Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-06-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe
Resource
win10-20240404-en
General
-
Target
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe
-
Size
5.8MB
-
MD5
13b3860a2827e505cb6de1418f640b16
-
SHA1
d48f434491b197234337d6751166ac539e9dc650
-
SHA256
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1
-
SHA512
1a3e74879ecf8ea503d56a871eb8a526dbd3e145521b0ca21530b58e30c566ea64bc4ca2991ac16a975341e888357f40ab76912f1c684fbcd2226f280bca1f63
-
SSDEEP
98304:1ALz1JdBgUZrjJeVcqdYwyQ50Fk8ou3xUEBS9/RZJUGXjZvYHiUYDt:1AzPzgUZrt54Yj20Fk8oLEBSZRfUGT6I
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
setup.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\ = "AVG Secure Browser" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\StubPath = "\"C:\\Program Files\\AVG\\Browser\\Application\\125.0.25426.176\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Localized Name = "AVG Secure Browser" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
Processes:
AVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe\DisableExceptionChainValidation = "0" AVGBrowserUpdate.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AVGBrowser.exeAVGBrowser.exeAVGBrowser.exedbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exeaj6D82.exeAVGBrowser.exeAVGBrowser.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation AVGBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation AVGBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation AVGBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation aj6D82.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation AVGBrowser.exe Key value queried \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Control Panel\International\Geo\Nation AVGBrowser.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
Processes:
aj6D82.exeAVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserInstaller.exesetup.exesetup.exeAVGBrowserCrashHandler.exeAVGBrowserCrashHandler64.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeelevation_service.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeelevation_service.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeelevation_service.exeelevation_service.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exepid process 3344 aj6D82.exe 3180 AVGBrowserUpdateSetup.exe 1988 AVGBrowserUpdate.exe 4260 AVGBrowserUpdate.exe 768 AVGBrowserUpdate.exe 2516 AVGBrowserUpdateComRegisterShell64.exe 1264 AVGBrowserUpdateComRegisterShell64.exe 3860 AVGBrowserUpdateComRegisterShell64.exe 2352 AVGBrowserUpdate.exe 2468 AVGBrowserUpdate.exe 1848 AVGBrowserUpdate.exe 2896 AVGBrowserInstaller.exe 4084 setup.exe 1308 setup.exe 5064 AVGBrowserCrashHandler.exe 596 AVGBrowserCrashHandler64.exe 1460 AVGBrowser.exe 648 AVGBrowser.exe 4144 AVGBrowser.exe 3312 AVGBrowser.exe 784 AVGBrowser.exe 4260 elevation_service.exe 2376 AVGBrowser.exe 3676 AVGBrowser.exe 2512 AVGBrowser.exe 360 AVGBrowser.exe 2504 elevation_service.exe 2004 AVGBrowser.exe 352 AVGBrowser.exe 4484 AVGBrowser.exe 1876 AVGBrowser.exe 4300 AVGBrowser.exe 1604 AVGBrowser.exe 2616 elevation_service.exe 620 elevation_service.exe 3360 AVGBrowser.exe 216 AVGBrowser.exe 3076 AVGBrowser.exe 5056 AVGBrowser.exe 4492 AVGBrowser.exe 4148 AVGBrowser.exe 2680 AVGBrowser.exe 4612 AVGBrowser.exe 3604 AVGBrowser.exe 4956 AVGBrowser.exe 4108 AVGBrowser.exe 4952 AVGBrowser.exe 4256 AVGBrowser.exe 2384 AVGBrowser.exe 2308 AVGBrowser.exe 5080 AVGBrowser.exe 2584 AVGBrowser.exe 2928 AVGBrowser.exe 2400 AVGBrowser.exe 876 AVGBrowser.exe 2992 AVGBrowser.exe 380 AVGBrowser.exe 2492 AVGBrowser.exe 4732 AVGBrowser.exe 2792 AVGBrowser.exe 4956 AVGBrowser.exe 5028 AVGBrowser.exe 592 AVGBrowser.exe 5356 AVGBrowser.exe -
Loads dropped DLL 64 IoCs
Processes:
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exeaj6D82.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exeAVGBrowser.exepid process 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 1988 AVGBrowserUpdate.exe 4260 AVGBrowserUpdate.exe 768 AVGBrowserUpdate.exe 2516 AVGBrowserUpdateComRegisterShell64.exe 768 AVGBrowserUpdate.exe 1264 AVGBrowserUpdateComRegisterShell64.exe 768 AVGBrowserUpdate.exe 3860 AVGBrowserUpdateComRegisterShell64.exe 768 AVGBrowserUpdate.exe 1988 AVGBrowserUpdate.exe 1988 AVGBrowserUpdate.exe 2352 AVGBrowserUpdate.exe 2468 AVGBrowserUpdate.exe 1848 AVGBrowserUpdate.exe 1848 AVGBrowserUpdate.exe 2468 AVGBrowserUpdate.exe 1848 AVGBrowserUpdate.exe 3344 aj6D82.exe 1460 AVGBrowser.exe 648 AVGBrowser.exe 1460 AVGBrowser.exe 1460 AVGBrowser.exe 4144 AVGBrowser.exe 3312 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 784 AVGBrowser.exe 3312 AVGBrowser.exe 3312 AVGBrowser.exe 784 AVGBrowser.exe 784 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 4144 AVGBrowser.exe 2376 AVGBrowser.exe 2512 AVGBrowser.exe 2376 AVGBrowser.exe 2376 AVGBrowser.exe 2512 AVGBrowser.exe 2512 AVGBrowser.exe 3676 AVGBrowser.exe 3676 AVGBrowser.exe 3676 AVGBrowser.exe 360 AVGBrowser.exe 360 AVGBrowser.exe 360 AVGBrowser.exe 2004 AVGBrowser.exe 2004 AVGBrowser.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AVGBrowser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\AVGBrowserAutoLaunch_2539D9FFF1F40C0A976762D6C815D3E3 = "\"C:\\Program Files\\AVG\\Browser\\Application\\AVGBrowser.exe\" --check-run=src=logon --auto-launch-at-startup --profile-directory=\"Default\"" AVGBrowser.exe -
Checks for any installed AV software in registry 1 TTPs 8 IoCs
Processes:
aj6D82.exeAVGBrowser.exeAVGBrowser.exedbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast aj6D82.exe Key opened \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\SOFTWARE\AVAST Software\Avast aj6D82.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast AVGBrowser.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast AVGBrowser.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus AVGBrowser.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast AVGBrowser.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe Key opened \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\SOFTWARE\AVAST Software\Avast dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
aj6D82.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aj6D82.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
AVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowser.exeAVGBrowser.exeaj6D82.exedescription ioc process File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PhysicalDrive0 AVGBrowser.exe File opened for modification \??\PhysicalDrive0 AVGBrowser.exe File opened for modification \??\PhysicalDrive0 aj6D82.exe -
Drops file in Program Files directory 64 IoCs
Processes:
AVGBrowserUpdate.exesetup.exeAVGBrowserUpdateSetup.exedescription ioc process File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_bg.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\icudtl.dat setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ru.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_sr.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\sl.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\initial_preferences setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_pt-BR.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_sl.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_lt.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\GUM7A8F.tmp\psmachine_64.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_hu.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\es.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\sk.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\resources.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\setup_helper_syslib.dll setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_cs.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ms.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_sw.