432c009c25
SHA256b9a9b92ce91cf874e943ce44ae6f22cd8ae10ffe54d2ab26a6a6f353d5d8cd21
SHA51220368cba5b09fef4db2fc2e660a7276879fb9708e91e80a72ebeebce2e8aea7bb489fe41b50e8ddef5de82437ada060dca249fa29d2493f26ece71dc0e1d6ad5
-
Filesize
4KB
MD555bd90a0a23be1b73ca4fa140ea240b1
SHA19c2a642558044480432a538bb3337b5a6f3ee371
SHA256b644df3cdf29bc08a12cf12b38a7a0f114558c5b6878ad3c713aa264c2de43e1
SHA512350dc999988ba465d4caad420f23d281d898714fd0645160f24c05ce965bcf9e84d3c8338fc1aa0caabd30cdf4d1bbca47156425be385786bdd3ab3c1a85591e
-
Filesize
4KB
MD52909331568de7cf34bcfec56909415d0
SHA135b66fadc26f00f81a8edc97a257ff4efca461bb
SHA2568cbb44e236fe4968086a4f6d818d174d82dd92b558ccd6f866052e09e2594c5d
SHA512a6a68bed691ca43a23527563b1dc85757a5de0379a1e150a1b995540a957f7ff4a51edfa67b48b4a56099d7ccfdb48640b317a41bd541a7b5dda7415c741d6b1
-
Filesize
4KB
MD5b24da26a874c776082b97617da346a76
SHA17de24c078245f6b50688aca5bdde14b0d1d8d866
SHA256f93603700310dc008013edc1cd3dbeb712318fd33e7cf1a6d566fa0bdb80dd9c
SHA512bc82ac5bdb317f3e29f9566fd8216995073ac96177b31a4da8a14e0988fae345a33efbcdc1faeedcbe32d075a0d8425d0c2225fbe1c9292d78ad16800bac19cb
-
Filesize
4KB
MD5a9c5821258fb7c8249ab5d9c769a344e
SHA1c2a3e400c603ab43888d52b034ef42178daeba28
SHA2562f4159eace3d2eb9e68c0ca8279747a75479217b4b1b208e6228dd8dd3cbc746
SHA512709071d910a19e88430c53f23b53c946745fca748167ec853820f22f8d7a786026edd2b585f5c94b75c153d9ae32445b8e72948138d416f589606fb75cf2b816
-
Filesize
3KB
MD5d0a66f64943474ead76c535f180554cc
SHA1dde81a00e13567c9979f0499d3e4890b8a9af3a0
SHA256f19df22d9531882b029d1af08868d3266b08fb6556bb710ff5e6fe1c4c6b4e09
SHA512d443f3917f4ed8f435228be37f93152eb4b864854565998256058c8e6ba11e6d86805d0f576b56b508f2330723b5c4f36431610b0a91f8c740c34332970a8564
-
Filesize
4KB
MD5125b1bfcb9be633c2a5bba9f531181a8
SHA18623029bb2fd511ed4070734a030182f693dc751
SHA2562099751d4bd7c85cbfdd201901c45b7554d9ca9e185b6e69be9d3260f26eace4
SHA5129b4ea332ffe98221246ed35da8a75605b970a9c873271908c960addc78067cffade5c3eeb78f546c6102361deb974ab6865db1fc211a9d6c7684dcae6431514d
-
Filesize
4KB
MD5e9dd568047a5591c6cdf088e3b7540e5
SHA1e8feb32caa098e4fdf9f669f3fbbeeb9f9df0e4e
SHA256d5e0a5ea1f3b3dc7f1b99c0a7300ba1aa6b7237c87d8173349b58bcc7bc3e925
SHA512dcd63c941299ee4149cb5f9179c94ca55b8681e14fca044aff4d6d69b2ad22a6fe2b8c1155aa6c8d4922f57ca5a8644c332782cd68a8ab785767860df046abd7
-
Filesize
4KB
MD55f7e759d71d3dce60e92a2bba5cf2fd5
SHA16385889cba48a0994f3c925426b6799133176a0b
SHA256f4f1f6d92e53ab5c8a26ea54b5302c208e8ecc8cb6725c35c576cc68872f1c23