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdateBroker.exe AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\ffmpeg.dll setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\ru.pak setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\psuser_64.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\af.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\lt.pak setup.exe File created C:\Program Files\AVG\Browser\Application\SetupMetrics\d8d70ab0-ae1c-44b4-93a3-f445c78ddf0b.tmp setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_nl.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_no.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_sk.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_tr.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\v8_context_snapshot.bin setup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateHelper.msi AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\browser_crash_reporter.exe setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\ur.pak setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fil.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_th.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_da.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\dxil.dll setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ar.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_es-419.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fa.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files\AVG\Browser\Application\SetupMetrics\4084_13363399542614838.pma setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_en.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_en-GB.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_tr.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\GUM7A8F.tmp\psmachine.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_is.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_pt-PT.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\acuapi.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\vk_swiftshader.dll setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_it.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdateCore.exe AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\psmachine_64.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\am.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\mr.pak setup.exe File opened for modification C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdateSetup.exe AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_fr.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_mr.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\tr.pak setup.exe File created C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ur.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\cs.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4084_1768216644\Safer-bin\125.0.25426.176\Locales\ko.pak setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AVGBrowser.exeaj6D82.exeAVGBrowser.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aj6D82.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aj6D82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AVGBrowser.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
AVGBrowser.exeAVGBrowser.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AVGBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AVGBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName AVGBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AVGBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AVGBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName AVGBrowser.exe -
Processes:
AVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppName = "AVGBrowserUpdateWebPlugin.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppName = "AVGBrowserUpdateBroker.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\Policy = "3" AVGBrowserUpdate.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
AVGBrowserUpdate.exeAVGBrowser.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\hostprefix AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache AVGBrowserUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633997486398985" AVGBrowser.exe Key created \REGISTRY\USER\.DEFAULT\Software AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineId = "000058d4b27a012b9e3e4541471e6c69" AVGBrowserUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry AVGBrowser.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC\SoftLockoutVolatileKey svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\ AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\endpoint = "update.avgbrowser.com" AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineIdDate = "20240620" AVGBrowserUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\devmode = "0" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update AVGBrowserUpdate.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser AVGBrowserUpdate.exe -
Modifies registry class 64 IoCs
Processes:
AVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exesetup.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C8159E37-5EDF-4E6D-8E6D-E558E8DDC2A0} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559}\ = "ICurrentState" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB785069-B832-4423-B813-47F7422BA6E5}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A42B2494-93AE-44E1-B76D-BA8509A5167D}\ProgID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassSvc\CurVer AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.ProcessLauncher\CLSID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CCD3788-C8CC-4EE9-8DF7-944B7D9674F2}\ = "IAppVersion" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.ProcessLauncher.1.0\CLSID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FBDC15B-BBCD-402B-A45F-1853B01A9E3C}\Elevation\Enabled = "1" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}\LocalServer32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DD8E03F-6BE1-41E2-B931-A37C7D1C0317}\NumMethods\ = "4" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\ = "AVG Browser Plugin" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6CEBE594-0680-4815-86E1-615A6BE65E0E}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{358EC846-617A-4763-8656-50BF6E0E8AA2}\ = "Interface {358EC846-617A-4763-8656-50BF6E0E8AA2}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\NumMethods\ = "24" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\ = "IGoogleUpdateCore" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\ = "IProcessLauncher" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B02B2F29-8637-4B78-892A-CFD7CCE793EC}\NumMethods AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559}\ProxyStubClsid32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods\ = "41" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59577BB5-F97B-4880-B785-510238C5C5CE}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachine\CLSID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0C0BAA6C-52FD-4A3F-8731-F588C5E8F191} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{358EC846-617A-4763-8656-50BF6E0E8AA2} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A012A499-D8A6-4F6C-9E05-B02D58E3781A}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FBDC15B-BBCD-402B-A45F-1853B01A9E3C} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB785069-B832-4423-B813-47F7422BA6E5}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\ = "IJobObserver" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7BA03866-1403-40EA-81A9-23FCD97810E2}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods\ = "41" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B02B2F29-8637-4B78-892A-CFD7CCE793EC}\NumMethods\ = "4" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\ProxyStubClsid32 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40}\NumMethods AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4}\ = "IBrowserHttpRequest2" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-vnd.update.avgbrowser.com.oneclickctrl.9\CLSID = "{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebSvc.1.0 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebSvc\CLSID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CCD3788-C8CC-4EE9-8DF7-944B7D9674F2}\ = "IAppVersion" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4}\ProxyStubClsid32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E3700FAF-2DC2-4322-99B1-D6A51203AF77}\NumMethods\ = "4" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassSvc.1.0 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\ = "IJobObserver" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E3700FAF-2DC2-4322-99B1-D6A51203AF77} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{28E08968-59C8-4A77-BEBA-12C9394AE077}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{30612A81-C10F-498E-9163-C2B2A3F81A14}\VersionIndependentProgID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CoreClass\CLSID\ = "{384098DD-AB6D-412E-B819-2F10032D9767}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{079CAB07-5001-4E71-9D5A-B412842E5178}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\ = "IApp" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93}\ProxyStubClsid32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CoCreateAsync\CLSID\ = "{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB785069-B832-4423-B813-47F7422BA6E5}\ProxyStubClsid32 AVGBrowserUpdate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exeaj6D82.exepid process 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 3344 aj6D82.exe 3344 aj6D82.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 3344 aj6D82.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
AVGBrowser.exepid process 1460 AVGBrowser.exe 1460 AVGBrowser.exe 1460 AVGBrowser.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AVGBrowserUpdate.exeAVGBrowserInstaller.exeaj6D82.exeAVGBrowser.exeAVGBrowser.exedescription pid process Token: SeDebugPrivilege 1988 AVGBrowserUpdate.exe Token: SeDebugPrivilege 1988 AVGBrowserUpdate.exe Token: SeDebugPrivilege 1988 AVGBrowserUpdate.exe Token: 33 2896 AVGBrowserInstaller.exe Token: SeIncBasePriorityPrivilege 2896 AVGBrowserInstaller.exe Token: SeDebugPrivilege 1988 AVGBrowserUpdate.exe Token: SeIncreaseQuotaPrivilege 3344 aj6D82.exe Token: SeShutdownPrivilege 1460 AVGBrowser.exe Token: SeCreatePagefilePrivilege 1460 AVGBrowser.exe Token: SeIncreaseQuotaPrivilege 3344 aj6D82.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe Token: SeShutdownPrivilege 352 AVGBrowser.exe Token: SeCreatePagefilePrivilege 352 AVGBrowser.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exepid process 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exeaj6D82.exeAVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserInstaller.exesetup.exeAVGBrowser.exedescription pid process target process PID 4424 wrote to memory of 3344 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe aj6D82.exe PID 4424 wrote to memory of 3344 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe aj6D82.exe PID 4424 wrote to memory of 3344 4424 dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe aj6D82.exe PID 3344 wrote to memory of 3180 3344 aj6D82.exe AVGBrowserUpdateSetup.exe PID 3344 wrote to memory of 3180 3344 aj6D82.exe AVGBrowserUpdateSetup.exe PID 3344 wrote to memory of 3180 3344 aj6D82.exe AVGBrowserUpdateSetup.exe PID 3180 wrote to memory of 1988 3180 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 3180 wrote to memory of 1988 3180 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 3180 wrote to memory of 1988 3180 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 4260 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 4260 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 4260 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 768 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 768 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 768 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 768 wrote to memory of 2516 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 768 wrote to memory of 2516 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 768 wrote to memory of 1264 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 768 wrote to memory of 1264 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 768 wrote to memory of 3860 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 768 wrote to memory of 3860 768 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe PID 1988 wrote to memory of 2352 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 2352 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 2352 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 2468 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 2468 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1988 wrote to memory of 2468 1988 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 1848 wrote to memory of 2896 1848 AVGBrowserUpdate.exe AVGBrowserInstaller.exe PID 1848 wrote to memory of 2896 1848 AVGBrowserUpdate.exe AVGBrowserInstaller.exe PID 2896 wrote to memory of 4084 2896 AVGBrowserInstaller.exe setup.exe PID 2896 wrote to memory of 4084 2896 AVGBrowserInstaller.exe setup.exe PID 4084 wrote to memory of 1308 4084 setup.exe setup.exe PID 4084 wrote to memory of 1308 4084 setup.exe setup.exe PID 1848 wrote to memory of 5064 1848 AVGBrowserUpdate.exe AVGBrowserCrashHandler.exe PID 1848 wrote to memory of 5064 1848 AVGBrowserUpdate.exe AVGBrowserCrashHandler.exe PID 1848 wrote to memory of 5064 1848 AVGBrowserUpdate.exe AVGBrowserCrashHandler.exe PID 1848 wrote to memory of 596 1848 AVGBrowserUpdate.exe AVGBrowserCrashHandler64.exe PID 1848 wrote to memory of 596 1848 AVGBrowserUpdate.exe AVGBrowserCrashHandler64.exe PID 1460 wrote to memory of 648 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 648 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe PID 1460 wrote to memory of 4144 1460 AVGBrowser.exe AVGBrowser.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe"C:\Users\Admin\AppData\Local\Temp\dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\aj6D82.exe"C:\Users\Admin\AppData\Local\Temp\aj6D82.exe" /relaunch=8 /was_elevated=1 /tagdata2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\nsv6F65.tmp\AVGBrowserUpdateSetup.exeAVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dedge --import-cookies --auto-launch-chrome"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdate.exe"C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dedge --import-cookies --auto-launch-chrome"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4260 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2516 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1264 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3860 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgb21haGFpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHVwZGF0ZXJ2ZXJzaW9uPSIxLjguMTY5My42IiBzaGVsbF92ZXJzaW9uPSIxLjguMTY5My42IiBpc21hY2hpbmU9IjEiIGlzX29tYWhhNjRiaXQ9IjAiIGlzX29zNjRiaXQ9IjEiIHNlc3Npb25pZD0iezI3M0M0NUM4LUM5NTktNEQzNi05MUQ0LTMxNTE0REE1MjMzRn0iIGNlcnRfZXhwX2RhdGU9IjIwMjUwOTE3IiB1c2VyaWQ9InsxODVDQ0FDRC0xNzNDLTRGNTctOThCOC05REEwMzQzMEU0MDZ9IiB1c2VyaWRfZGF0ZT0iMjAyNDA2MjAiIG1hY2hpbmVpZD0iezAwMDA1OEQ0LUIyN0EtMDEyQi05RTNFLTQ1NDE0NzFFNkM2OX0iIG1hY2hpbmVpZF9kYXRlPSIyMDI0MDYyMCIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiB0ZXN0c291cmNlPSJhdXRvIiByZXF1ZXN0aWQ9IntFQ0I0RDBEQS1GNjM1LTQ1QzEtQTkzNi1FRTgzRkYyQUM3RTd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTUwNjMuMCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTI0OSIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNjg4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dedge --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{273C45C8-C959-4D36-91D4-31514DA5233F}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe --heartbeat --install --create-profile3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=125.0.25426.176 --initial-client-data=0xe0,0xe4,0xe8,0xbc,0xec,0x7fff891f1c40,0x7fff891f1c4c,0x7fff891f1c584⤵