SHA51265c8ae1ce7240c36a9332fe834079b7552c18ee832654781e08fbc658b42cf591766b2dfe5d476e9f8f4797c248518e7f24ae2548b8fd2e1e6dbb67a30be6e69
-
Filesize
4KB
MD53cd8ab4ea7a9e83966d618c5057a13bd
SHA13f43ab4cd81990049d6037e86aa8fb3b9899ca3b
SHA2565c32f08bca589efda57d697725b323bb9c3c1995b51ce5c322866618da9ae412
SHA512a6320adb51cebf385284c2bb4adf46b31dac146e521baeb3058a9e637a408e347939b19cd98d7bf5dd67eee6bee7167b19690ef0175a2a4ed35d851cfa484d14
-
Filesize
4KB
MD595bdc151c47183ac05e1ce70258f39cb
SHA15c87571782b6fc6ec7e4243f88fd76857331f1ba
SHA256a0c64d9fda7a369fce9c36823310d8767fb55e1c2d2f4eb41ddab5977318b12c
SHA512f833dd7e35f8e7c37e66e53c0a9262f4a06daa3ed1fbbcf9143e476d5b9436bc59101a3221849d85087f4f237b7a3bc203387bf09c80e530e6f174e8242dee4d
-
Filesize
4KB
MD5521a8a83e0d895b7727c4df9e2c06cdf
SHA102cbac3e75f8be519d27390aa8f4d56ef8cb7ed9
SHA25643b3eeff3b479b22405fd2c59d88f74da0fa0bd26f3d77192eaa168d57c5ad6e
SHA5126d4bad5f4a5de3af4ef40ce2dbce32d3cedc4e34423e1cf75e61670bfa06f87742912f465621387aca738d62d72be8c92e34035bfd04c90ca70244e374d08b43
-
Filesize
4KB
MD55347e9dafa55d3b1195b1a7435c6c6f4
SHA1dc851d46df0ed907da4364b582cbaba73327b2d7
SHA25677f73017740849016b86547cf35478aee05f0215bc78cedfa02e22e58874c429
SHA5120359d81e014b8ae5fa62d3dc01126f60bed710d51392000e40720a4caa1412c2312d307eee5a40a94f75fc1bef5d46d5d88f132a639e3adc7b47e9f32fbacc3e
-
Filesize
538B
MD5ea4c81b7262d3ea566b016a3ac8264f8
SHA1bbae3acd04047c9694c12a7a8466fc453141c30b
SHA256c407bf4f6e9064192ddeaa8da9e6972caa07e3865b6f8415ee0445d76039a28f
SHA512d39008fd25cbf01b3a07126c2dc48257634e5858e0b8d6005342cee6cb7bb51d232df6039898107db6944032ede5c1667089a86c2043a2facb6fdda94dfeec41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\05021cf9-eff7-42ea-a3dd-ab4b558b07cc\1
Filesize5.0MB
MD5eba07a223ea44e572b5f7fc529f35cd1
SHA1d98670883ef1443895a6c0462c5fb884b57710bb
SHA256271e42d4efcacc5a729b85a30b96cf6153ac574875e39079a9519b4c3e1246ff
SHA51225df6338a77ceec59f016a2365d4817a0720d68a3bd916bb9f2fa3d20fc4230a620d661f3c13e9f68cd06e2002b80674cc7f2e72a8dab44284b653fb75fd2b50
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f63d4047-f3bf-4d60-b163-606950e68fc6.tmp
Filesize4KB
MD5dc98d1a9d03915d960670a930e33c4e8
SHA1a0da457b012d40f6f5e1cf376357d717630b4068
SHA256ea282d36ad11a9ae41e4ba3732ea170bcd8ec2f166783691c152c382e3f0c78a
SHA51240ab0b0ee39560bbc1e8412e7097363a6d18e2fa5e0603de2373bd82677df08edc6a9b53befe64dd65483436388112b96c3d345f9a32965c4dafaf56b441ac81
-
Filesize
10KB