- Executes dropped EXE
- Loads dropped DLL
PID:648 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2020,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=2016 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4144 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1728,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=1984 /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3312 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2196,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:784 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3328,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=3396 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:360 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3316,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:24⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3340,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=3696 /prefetch:24⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3676 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --field-trial-handle=3388,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=3832 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3856,i,6563554347983041096,13053199558011958096,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe --silent-launch3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:352 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=125.0.25426.176 --initial-client-data=0xdc,0xe0,0xe4,0xb8,0xe8,0x7fff891f1c40,0x7fff891f1c4c,0x7fff891f1c584⤵
- Executes dropped EXE
PID:4484 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:24⤵
- Executes dropped EXE
PID:1876 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1796,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=2100 /prefetch:34⤵
- Executes dropped EXE
PID:4300 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=1836,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=2392 /prefetch:84⤵
- Executes dropped EXE
PID:1604 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=2708,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3372 /prefetch:84⤵
- Executes dropped EXE
PID:3360 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3168,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3388 /prefetch:84⤵
- Executes dropped EXE
PID:216 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3388,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:84⤵
- Executes dropped EXE
PID:3076 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3412,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:84⤵
- Executes dropped EXE
PID:5056 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=2704,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3380 /prefetch:84⤵
- Executes dropped EXE
PID:4492 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3624,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3636 /prefetch:84⤵
- Executes dropped EXE
PID:4148 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3420,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:84⤵
- Executes dropped EXE
PID:2680 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3628,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3648 /prefetch:84⤵
- Executes dropped EXE
PID:4612 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3380,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:84⤵
- Executes dropped EXE
PID:3604 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3852,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3728 /prefetch:84⤵
- Executes dropped EXE
PID:4956 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3856,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:84⤵
- Executes dropped EXE
PID:4108 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3860,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:84⤵
- Executes dropped EXE
PID:4952 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3408,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:84⤵
- Executes dropped EXE
PID:4256 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3584,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:84⤵
- Executes dropped EXE
PID:2384 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3568,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:84⤵
- Executes dropped EXE
PID:2308 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4008,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:84⤵
- Executes dropped EXE
PID:5080 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4040,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4052 /prefetch:84⤵
- Executes dropped EXE
PID:2584 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4044,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3848 /prefetch:84⤵
- Executes dropped EXE
PID:2928 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3532,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:84⤵
- Executes dropped EXE
PID:2400 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3472,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:84⤵
- Executes dropped EXE
PID:876 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3612,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:84⤵
- Executes dropped EXE
PID:2992 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=3824,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:84⤵
- Executes dropped EXE
PID:380 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4144,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4520 /prefetch:84⤵
- Executes dropped EXE
PID:2492 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3640,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4664 /prefetch:84⤵
- Executes dropped EXE
PID:4732 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4072,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4812 /prefetch:84⤵
- Executes dropped EXE
PID:2792 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4952,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:84⤵
- Executes dropped EXE
PID:4956 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3652,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:84⤵
- Executes dropped EXE
PID:5028 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4124,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:84⤵
- Executes dropped EXE
PID:592 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4800,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:84⤵
- Executes dropped EXE
PID:5356 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=5408,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:84⤵PID:2984
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4960,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4024 /prefetch:84⤵PID:5700
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4964,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:84⤵PID:5440
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=5976,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:84⤵PID:5468
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=4956,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=6132 /prefetch:84⤵PID:5592
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6124,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:84⤵PID:3552
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6428,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:84⤵PID:2532
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5996,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=1064 /prefetch:84⤵PID:5756
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --enable-protect4⤵PID:2660
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=125.0.25426.176 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff891f1c40,0x7fff891f1c4c,0x7fff891f1c585⤵PID:4960
-
C:\Program Files\AVG\Browser\Application\AVGBrowserProtect.exe"C:\Program Files\AVG\Browser\Application\AVGBrowserProtect.exe" --registration reg-task --taskintr PT10M --runonce5⤵PID:4652
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --field-trial-handle=6424,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:84⤵PID:1400
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --field-trial-handle=6056,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:84⤵PID:700
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --field-trial-handle=4936,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=4828 /prefetch:84⤵PID:3724
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --field-trial-handle=6464,i,10458281021252099111,10163904265279943462,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:84⤵PID:5764
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\AVGBrowserInstaller.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=edge --import-cookies --auto-launch-chrome --system-level2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\CR_18B66.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\CR_18B66.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\CR_18B66.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=edge --import-cookies --auto-launch-chrome --system-level3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\CR_18B66.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{2FED1C2C-A30D-4D95-BA67-68A0E8DBA0B8}\CR_18B66.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=125.0.25426.176 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff7dd485390,0x7ff7dd48539c,0x7ff7dd4853a84⤵
- Executes dropped EXE
PID:1308 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe"2⤵
- Executes dropped EXE
PID:5064 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe"2⤵
- Executes dropped EXE
PID:596
-
C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4260
-
C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2504
-
C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2616
-
C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"C:\Program Files\AVG\Browser\Application\125.0.25426.176\elevation_service.exe"1⤵
- Executes dropped EXE
PID:620
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc1⤵PID:4112
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵PID:2992
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc1⤵
- Modifies data under HKEY_USERS
PID:5160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserCrashHandler.exeFilesize
149KB
MD5f73e60370efe16a6d985e564275612da
SHA12f829a0a611ac7add51a6bc50569e75181cdfd58
SHA2569cf076866935a0c64366efaeff2ec76d45ac816030ebd616fd5defb1870bc30e
SHA5122e44e87c285bb7b72d45c8119d08ea6f2d13cea77cf0005a3cf530790bb86c7f2df7c5edac9d86c9d7214abb224738c3bf6b31f6bf104051512bb1de133042dc
-
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserCrashHandler64.exeFilesize
170KB
MD5deef1e7382d212cd403431727be417a5
SHA1fac0e754a5734dd5e9602a0327a66e313f7473bb
SHA2567d410e9eabd086827b16c89ee953a643c3e2f7929616c0af579253fd8ca60088
SHA5126b472a57fb89b128aad9ab6313a9ce8b171f7d73264c67f669adc5cf1f0421d81f654dad1419b620476abb59dd54e1aa03a74a26c5c93813f6fb8575fbd97d4d
-
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdate.exeFilesize
204KB
MD5cbcdf56c8a2788ed761ad3178e2d6e9c
SHA1bdee21667760bc0df3046d6073a05d779fdc82cb
SHA256e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3
SHA5125f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e
-
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdateComRegisterShell64.exeFilesize
428KB
MD52a3ad7362e6c8808fbb4d4ccaba4ed4a
SHA13f896f7df7fe202f4a717713c503665bb4dcaed6
SHA2564dcd341907880c8dea840819628b19c5ea42ca2b5c61ad57147d0ac7da9b6759
SHA512892042ac713e4d5b488262a584355dafa18d967035788799c1773eb39a4616461beb9d79a230d9f85cdefd1b4076b8a5e1d4bde17254bff1f08c3eba56469679
-
C:\Program Files (x86)\GUM7A8F.tmp\AVGBrowserUpdateCore.exeFilesize
512KB
MD5dd5dc945cd848bf503862d0a68c3ea5d
SHA19b277a0c733ed5698b0656da8c3b99d2f90c7ef8
SHA2568cc98345e367b083f545ace66d93bf69e03a4fa08b84805a9925fa4c94ef3f8f
SHA512f6eab8422bde24d89a7723c6175b4197a50e18aa0bb5b8f419e5a23b265d85dcaacaf136b8f6ef6bbf2bd6c0eaecd8f86093f594fb98e596f4b39e9c6ff227e1
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdate.dllFilesize
1.4MB
MD504a6438c50564146e880c5eb9d57905e
SHA1edf5d454de99159d832cc9bd0d8dbe132d749804
SHA25626109d47bf9960e531888e6c545ca8cfc24fee2202b549df29fb8bf9c58e0812
SHA5128705d0ab2f8a6c1ef567ad00b33ff2cca01391b105eb0ade201d981f091e4ba87e709860ab9849bf9781698fb42ab8efe53ea731af310781766bace1eb1dc19d
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_am.dllFilesize
42KB
MD5ba03b29d5d44341084eb06bea8f1e702
SHA17d8dd7556ea5e299b55ddc7477ca758fe2c64f48
SHA2566a6aad33e2910c29a6d919aad074d89359c5e6723ced7ba4e215a62e9513749b
SHA51229f902587b7078deb12bee6bf9993748109749ec12e6490d5f84bc9c532a5a1f414149d5760641ef052611bf2d441423d115dfb5a4c4c6f5e6d6a1f386924cf2
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ar.dllFilesize
41KB
MD59c77be0843f0fe4864a04f8d5f24a593
SHA1be03adb4d3c33520e652c7a6ee45f09d5ff54a54
SHA25639547fa5d7b93856235288b1021699b4f36f0bea10b10d6b89ea184a3ad77bb1
SHA512f504c98b03a5d72c078b38a2cc4fdd94dbed159f5a2ed47c2c4a53fc6ec8a3b1fd969d5ad85fc7503e64427a36adee7a14f15f1275a9194103e43c8a8ee45d28
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_bg.dllFilesize
44KB
MD5c0b41217fc33a6a53ec69ae7399460f2
SHA1d7dd8d543b7297f1a1e138efa1806972c9489c3f
SHA256d75a1a41ad7e5277576e3bdf35a858be3a6f540d21c8ab4156c842d8f1b3295b
SHA51237abb726b78421aaccdbc94b358cda6b581e89ac519258eb39c6a7f0706cfc64c3a96f5c29539ba67c6e2d2afd6f10b6b0c063b54366c03376ce234d132a8253
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_bn.dllFilesize
44KB
MD5aedf6d96ccb64f488379bb1fe65f697a
SHA1901bbb7873d8f698f49c4b6be74fb50b353d7b5e
SHA256941d22186ef1bfe27052e78d21944d6088cea152d1ede51452f04fb032c92f90
SHA512d1d889a1fe75924f3569e07d9ee3f552afc02165210f5c439d4697be898b72db397bb89e7d0706259f92c1cb5759009f9e1ba5c52f764e63514b3da41dada1cc
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ca.dllFilesize
44KB
MD5f951cf3ca93e5ae5fc1ce2da93121d98
SHA115bc869406857437babe41cd3f500c356913499b
SHA256eb00cad19ed1d16f52928962f2cc6231d65eb74b2314976ebeb1ec860103e746
SHA512b77086ad2b39723d697d7839d9243c1c0769a2cb0f6287cd3f2d64eabd6a48d8fc2d253e9089c6586637ed5dc5970c2608615fe77cef5003f0c4d53401ef73bc
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_cs.dllFilesize
43KB
MD57f3dcd851645d3d75f636c8440fb057f
SHA185debe41ddcb46555a0d00795e41e460a35583c2
SHA2560b31785d1931580cad5ef16d4ff5723802d12c38b56746e70fcf91d71162e043
SHA512d0d21c397899aaa6a718b77195a6af1556309615616fd6583ecb84b04aa7087e76eb5fdd6cae0a4ff1c0f85bf72e1f51ae002042078095f640eb95da363889e4
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_da.dllFilesize
43KB
MD59a421423686559027e4301d36bcf58b2
SHA19669424f4e7c765ddb917a515d5a8b1486f87daf
SHA2569d8ff148793d99974fab93f38027e1999323a48620b303f82170751be5dd6b69
SHA512f5d62fe17a820323c4b1832cd3bd9c8fa291d44dceb88a8a1a8f94c6166e550ab9baf9357c5ec3388230bc75f0ccd3aa2d5247fa5d242013d22c61001128a951
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_de.dllFilesize
45KB
MD51c15851d9dd22e4ae3f3bf249da79035
SHA160fc5652b5e1c55056c961d4d3b961492cb3432b
SHA256a9dd72a08c0c58a71b2289d76efae681a5c8eb5faf73e49b873f15ba4050baa6
SHA5126da386c35b317f39613da73340631f927606bccd0a8c626537eda896eb32c9a2ed1d71c7cf838f1a4b90553f3f788eeb5e02fe84774fb0ad2f574bf4e4d7e248
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_el.dllFilesize
45KB
MD50d15748f01df49dae986f1e27dc098ef
SHA135a435bdaaf47795977b28cdae2e4ea1fdae73a3
SHA256df13c38061cb0b02dd8a9023a17da0bbe1cda6fdedad5203129fc702c7fdd9b1
SHA512290e9936f50e3bd11c1b9d28decf3b43f5e23bbff16801e7b0491690773d057b6bcdcf48c48a7ee16fa2400723b3e974e2b74e3899590a8e660c2e9c78b9d141
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_en-GB.dllFilesize
43KB
MD502465169cd873c4492196e03457f2771
SHA1837ca5e54a8c12577d0d05a32996dfc04067c5ea
SHA2564eb9edf550bf1f66382e5d8bd4958438891cd2ca46557d14f4b945dc176ec025
SHA512e73b5f3951050f2903b80b89d2b9fd9ebf69adb922eb8238ef4c01f413ae67727d7598d4ac15f7ac8b9257aef0139e0924c70c5898357142a303d7e2b15394c3
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_en.dllFilesize
42KB