MD5ed280f4ffc3314074dfc47f384901de3
SHA16e8f61b95c03f56d0e7b27cd71d635f90dc18c1f
SHA256677057a5ece029327e807e6c1cfbb036fccf3ec55dd56b704d60470f2c154001
SHA512a9bdaceba72c72890186f1e220cdeaa25e94fcd99f52b2153bad224e51eacdbdce832558009dee3ce1ab6182d7963d9cc7844347959537113ab4d866cf225cd5
-
Filesize
11KB
MD56a8a101d8c7afbcc6fbf67292a7c28b6
SHA1ab8c27b43e8413ec61b39bbaa91e0c60cbce39da
SHA2567271ce78703177d54bd33b705b16b6921712110ab6f0a2a990744ef69089f99c
SHA5122f0509a3d64939edb7d7a0c3ff6254a57cb1e4fcba661f275340bc5c9870aede1bd854ea207e75ae729a8bf960cdd43b4eae435edc24e9f6b67e09380ee26e00
-
Filesize
11KB
MD581dc000c76d8ac14deb13ad81e0ee7c8
SHA196b7753f6953564612496c33c8711859cab1ec02
SHA2567cd43b932ce8e6caf5d577a034006eeb3306850e214f7b41879341e3e6a6a1a7
SHA51269b6c9db4f8fcfb81e84228b0b25e26d2d3bb7367c3b0351ab5b3c5af4a2e3f8ec887af9b8d4fe95384ae2704742d50c0a6e454f9e94c46ce41e10c34c489e68
-
Filesize
11KB
MD596c618228927013cb602636d85c8e521
SHA16c876052c6cba4a86ee64e9f1677705dcb8a796c
SHA256a2a995d91db027226a9202c097ee7390403ebfcd988f8608ca25fe5cbdcfa712
SHA5127a61fefcb421b8a8b0cedf5d2bda63f0569caf9ff2b31c6e7ea7d71f3260b977a0d27d83e2e349745c740438fb4080f09627107489ee3da7c125de89e3967a19
-
Filesize
12KB
MD59a5a4913eb8301d8e7f9435b3847acae
SHA1422fa44bced363335f9e02758c7c5cbd65dd6c9b
SHA25678fa99a2c3b026afbac40ef463ff7ce1d62ae9ae5f923efe48d2d977a9c66145
SHA512177e1a7a9c19072264ba1505046e5e5fa9b99806a1b933a6c2ef72fa61aa1d1ef351c445a6b9a8471c0d2c0b1e5d096349e5679f3468cec31a2334f51a57ea55
-
Filesize
264KB
MD5e08e3d9c064a779bb12cad3b9d9f3277
SHA162fffb222802316ffd1acc368805e1f7a12a912f
SHA2565b706ce7f548d92eac3a9d4e7ebea4f0bbff6843415faaedddc5d72f6b4c7552
SHA512b81365d786fdb2179b263c11fe9db2b93330cf4c7a28f84e63083b60f3a0743d31e761f3f3ec80cb03ec765da18f5110a521ed6906a155be2ae2c8cb22657509
-
Filesize
6.0MB
MD5eee6dca4c125f2e092faa4a2b4b9f0bd
SHA1072714f3a8dd5e2d11557517cf9f2e9431a02ffe
SHA25699ae30040ecfa2d330999a2941274f1040c78702a37bec84cd7dfda6746b7ff5
SHA51245ce967f5d9b829a89c709696ec62452cc24941c8b47d8b8d9e28824ec37dec6588de86806da75427c9d8a69527bca519c44eca6bb5a428f5d1274c8f276a8c6
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\679e6460-ffed-4c62-8d20-d52bdf2cb55a\avira_system_speedup.exe
Filesize35.2MB
MD5607875e5abf25c91fde4881a72122f52
SHA1bb8ea4fba8fc142d0357c3249f4c2b7c737ef194
SHA25602d51295990c48d4418362cb3e9cac190804ad39d76faadd23f6f476f53a8777
SHA51244c7a58d3a6f00dbe811741a964c662d9c9e12520bf5b15267e13b80d5854aca7be45f4ac844f2318148cf8fb11aeafeac613ed2f6e652365658389bc3faab27
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\6a307888-94cb-498c-aea4-4cf665de672e\endpoint-protection-installer-x64.exe
Filesize244.0MB
MD5ab82952a4fbc82e631b6fedeac31b538
SHA1f782d17c0fd72033c5956b2af886c0ca66b21a9b
SHA2562a89b0c996933d7b9e53066aab28ccd92fdb56e9df6a5a1a4497d75d796579a5
SHA512a57418cd4145609753961c25cbe7911236eea7f482eef501220aad11c92e4df6dada4ab942313e3b7a750387f2d772ac7acec8734893b40df7c0700f72167239
-
C:\Users\Admin\AppData\Local\Temp\.CR.12356\9aed911c-de13-4516-b63e-49d3b800a96a\avira_spotlight_setup_pavwws.exe
Filesize33.4MB
MD52f595d6de130fe2d68671274bd0b0b6e
SHA10653722080c1830866ef7e924bf26acd845f2493
SHA256fe5f80fc67ccbcb08ef9ba055c35627beaf6cbd025a92076b63d8c3bce361c0c
SHA5128cd34f13560f4b0a62917de831ffe6ea308f008e702f078585e8be716e03c2ad30cb5819c50c93fec827883969c01d452e26a1d5acc4ccbc1b438e2aa425e600
-
Filesize
16KB
MD54324f9d29d0f69b37cdf292665f87dea
SHA19a19ffb4e88f8485da383ca88d0117a05f016fa3
SHA256924c665f53ebc7dae424356fe99e65b90e63bd8b5a6eccac9b9098e70f4ecde7
SHA51224fc4fa1c947644fc67952a03d90d46d76340d438e54988b358cc9031866ca47b15fc5993518523a83522974e1d87360bddaabff25b20d20cb7debb2afd56cab
-
Filesize
68KB
MD52d3dbe2d0a1c9598c86b12b542ce8ff0
SHA1af186460251a91c41fbe26172ce0d492350d7e58
SHA256d9a96849098c4cb4aa1d8485a6f539597a561fa9562409b722690297b7aba185
SHA512ca0bc6297d03b0332e8f9beceaea53b349939f2728ce82dbf2bd0dec18318e7a2436e6f2a99cadfc69576e446404e8fa2fbb6317909a0d39652c3aefec6e2c6e
-
Filesize
28KB
MD5e47e729a2d40f1a04ffbc17c9f736808
SHA1567100762549e609f30b532a33d69e669a0cd566
SHA256ad91643f9313ad7b85e5327db5a1a4d0716be199777ce3f62fab083093534163
SHA51284ec3540dedfb341536af5edcf65b17a24e6bfb2e7a7990ea844d762e3a69c8116a05740ad2467618afc5b2124690ccdcefd969bdd3ba96dd07809dc1521c805
-
Filesize
420KB
MD583b0855a3a88a1a5958dbd6bce119d7e
SHA1a99da461cd9998d17addc8790585bf5a034badca
SHA2565133a4ffa2acf3ca099b9e2968c0557e42842a6e9d078310ad2021e620202c57
SHA512a846f3451ed7edef437f10789e8e899fd130e1f8e57f2885f62341c8efbc759b919b98210c6b8e0b8dd4412b1eab812ea67e7ff28f4c93c6811fa6780267e8e7
-
Filesize
367KB
MD564de70e5caf962d56b52c77726442380
SHA111a029c67e151b925232c53babf4694de0ee2b63
SHA2564d481eb8cbe270c384fa4e5703e39a370f3d5c8e49c61855cea55d626229a3bf
SHA512c5abe4cf002d9ecdc8fba8b790e8855b45d29cb9c0814a408fc143679d22a6a84dc677af5896c7b5fbe5929896f7a66d2110202571c5a2fee8428c06331417b1
-
Filesize
1.6MB
MD57c68d940f5d3344a3b2a874b34260761
SHA19c84a7ddb1c5e888248ebd72b25822ea2e7c20d5