MD5418853fe486d8c021d0cca2e85a63d63
SHA19504500a7b5076579d74c23294df4bdb1b7c517d
SHA2564cbb2591c1eeda32bcf295685c993ce4d16acc968697fa12e2a00a1b7c4b37a3
SHA512dc2ab4e2056e6d73a274d700bc16f75c7c687b35874029c1908b183428dec010373045d4a52eb3f5745f8b91d624cf5d40cd7f37e353f3a41348e2a054a266a3
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_es-419.dllFilesize
44KB
MD53e5971e8559c77e8901ce30d14034730
SHA104cc21ac4a84abd29f7d7585282345881fd81721
SHA256613418b8779f7440b88f1734d6c514706df9dc9a58a623966cc1c9ba4e29c28f
SHA512b4592b25cf676db6d6de1be811c39bdeecc24bbfd4dc72fa4b3f97de866f9b0fec7c85f7d56f048f61829c1d8b4109e4a0c7e14a9e410e30a6a8da702941e00e
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_es.dllFilesize
45KB
MD55f8ea18786d5ef1927cd95537abc3ae0
SHA15530650ecc719d83b7aa89e0b326b5698e8adda2
SHA256fa416294b078226a8919dbb8f75533a6ef96d63d5bd17aac854eae68791433cf
SHA512577dc7d19e4443e8aede759a781826c091c17d12fb06e89b1306133f21e01dab919045183a916e1b5647ddf485134a8459745a9199df5c7e36abe192645d8e25
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_et.dllFilesize
43KB
MD55029406d9202d6f2f279fdd3a06f55a1
SHA1dcca8bf9392faa0038c6cb5d25929726b16804af
SHA256cac545e04d701c39f4a730aec4c3dad177d8ea4baca10651f150925644874864
SHA512519538e05f8e21966e4878291692cf25057bba3c993c0034a33b1da7c9eb0a8fb881565717ceb6c1139fd601b73b1f1e2aa46e20aeb6b93f897cd2ef93172934
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fa.dllFilesize
42KB
MD58564514501256ff045cf7aa6c1b5a797
SHA140b9aa8d04c48fe2ecf193c2089418ccc938676d
SHA256f3f46a6da6c8ccb3ce7fdd0cb5882f45523decca95852b8c775bb90f8e92c1b3
SHA512701077c8a1c70c1bd0c35f54aa838dba7b7b6f832e0ef2776673092fca546276166c3638676451c9655086b740b9e193cd54f952fd5fca481b964083b881bcc2
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fi.dllFilesize
43KB
MD557dad7c22bd635a5af8fcdcd63d4e530
SHA18aa11ea5c1cacd9b23c29989f22e82c43c827d0e
SHA2561e0d05927a455115265db9308e0f78ffb7bbb5442f36b8483549efbe415454a2
SHA5124236609e37ec41bf46d0f45e228c9021c1624e2f98a642eab513d290a4482da13764fcc2d044f78ebdc09e0cfc63a251678d169cb33e251d6f6d5de9b96c31b6
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fil.dllFilesize
44KB
MD55ed0105f4043466a99557dde1f70e97f
SHA1c57c935cc4b25b6375ab3fcdfbb265f4c586ec3e
SHA256cfbe0120ddf8d5574f7c44c85488f53aecec4df9bfb25f1cefbabcad5af46096
SHA5124fa641810f758e0031388ec146467fc130780e2f2cc8495b6a2fff0679d7bcbe7526356f85a97b5338e84d791ba14e812b2c182fdae01763640be3324fb59526
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_fr.dllFilesize
45KB
MD58ddc3f7276c12ac407cadcda6e2a3e12
SHA178c5e802f67c8b6ae3fe13202e6a54d3cca69df4
SHA2567f2f0f9f443a022f5aedacc40c28d0654fec488f34435c75979118464256a8b7
SHA5120d05bdd2d5e9f36eb09182e8b13507ba03e256c4aadb77bbfedf29584a47fd1e0733a825a3f687d3058e53c8075caf6dd9d24ec93f1bdd58ca97106827323540
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_gu.dllFilesize
45KB
MD5a4061e8408cc59cb898adfdc4f173278
SHA1ae34e3058a40449481590bb3a63aa0225b4f6f98
SHA256e033c950ecc6333dfcb944e70622e77a6498ba0e23fd144117dbe9a2a0c15be6
SHA512d8a847e9a21c86c7b9b072e16914f42185e3c0e1d99f6ea5259382eb0fb89578c7a7f9f62f892f1d20be180dfc327bc076ea038057895c8b92cb1f0c053e0b2a
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_hi.dllFilesize
43KB
MD538525b8a1b15a8aeb4fcfc8bee8358bc
SHA1ac2ba33b8ad778a8165c87b579dad0dbef5bed75
SHA256271e83bc86e490cd5b6cb9cb34057c7684d233c56a53f4f553aa07507c9dae52
SHA512ad8df196174ceeadce4588dcd365066665267b922078d92b328ba661a4ebfa6d06b4263a4b8a28e4efb4d86e1140d71a3c3bf4b7b60970aa20552aa7f0c73acb
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_hr.dllFilesize
44KB
MD527c0dbd61a71420bb4d1a0be2373a175
SHA147b4c107b711caf5a6b2978bd6fd6b53ebdec5e3
SHA25643191a4c507a112e96e06f959b6cf78406bf970b021ad8d7db59d1b9c52779bd
SHA512d1f20e9a628bdcbd26b8d5de89b87bdbc8dab871651c86d47c023daea86c7ada0a565fdd05b48c7643a63db044639f4eb89d1640e58c9b32722e4926c3c5e72a
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_hu.dllFilesize
44KB
MD5114cc594fab2e564ccb24a826f3623e4
SHA1c3c3fb4ef6ea6ff0e7a1e0289320b2fd2788b03b
SHA256c89e223a42d7173f915dd088ebc84b0048cec772bd4221b4b90ce4c0e419ffe6
SHA5129a7eb5710340cecb2d32de26322dc862812e185b6d260d76c0c7f642f30cf9e43c88aec76b515148ef986db0c77fd0e31f71c8fd26d56a4cc72dff0d023abb5d
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_id.dllFilesize
43KB
MD57e7deef6ac35c9d52410fc356391c7e4
SHA143b3d918867a93ba109a3e4eacb45f3cd5c40b93
SHA256963f4d2ad7ddcdcfb6185521c0590a92f2014897d5f5f525471ac81f3807fc5e
SHA5129eb0e9be0a973693b4bd167f6c1118dd9d702b1951a90f0a3a6103e77c43ee6afa173b79d3ab21fe94a98c320b17ab0b787cf5b6ec47d9dde9e3e8c14b8cadc7
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_is.dllFilesize
43KB
MD5dae35fa037b6248876347521c5298566
SHA18358fc05a675ea56f720052fbb4b384d97b94d86
SHA256ce0652b8dfaf21b6192b66bf75e140b3d72aa545e0edf62d9e82e9b0878ac5c5
SHA5124158b8fef0da76ead12b5d6e421c5709664ba84d1ddde44ef6bbd1023084cad3820a37abea03b206635a945a2435b301234cf5bac3c8e2861a852b2699036ade
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_it.dllFilesize
45KB
MD53ae3106694098f8420b182ad5e3354ab
SHA1bc9dab621b03d4126b97c260becd7f4525255462
SHA25659b406b29538c3c3d0f060b5fc0ccd36556f8a6278327935a5475c6b21741dc9
SHA512f3625be57976083d642b01a41a53d6db6cad3bfc584a50de3565fe10975a5d7d2cf4f8b41bcdaa5ac70f8fc4ada113084de07e2ed45f26401dc2d4f8f4c322a9
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_iw.dllFilesize
41KB
MD531227325c8617b308ccd268c2be7e72a
SHA171e369f26e644e643fcd538d933e4087dd593f1f
SHA2564a98e34a528eff04c2baf4e9e50489086e58d2e32e1851f33674abbe5e104c68
SHA512ba8d94dde5b7b74a39ed54a5f3e47a558e0c1deb632018c82423c06806071143851bb1d8c7a7bada6f13e71734e7a29457f3741266972b777cded41c953a9645
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ja.dllFilesize
40KB
MD50cfc5b7b3f86d6bfaec9a0713da74df3
SHA181a278fdee9edc302fe4e7a88c9addb230ce6df2
SHA2561d7fd1b6a614538530385e7a40efc95d3b8be75057ae03bf999aa2419d1f9f24
SHA5128b8f834ccee41c69c581f0b80f26b0cdb536f87bebd5a6b1f02cdf6f1aea5cf5b29c356e82c7a8fd591bb16c0938a790ac8f90f6d27edc95fc48a5aa3c30cbf0
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_kn.dllFilesize
45KB
MD549000b4a101e635b05123f21b360b492
SHA1635f697f41c0591168e0eee10930728d9dec5a53
SHA256a2aab58a4397c040bff69d45bef4ede6842034bf897799a9347232c4b6c9c7a5
SHA5129b62c2048e9c132089cce7da02ea5c95b5856f1c6e28d5581f4a0b1748e681bdd78c7d537d273a64f9d476e4ec62da5c6021cc1ccb69f7bee216e7bec6ddc6e0
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ko.dllFilesize
39KB
MD5dd2f783c0017630f9a2969957f4eb84e
SHA1d42218de12a7c1c48fb5e7d60e61e32ce0cd9ac6
SHA25607e63e0e3d23f192ac131efc459c2d9f79a4ecdc39403d43fbff320c4b5fa261
SHA512689f625df8aec45a6343249739ec094cbb1245a9dd8847ffe6bf62fd2d7042d529f77216dd22e8b33830cf21b158f0ef6ea42af2248051c8d97205eb0229a22b
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_lt.dllFilesize
43KB
MD538606bfb6c9bfdf74503f833ee2733e5
SHA1670abd1279f642ec7b19f663e53f2813a716331f
SHA256df6c4228da3bf66929d81b99cb35df4a4389418490144630e1d9d5f422b56b38
SHA5126cc6f2fb0e5bf0241656cce5dc7311f05b8d79633f2176f8c172a9fcfa9813e3963576363d539fa1a8a58fa6bba138dd0baa7562274fbe99be5cda60f4671747
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_lv.dllFilesize
44KB
MD583c356f6310d51f8ffc1d67d580f5914
SHA1f9bc318975f288fa47e8426b4c450a93b10af45c
SHA25698e35cea7cddce15191594a70f8e15ff2dd1c02bde87225af0331441c65bca26
SHA51228a26cb1d88d072d7898ed27c3e9d056efedaa2cd9eccf951429f41df2c0162be3c14e58cfb4cf50b633d759825fa815a9249e7690d2ab75f60424b30dbe0424
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ml.dllFilesize
47KB
MD574e24332295807ca5ab8be9f37dd19dc
SHA182feee443e0c8342ef830c182fc2a3c98f57faf7
SHA2564675474b7ccaf45c9fca9c4d141260f233807ddc68cf854d0900bb1f58522b67
SHA5126682d18ed66b06f07bb6b1dc227808d5c872685ed271ff4b34a57d4ec7c7fe5316b6207d1094327db4e3166fc2288e47065cb72a275666a4b403dde8e33379af
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_mr.dllFilesize
44KB
MD5390c8645cb5e0f93054c063c5e5928f4