SHA2569bcb9fa66f71a81bd9bcab842be3f485f0a1768a77cb28a1f34a5b367db48daa
SHA512c044b9b3b5e06ee7f1aa47bdf634a3540eb45265791c828cfbe03fa3708af40a3c06977a40b57bd773dc19335668f04b7381f95ab86c435bbd3afae8a49e3f33
-
Filesize
165KB
MD58d673df9e5fd8fb8ec671345af53c072
SHA1cf7caf96666f6d72780665e8ee2773ad6d74a675
SHA2562a889f1a7dd69178bd76e5db927e9f92c60a7ec0e0d04861322e4f633d61a28b
SHA5125857d6443d025263f64a5ee88709e59a8e6d1d111b699287fe85f02b1d8b986ef78a200120cfc9cf385eb35c72b45d99b9fba81feca74f36e736cea7d4d6558d
-
Filesize
204KB
MD51d5c5b5264ae7ed868eeb82e2be959de
SHA1d89d2675d1062025a5aadfa5d7f7103504bd8830
SHA2561d88207d2e39d5804788c645fe5c1e3f83cf9c9e1dff6405d824fe808e0ff517
SHA5121d2af9ecd910e993950c89a1a8eae7c8cfe22404012e3ca5f35f8b52cc314b4a6f2b6c8f81254c2534d2b7bbca358fb16129f50f00a0df2934265e542db74e67
-
Filesize
435KB
MD515fe9c51056f1b56d147f3674d3f65c3
SHA1202c6101ef20259a07f00c619a10fe4f954bb782
SHA2563d312f14d5995fe1731497e8defa402cf36f48ca514e23f9d63d9e33e351ca2f
SHA5126a58f0be22e1d21c0363cdf2da0b6a46750b3d1a58da727e3ca138fee2d22017a726a2ecab8a2a5a99b80a20000c4edf4a79ba053d7ad61288fdc0421cd469b3
-
Filesize
69KB
MD5dbe4da6a000aadaa9118568e36ade98e
SHA163b0f90bd1c72f208883d3749c9a90680fe2923d
SHA25694b17590329073b981561a7e2e395ba013c06987c7b56ab2f77527bb632b8b5d
SHA512146fd65c4c95af61ff8dd42c97f00f43951632a1135d27ca92b54b527d73beef8292ef51eeee6a2e66c6b1c196abfe4d5f91493a5ea28e802d3d4fa4b1ee8112
-
Filesize
32KB
MD5561b5afeb747ebd5ef4fadeac8c6db95
SHA12e9faa0051ffa83df0930a83b770fe4e74c42795
SHA2564468138ab065bdd64508edf745a784077f2c2b108dd8abefc2cda543578ce9f8
SHA512f592e74156303014a43bd6a0053b87c21d22e95da611df5a1da52ab04b2f4eaca95f03f3d557ad70c47f9ed9a7f3a4fd770f3a4484a59796456f2c8702454189
-
Filesize
29KB
MD5db03b914499c3cd44892a1bc32f94454
SHA14366d0ecb233b3866041da859db4d769c31acc18
SHA2567a979dbecd0348738a236822cf138ca60e0d0f245143602380dce538f9a08deb
SHA512f681ceaafb1244c610cac175b780287706122a3052bb399121b62af3d87a45d735566d590bfbc144b2b352a5b9e8c85240b2841806f1e60df0f803e772b532ca
-
Filesize
159KB
MD5fd153080fe5aa65a23d2fec5a1bf3919
SHA1e97cdeb809a9b27490c8d45fc2332f347bad7055
SHA256f68e7d787b5b2f63c7dc73bbf197cf95b0c0b9cf6acf9b49f8fb4862cbda76cc
SHA512d306879bc911ab3732c53127949333c196eb8a64c1624b5207cdf5a89f360cae55782a1ad3d3895f88e67bbad752beebd537c7c742786d3353cd5de6e8ab7630
-
Filesize
179KB
MD52399f2f5d18a1b9375ce39e50353d4f5
SHA1cc53df13011480bdc309a51266fd09c53708bf80
SHA256f979debf1930d091833768e04193a5c437411e0a28aa93917000f05fe3bbd834
SHA5121c71d9fbf32dc356f21c92bdd0c17c7d555ca72db412f2df25bdf7c1092f580c855bb51d72bbba77642a3d81b4e48a5f6436809f29b3eeda798715ac77e10660
-
Filesize
254KB
MD57977fddab911bef04af6417a88a2b3e2
SHA14e1a4e0b8b65976f9efdd1eff5d11710b73a3390
SHA25612383591ce3b642687e068efa9556f3ca827d427b415919e05a5ca385e734ee2
SHA5122f594bb68a446bf41fb899c71b8f2a6a67db1b20917729f6dddadf7e1dac8765707476f2432a0f8a3c11b3db83d1746c385a724cd5595b472935796bb7be89c9
-
Filesize
1KB
MD549909fd7909fb99fefb1d520e8c33f83
SHA15645cc1bc642d762d09ab3458d40edbced045f58
SHA256b4c5651505e3aae8c25838f848dfa5181c56f51c659afd2faefec7501588f6bf
SHA512445edc4cc155102b597a4c488aabc590e20eca5366ac8a26004bb2336c7ab6fd4fa0458f3b28d4a352fb23c7a485aa450a1ab87e2d45684603bd49b9c7598aca
-
Filesize
6.3MB
MD52abfeac7ea224741f3e59988cf399685
SHA12992a6e26606473d14fa4eeaf995932a5b9fa641
SHA256391e3cd8a69c0b91fb6635441ca6ec45ef32accb1306ce9584baf62e62d2848a
SHA5120b3c6d098429b8b147be6fd61729efedc544ddad930d51f0d9f3e21e7f23b9d560ec0e12d24557ed84cb63fad94a618ecde2914ffe488e41bdafde80c5c0c842
-
Filesize
4.5MB
MD5f9a9b17c831721033458d59bf69f45b6
SHA1472313a8a15aca343cf669cfc61a9ae65279e06b
SHA2569276d1bb2cd48fdf46161deaf7ad4b0dbcef9655d462584e104bd3f2a8c944ce
SHA512653a5c77ada9c4b80b64ae5183bc43102b32db75272d84be9201150af7f80d96a96ab68042a17f68551f60a39053f529bee0ec527e20ab5c1d6c100a504feda8
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
4.3MB
MD5b102cdd8d737a4bbdb6f661361277813
SHA1a66c7d08024945dd18f8eede13781e24289595c3
SHA2561ffbe30a177463c76d6b48d92a0f4c87144d01d7a159463012e1377c36f69280
SHA512adbb0e90ca2e29aaaac7968b9af4984ffc012b7eb79f8d11cb3e1f4510c8a7240acbe75febc651eb489402cac2d037223870e46482bb45cf409242cc3e6daa46
-
Filesize
2.4MB
MD54836e869155973d6994b6086ced71f1a
SHA12f36c3e925667501475fa00ca3879822ae5ebed1
SHA256310665f71a31a563c9a94d1ca0d2229d3affe1fd2c1537e104fd62e23d7c2be1
SHA512abf3c7e4e0f45ab6fdd29b365c3e1346e4adea4148e162ff455ffacb9c68a72090701348cda733d249b0eb45097d1fd2b3fc6cb61dc1fcfb3a8ff994b50b3728
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
213B
MD5084e6401c611027c7a37ced03dc4cad6
SHA1fb43defd1877aa79f7721487cc4dea82763e1f32
SHA256b129c59e3a5c93071f454754c4e9c9a985ec86f9426ddc1a781938dbc6047344
SHA512a9c896612d57dee55503869f6e91c68da3029b2b083ce2a672fa1875ed3153bbd71341c4df2a060c17c90610cd403e24546ae364782a62085c3868e118d0a3cc
-
Filesize
235B
MD57d1f1a13ab9860f983720e6fbc3bd93b
SHA150911a792e81c14a376fc32a22ccd22f0e05aadc