SHA10d17ac3976b3219750853715c06baa34e8ed751c
SHA25698ae5da68f38dd4e43e307543d3218d4180c09433ae72c3b661eb73591a7a589
SHA512b1bf09a5111890fa61dd944dbf0cf2804cdd96c5fee3193a80fb15cdc6fdb455fb4e535e8aec337ca4595623bef29c7f6784e53e222c7a5df400dc61965830f6
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_ms.dllFilesize
43KB
MD5d9999c911f60a32046d1a4c559ae5de3
SHA1e84c1c32708a97a81358dd8adb3fb40681f5a7aa
SHA25631a64ff7f0b1d8bb81e83680c3391c0dc5530c798b9322d11e62e2389933b548
SHA512eefb62c906c85a94025d79a0dd35b634a08b457fca57e2b97d514f1b5f0b9ea8450c9d387b4d9683c5d01d0088e03fd106b530470aa88229ab4123edf00032aa
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_nl.dllFilesize
44KB
MD5ccadd45844090d479f00d8707e962f35
SHA10654501881968cb2d954cb95da6150047c49c0c7
SHA256854804cb86a3059bec32d10f44123ff93060aae05eaa72821148a4e2764ace3e
SHA512098a384baf41a11a6e50b2d22e1c1e1cb2d9f5897776afa676b235f075c9ed3f404a92d4593c229e6ededab4da614b25e5cd0c73f3cb7e0ac02231cce800f7a4
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_no.dllFilesize
43KB
MD55a19716ac62f7b636d666ba166d00a3e
SHA10fa31113684f879e259f8521be08ff87286724e4
SHA25694365146ae8320732dad96344dcf6fa83d9eaf65cb7bf30e50613964f5a33e66
SHA512accfbfd86c4648fff856fafffbe7317907e19261ed81ce5e6cd9e5ad59ae9abbe677730527704a1b0ba898195dcc6a5081a136b4d95563863f05a8eb9fbaf9fc
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_pl.dllFilesize
44KB
MD55215164235c7dc3d72bcd0f832ddcd22
SHA1bde57f57953bf119b6767e0b56380dbf0e4cad35
SHA256c997f4bad6082c5d2483684b6a72d22153c502df6575e28cc1bf02789d08547b
SHA512721423ea189d096764088fd8079988cbbcd98503ae2b82b0f485cb71bc81cb367588a9fcbdc9c5d09f20067f5ec8744572d252500af034edf900243e096526c3
-
C:\Program Files (x86)\GUM7A8F.tmp\goopdateres_pt-BR.dllFilesize
43KB
MD597c200cbd682c1b4bd28222437d7f630
SHA16bed6312571ea79df6deda2934d328683674b059
SHA2563adc3bd14d6a1ae14de42ea501fa74ed651b197a7c8912b43d31fa92f500d630
SHA5128e1af6b73729f5f6e3015c3890e8ad28ed851d1615fe0ae2b7997f3ae48958fbc90e74ce70ce4ef35aeea35a810de0699494d5b913f4774416acc1aa8ef0a9d6
-
C:\Program Files\AVG\Browser\Application\125.0.25426.176\Installer\setup.exeFilesize
3.4MB
MD55c1c7600e9d86906f171e7d6381a57fb
SHA1ead88df2842757fdebc2d5364e00634cd6c41f49
SHA256253948a9a6d1c275bab25296dd1a9e8c2e6fbe1bb33b719f14caf2f44208489b
SHA51283605e6497f11c984483e3737901343a240373ac31bc1f1ad348d303a81147218d204e4ba8e3784b44c24cc3e24033a59b0337e1f5141bfedd96bf244cc3c8fa
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\25fa68c5-d3b3-4a70-bef1-94b38143be86.tmpFilesize
168KB
MD527e0a973f1449e90508c04e5a6a5b86e
SHA1a73aeda6a24c88cd513edb51fe82057888b33e31
SHA2561a1d3f226e1b5d6b13a15080b67865bbd624d8bfd9c4f8a2f7e35b029c6b39d0
SHA5128724eced195065a2bbb38f3fa940ae8b66202690e12fdc598a669574ffaee36d86a32e7fc608b23c83715f7859e6cfb556cc659181f7c90178b7241240449679
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\BookmarksFilesize
36KB
MD5471fee11953d0d3421f14db49a125570
SHA1175aabd230fd45f3a0fa192b9a7c2d346011ac1c
SHA256990b0c3ec490b4ef3a617dbb2039f0f9cbb16321994cb2ca14b15a3cce254f4e
SHA5120c30b0ccf8a07d4b9518433b4f5d3fd23e37e3d121386930ad227319877d4b5d90f4efe8817dd7f9b671a1c45cffb6b967163e55ed7cc89ee82645ed51243c30
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD5046878915709b3d973d4e58953c72a16
SHA1260874e405c9eb1e357d322c2640682f8a6298bb
SHA2562fb73d818c3a97c354a504322a6aab2d7af77ca3710a62f55b57b585e868c77a
SHA51299771eef8bbc4be2fb80cd4efe589d415e235679a1c6513ebc7eab2e386b07bc3f0832bb4546ef94e044a6fd5f3cb755dda87136d770a352f613ac75cfc694f5
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
48B
MD50ab602f6dff6badedfaa0fa9c1caf2cc
SHA1fcc300086348c02405ac115d282f1a6805364993
SHA2568109fa163c8199507a3812ac733319b40b4d23677556f06e61c590ddc428b55f
SHA51215c62e5b36768a508d57cbb0e4ead188072a549ae848062d5fa3a257df03d4023c25cdcf72fbe7e207a3503865a4c4054abae1f113d9b62ce5de9a22c6dbe624
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\GPUCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\GPUCache\data_1Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\GPUCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\GPUCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Local Storage\leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Network\Network Persistent StateFilesize
1015B
MD5e4cd60ab7e49893e1264c1122c32fd9f
SHA151d1042a85b20c4316bc921f2a2657b300b62cf6
SHA256c0580ce45c4388421e698d5615a78c9fe565d5d62ca4f82bb4a38097d96c180d
SHA51220ac291a5ce5bf19b7f47a58715e14044a0f5c24457fd86f902da49dfd693153fed550747d8dbf9334fa23c1cf82a8e00c1a62f0b8f337cdad6cc33e4255557d
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Network\TransportSecurityFilesize
188B
MD58091dd7cab50fa34abadffcce48c944e
SHA1fd6a15bdb28a159b6252f593a34b994033514b91
SHA256aa901e1eef6b172e1fc11149d6ffa16fdd0549a54c85e088ce9abd03d674c249
SHA5127f39cdaf8bd1d00bf46ef228e547d2dbf8d40999a0f75e394181099d2cbb7eb07d2437b23bb39f4948c578299032fdf0842fd81a7c771e06200cee5749121203
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Network\TransportSecurity~RFe5b0d4b.TMPFilesize
188B
MD5ce2df681bba8d2111e73ca11386329f9
SHA129e55e7355aa77b982bcd2d28cab5feaca40a466
SHA256ecb13f5dfe4fed14d77ce446c3ec4858a01a7542dacd71dca1beb660f192064a
SHA51268c772f06a64f65b8102b60eb006db6a938b282e04be4b3e02387e90baed8884be9f8fbf9706c3fec5f7d1b99aede600eb4682f421d99da5d5a93c9abd29ca67
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\PreferencesFilesize
46KB
MD56c1b74349d49a500c2b88cc9a5403409
SHA1498e7d31cf080fce9d2c99ef91b3917b614a322e
SHA2562376adfb29503454ec6c44b966320a8a56be864481626cb28e9772d8742e642c
SHA512ca317f88c5661ff780e999f327bc34b3938a1397bd709078f0fee945a90e75f98bca9e9af656ef80b134f6ef02a00a2074c396f97e8742a92f26e6fb1bf7103a
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\PreferencesFilesize
39KB
MD5ed8ed75c409399c575ba1dd169d7cfcd
SHA1eb0f1528547c5bc5e4311df40cb825e82ff1eeb1
SHA256c0c45dc293f9dec4ed7fcbfff3e53516092a8411f6541953142bd01cf7e7d962
SHA512fbf186129323f161e3088ba2b3711492858bac7371e16452138ceea4493fc62199ec6082547447e376bebfe13c96749269d6117c2e6752405cd22c724560e6fe
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\PreferencesFilesize
46KB
MD53798093636bee6677eeba3c28554398c
SHA17b7409f332dd1363948faa1bcdd2e73be1738890
SHA25648069ece51d49d6dc2c99de4e7b530586bf34c918181bf3f2379cbf576596376
SHA512b668c70398a0eeec1162914f136e50b035719e9f637779c981956c0e2d373d8db0941d8213ffa84ec048d9979b6efe39d4c110dbe780fc770877b50dec7aa86e
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Preferences~RFe584457.TMPFilesize
3KB
MD58511dc1a402eed3dc960ed7e6ac70698
SHA10a0102d9d7f721cdaf597800e3c55c5b0a642ed7
SHA256cdef4862e07ef3f2005d7f101daa8369f3f1256fe941ed412333a75cfd490a7f
SHA5122e8805b4808b6b3d13fc9129c4cf957d3d31077a59bd8619745482722b884a6f559638b372bf0d6f63ed0b92a2b8dcc8b9a026e069f2760fc129f3eba83cc801
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Secure PreferencesFilesize
11KB
MD55315d751730afd81dac5150b24ae0c77
SHA1d63a021d77b2211bcf7bc93e492d5e24d082b085
SHA256f491e346df35693187cd0d0ff8406239265fbeac8f93cd522943f11aa79df2a0
SHA51210b43624a1599decb3830669a9f994bdf52506dfbc71d8621634014d550877d7c25891436d5929ee74670e579e798b0a6bfa80dc57c89171f6b2dbcf8dbb0776
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Site Characteristics Database\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
4KB
MD530aab5f9682128fdf18c0fb2c823b192
SHA1944b5a382fbe8b2098c247c5c0cad4f116c7e73e
SHA2561d307aff41b78779ba61cb848e3847258482b26308d8dd57c722aee47866446e
SHA51277c942b5ccbd5dfa8e522af5398f78b782dbafe5b51d1ba49b763eded0712d6ead7e0691f64beb8b051ed0aae766a3709476075abb281f3c085c5bb055c2e46b
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
4KB
MD59be7576f290b6b47dd31bbcdaf002f54
SHA185f32c1d62949a05f3c25570c6c796349507e707
SHA256d926c2be4d7912862c5f0737bb5261cb80b09cbf2b0f63e1ec97989b488e6448
SHA5120a5a0ff733f2319ccc213f833567d6134490c99eea4d1a2a99ebe6ee32e3f4b9545aee2f2f55e06507e910d167d5db0cbacf6c946b5b0cc397f446ab056674b5
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