SHA2560c27964dbb0e474e06a06cbf50c5720058a9c3e6f8dd69c27350bb47f59af2fb
SHA5129940b947187abec73c154f59915cc36bc916ede860c907bf591fb71696878840eea2d1fc7fe012dd6ca7d7e8a25af545374747226054c877a2704b3e82cfa49f
-
Filesize
208KB
MD5252fd89b64e3d3ee049e24098907716a
SHA170c2f95c7ee683bb4b7b563fb606ec16fa612d3e
SHA25626eba787912ef87717430e78b53dc832bd6290db089c742526933e8d8711f660
SHA51220d35a34598a5465fd2e3ba4e5cce61fc2d0d1ddb7f8165b98f7b30864b9dac9b0d2eb9800e62593b60e4b8afed6297fbd2da3f54011c02ce0284d612e887dea
-
Filesize
10KB
MD5869c9f7ad6d54c1e14e94b7fcf90f6dc
SHA159ed7c434f978caf6a6e0d7d59e9d8286e89a351
SHA256755d8a77d768cc7059cf32c28ae7a25d6d54a5f4b9841384457f459d18cf38eb
SHA5129c7bd91bb20403742f6ef03314732e8f7a426561a59ab9ed8b3316a704d623147d5de3f46bfd7d8e529d93048aa877599dac555f669fb920e719dd7a3d332ad6
-
Filesize
54B
MD5b176b474414092f01ce861f9da4bf2a2
SHA1d175c77bf023434e6bdd14697d12653a4d397755
SHA256e61a1a270d678bc281c6d857da661c2b9ab77dec18f2723dcc106463e1911c63
SHA512692fe6310ef028b4ee7fae0d363947084fc1bda5d95b3d9f2c52882e02e75fbeae88b6fcbcf7e954400eda5f66634a45bf2eec022da1cca19cd64cff9600842d
-
Filesize
4KB
MD55c96abf57abfc0c8d233a915d8a45278
SHA1dfb82a20642c8569408cc58e1f5329f4bd530e3b
SHA25698b0a8047168a3c7424df463c1959578103360e8ccddd76575da1ad4addaeca7
SHA512ff6c9d771be44ebbbac173135d86b840c74f0bbb2f72992f2151b9ad034c22a2da4e53c89fedbe68d0a31292b325e255d739d47d291fd3b614d18df9caf301a6
-
Filesize
173KB
MD50fdc85565c94032f4dce86a7a787b8b6
SHA117401e40e8d4e255abc54b655e902cea6aa38979
SHA256a07ed2044e8cf301e20489b27940818bfb7d77338fdfdb8e0ff7554d1fbf6a49
SHA512f61ffb25c80081657c59cc4265f02f53b0d16ef4dac6546327f6e8f6fbf36b1daa246d22f258c06e8aa0eab873a434d66584314f076c37418d6a1c7d60bd3c28
-
Filesize
5KB
MD54672ef0eaf7515a69409c9c0fd3e62bd
SHA1ca920038f11d0ae10069b87f0ee32260a0d0f523
SHA256593ba5536ea92a87e55004874648ff12f096c71bc4dc81c084f0c59cf662cef8
SHA512304c5f7440e6e38127594892d993c740ce338f3b12a64923ab6793936126d0f68df27f83d0213f85926a15564ce84e81401e06448ff8fbb0d92b871db984e526
-
Filesize
14KB
MD57a3e8afd3d8a6281c2e4ec315ee78fb9
SHA1c08cda369d09232f4beb9db962a3ee21ef016bf9
SHA25692e5d77400aa83415876f5a8d78c55c27bf5d47a48b99b73cb36f0088cee2c5f
SHA512aa77695cabe2c9d6fd8a7a68735fc7152c36ba649f49c876d716eadadb99a474cdb7ead4c4a73abcf41c0b1d40a2ea7e218956be2be790ee0abc1a05801bc8d4
-
Filesize
88KB
MD531c7feb42feac79c49c294d7e2360786
SHA10bd82189e7dcdec830e87fc70f775900db706f6f
SHA256dc007e1b0c1d61d2ed7c00f7c3c4deb9831a1e622fb1cd68900d9bd330d38e24
SHA51252171e3dda6cad189929da6ab44eceae84872e7f70d5339cb85855d25c6a9b5d035a32c71d33cec72d324f94b695e4c9cc55c23299c339dd216713364c757a34
-
Filesize
52KB
MD55eff50079fc107ded28bfe8cea8a8687
SHA1c9ed85de0c4162bf3b575571ec8877391a2a9f66
SHA25684fbe1ed16cb1614d369b40a31b63de5c3e5bf0305cd7d9a16195ddcb8637935
SHA512817ad9b4e6383c8085763973388dd0fb620dba69e2897cfd3f95a69efb50e939a359fa713c939131b74c513367db1e88f16f7c35e539eec4ec3bc05e85a60536
-
Filesize
1KB
MD516aa6b7a57ed00862d0106da2ea9281f
SHA1229472fd4759a6ede4acff8c5841b2922ddb5b66
SHA256ea2299d44948ae88d95e31cec8677f05a2174b70b896465ad787e19143eafe6f
SHA5128b3a3a138a1ab98658502cb90a3cdd650e7092b1181477d86ecfcfaee18589178f714688a58fe2c924b46f834ce29faeacf0fb3413e1dcba0077739f8b47f301
-
Filesize
1.8MB
MD508526c43dba41d8b40d98c4a33e3850b
SHA1403baa8e261b93f83a22c577d39f53c108cbe9e4
SHA2565616c3955183ef70cf911cb72f6d55277c95dac4cca5fd19edfa14b2d657977d
SHA512a3417ded6762e544faa4519c20823829b7a135fe3fe9643f2d63be1d67adc508b194d7d7672006d24b9b3560be32e0ed635c0b6a1f649f0a96ae93422dfc0ff6
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6
-
Filesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
Filesize
2.8MB
MD5cce284cab135d9c0a2a64a7caec09107
SHA1e4b8f4b6cab18b9748f83e9fffd275ef5276199e
SHA25618aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9
SHA512c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f
-
Filesize
183KB
MD53d4e3f149f3d0cdfe76bf8b235742c97
SHA10e0e34b5fd8c15547ca98027e49b1dcf37146d95
SHA256b15c7cf9097195fb5426d4028fd2f6352325400beb1e32431395393910e0b10a
SHA5128c9d2a506135431adcfd35446b69b20fe12f39c0694f1464c534a6bf01ebc5f815c948783508e06b14ff4cc33f44e220122bf2a42d2e97afa646b714a88addff
-
Filesize
2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
Filesize
2KB
MD5a56d479405b23976f162f3a4a74e48aa
SHA1f4f433b3f56315e1d469148bdfd835469526262f
SHA25617d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23
SHA512f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
Filesize
6.4MB
MD5cc6e9e404056010e5c9959a0a72f77de
SHA13e6178adcf3a6414b78443852f4a7092d760635d
SHA256e2e67d0d9e2f6bd577911a81b261e4d5381d4461e01af8496830a97b55262cde
SHA512b24c4ec0f8b8b2393def441743c781cb869ddde70abe23bdfe3b57e12295ba82c791f8ebad797d4fde44045cf21f018aed83e376f300c2ccd422f55367dad4c2
-
C:\Users\Admin\Downloads\avira_en_sptl1_1673084256-1712411253-1712411254-1__pavwws-spotlight-release.exe:Zone.Identifier
Filesize26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98