7KB
MD5ac0d0aef7ccb4a8f89a5b4a41c4713a4
SHA1a2ba51ee9369195f32e29c80fa37c7599a4c98ee
SHA256c2c723922c4ba50f4d98fb51563561079f8e288da078aa1e36caa29ff76e8ebd
SHA51299daa5f7593cdc5556f1a512b21c3853c1173509dec3db97bdd574a315d9eb0a8a4db781a30a89c31b2e05c002316b217c90a939a1a3985edb8ccedab4983ca5
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
7KB
MD58895b3ab313e239dfc5a54d9a97b9c7a
SHA194bfe9da56ee4135a12072c66a41176c402815f0
SHA256bf064b0ea3666fd6b5b9b0a123f511f5c82a48cb8e87f50c8c33d76690fc703a
SHA5120018136b42ee5a884e53dd816a281f4c90d61ba302755c1f0257dcecc0a1ab6ec7d6e69ce339ceea9b3076435f8ffdbdf9e454e0bfed8b16aa84d58146c3565f
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
6KB
MD5c08d6f5031a68439f3483fa294550c7b
SHA1bab472607ce00239d9f857e326434742e761af50
SHA256c972ee65a68960e21176cb5f5647e0a10d038484fafb472b50e900a93269fa10
SHA512182b733b9ae095d3278dfa9ce61046a28753e02b744ba74cf69daa67d0c45fe1636cd51763807128760d94f66b3cfc0f1e63fe97f654bf5ea644695e4d11161c
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
1KB
MD5a29d3e76f1c66fb9f61cc93e9deea4c2
SHA1a53af5f3150195f2426c4bfbf170519d8fa3cc7b
SHA25633887c43271d96df464744269a32f30763b9bb1dd595f814eb8403e913c2e300
SHA512e1b68201a71379879e49369125704104613085daa8761f1a6041770364ec4cf97e03055de29c00d081f6a6690eb4b105e5fa351b33d3ababa32690303cd54fec
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local State~RFe5840fc.TMPFilesize
1008B
MD5276bd8d4f1086ae26150836b30d3bddc
SHA1d02141fe541263aa2755c1672757b38c9c54bd9c
SHA25646daddc118d1cf744f27cc7858b3fa6374e488e86f6c34bb89e2b9ed942e7314
SHA512e69155d992bfcbff0db68622efa895595df9bacb7ec537d4a0e6a3e00fae734afe5601bfa3d4801969b6f183bd8cfb53476fe0cf18f991860b69d086174d9460
-
C:\Users\Admin\AppData\Local\Temp\0e8525cb-5e82-473f-aaf0-82019c6e1094.tmpFilesize
1.3MB
MD506d466a1cde4306356506b35153c5ebd
SHA1c43850528e8150e1f0e253653d2f0155d00585fd
SHA2566b1205e9b435c6241ab9c244b1dc3c309c1d82211268501e71e43c4425fbf590
SHA5125d79ae61fea7097ddf4b5f2c639ddd1ebdffb7d0e69b74aac47e166afbe94e88e3a4dbd1cf34d55c6c8b0fcba3c30b676c8460b120470c17278caf22896b0b33
-
C:\Users\Admin\AppData\Local\Temp\40cfc6f2-def3-46fe-9da8-05de68771f45.tmpFilesize
1.9MB
MD521b06e448a0bee23eb6b80dfb39f1e82
SHA1d60b3a9021a704247af4ba58bd539d42f780661f
SHA2563cad9f24f2ec2bee7bef2410ef713924640bda964e865096db6dde37103481ba
SHA5129678b1302eb289f04c0fad0a60455da7d24da4bb72177561f8668f0995d695485eba915bb222d7231a8188ac6ff3b4b0ffbbfe3b725b9c0112ca6af9465f5709
-
C:\Users\Admin\AppData\Local\Temp\5b183def-f715-412d-a45b-f2a23c7a06e7.tmpFilesize
2.2MB
MD5ffcff8e2ba102530ce54f9ea1529ce48
SHA10d3ebcf3ca535032d825b6a0c5a4c5e45733033a
SHA256bfaebcbdaf420eac93d20ad94680fd13fa391bb8d4f7a29603b5172628fc093f
SHA512e5c8aeccc919a8b07442bb291b1da38a0f82f5a1352b8ac1edbbf9b471675b92cfae53d118c819ed32dc8992ef8efb943e8ecea73d28706a7c88b8d83fd025ec
-
C:\Users\Admin\AppData\Local\Temp\66025337-47c1-447e-b3d6-97b10c0fca26.tmpFilesize
90KB
MD565a028a0d2831eed0228ecda4ab9ef2f
SHA186d5eaec3e1c7ecde3f37ab36a017599ddcb2138
SHA2565cae2b06bc5525e26e08cfaa43be7a5f8df88053397676cf81a5402a1ea0059a
SHA512edad812dffcc0c8b399d3c5c216973bab2fe9e9dbc0d2c6efffc8cca5f1c58e126b83046c4c90febf003f3afd3d3c12c9ba46ad9d18975f2a6c5094643ca4f87
-
C:\Users\Admin\AppData\Local\Temp\692f7218-93e5-4fe9-b6e1-73024326e171.tmpFilesize
1.2MB
MD5d343a7167bf2962f27b54de17ec166a9
SHA1cec2497d5ea819f05be656b8e15f79a6eaf27acf
SHA256a00f73fe6dedd17fd34252c40d89c6be5524027ddb2c0effdbb298d7d7065de3
SHA51264ada12e0bbd202c2f4817bb804d7583baaac469eaac0fd8db0df6bbc9d8d33603feb0cbeae6830b205fa056765da835b0e35b0733e3ce8964b8890aba382a4d
-
C:\Users\Admin\AppData\Local\Temp\a8049c15-c9b5-4ae5-b4d6-76fb3d01ccae.tmpFilesize
71KB
MD523905ea78979b66c6d307de1ba55cea8
SHA173c187582cf3a843367751b565180dbdd88498fd
SHA256d3e2dd4dc06d3f0feeeb44ca24cd60d076931ff6c0ac1692b509f40f58d8595a
SHA512a32f59e91c5be60eb032f33a5ff799e125143e9da4d93ae0b57abdd80b778ff0001ea28d553a947560b54b9d214ac96e5d0ce98d36d655b26f1b6d4ec64dbeae
-
C:\Users\Admin\AppData\Local\Temp\ab6ebe25-1769-4824-82b0-3f7b1ae99ff5.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\aj6D82.exeFilesize
5.8MB
MD5c79bb78a0bad2559a7037913dd1f1f34
SHA1a5b36348ad93fdf971201f31136d8c9b056984a7
SHA256f63b47288af395ac9c02c980592691e2d446fe8b4d3813007433ae262af693c3
SHA5121bd81cbe784427e54903159225e0fd94c0fab1d9498c11db177d86268f34129e6835759a9a3e3822c717349043930e13168390fcc2f9a74f9699f14497cfc888
-
C:\Users\Admin\AppData\Local\Temp\avg-securebrowser-web-tagsFilesize
53B
MD54c94408946d796a8b19c17df5cf0562d
SHA189056150d90683f9548dadc308eb2789a67c2a47
SHA25668042cb47d900c4110ffc5f46e5f8395b35f42d33fc75e58ee34c7f5d8726de7
SHA51296a31f0b7254f42fec787233e2d11991709bc0b2514d163dd1f7696015e7318f9810d9811473fc13d6782d65e40f6a94fe6a7ffef3cb962032cff3bfe8b99a29
-
C:\Users\Admin\AppData\Local\Temp\efe8e7a8-95ec-4cea-bdd3-c7e7c12b86c5.tmpFilesize
1.2MB
MD57fabb7813703295a20612e6c811f982a
SHA1be28a80def657caf474829dec119858325115d9f
SHA256493bcea5b2aded060e245e3285276813795831006abf24abb2463479148fb570
SHA512724f2091a84eefb064e39061b8787511f08b935e552c706796cb1ffd2a4b2451c30f3e47c272b327a2c3164fecab018344908f76612aad9ed39016215d3999dc
-
C:\Users\Admin\AppData\Local\Temp\nsv6F65.tmp\AVGBrowserUpdateSetup.exeFilesize
1.6MB
MD59750ea6c750629d2ca971ab1c074dc9d
SHA17df3d1615bec8f5da86a548f45f139739bde286b
SHA256cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c
SHA5122ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b
-
C:\Users\Admin\AppData\Local\Temp\nsv6F65.tmp\CR.History.tmpFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir352_1930814681\CRX_INSTALL\img\common\extensions_page\icon_16.pngFilesize
540B
MD567816b9f9f56727c41d64793d0eb4902
SHA199dee423dc2ec6ddb923208240b2fd13409c8ca5
SHA2567b9847ea5d27c37df0430ff4056ecf18b2248d18a10d7ee1cd7f8908f0a82d5d
SHA5126fab420866894593620e95ce3cd988e6a9525b6bdb0b4577f8ee5fe513f3ba187996ccbda9d0b54b493122136e52c7bd179da22cd8106725f24401816429a3c7
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir352_2029009635\73a78a78-bfe1-4f9b-af77-e7fbc7c5248d.tmpFilesize
839KB
MD5f50e00df362d5a597b9e7f549df2587c
SHA1cf6aafdc3f25bcffdcabd3a5db2e40d1cf42dbc9
SHA2561518106d36a5770684ce0cd86279e19ee601225d9222f7f555421990a130eebf
SHA5124691ef983c58d2f027bb0a283ed0a3b11da972588c4c4ab3462fd2e4546f0df85ed1c1f56a481cd86470e3ed02ee8859f22bd04c75a47ce1fe5cb5c983e64577
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir352_313776841\3fe8a530-1979-44a0-876f-fc7e9e14a7f9.tmpFilesize
2.8MB
MD5f75cbfbb5eaa5f46574955ed6651da78
SHA14ce276c03898e57667b401761fe1df5f11304a68
SHA256643962e7cc16bb8e9edbea5f05473764199c7179d06a65bd88a0d101d1d5a9bd
SHA512287847c5caae39fc80e90ae105a5fb0c9349f402872721c599eb9c9ccaf171437879f0ef8bdeae923bf4520befa316b60acd3e975caf8496f05dad24e1b34e40
-
\Users\Admin\AppData\Local\Temp\nsh65FF.tmp\JsisPlugins.dllFilesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
\Users\Admin\AppData\Local\Temp\nsh65FF.tmp\StdUtils.dllFilesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
\Users\Admin\AppData\Local\Temp\nsh65FF.tmp\jsis.dllFilesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
\Users\Admin\AppData\Local\Temp\nsh65FF.tmp\nsJSON.dllFilesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a
-
\Users\Admin\AppData\Local\Temp\nsh65FF.tmp\thirdparty.dllFilesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
\Users\Admin\AppData\Local\Temp\nsv6F65.tmp\Midex.dllFilesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
\Users\Admin\AppData\Local\Temp\{61B4D8FE-59BC-4D1D-825C-B84CB1309232}\scrt.dllFilesize
5.7MB
MD5f36f05628b515262db197b15c7065b40
SHA174a8005379f26dd0de952acab4e3fc5459cde243
SHA25667abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31
SHA512280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8
-
memory/784-552-0x00007FFF93520000-0x00007FFF93521000-memory.dmpFilesize
4KB
-
memory/784-553-0x00007FFF95DA0000-0x00007FFF95DA1000-memory.dmpFilesize
4KB
-
memory/1876-911-0x00007FFF93AE0000-0x00007FFF93AE1000-memory.dmpFilesize
4KB