Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 09:16

General

  • Target

    http://blob:https://github.com/07b975ee-a1fc-4f07-a81f-65b5fb3ebcfe

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/975244014364270683/FZnH_sfT1E7Axl_7pfCffp86xK6BWVM_UXXb74CN2p4kpHxH_6kuQsuzlglxNPVfnIm6

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 12 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 12 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 31 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 25 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 24 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 14 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 51 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://blob:https://github.com/07b975ee-a1fc-4f07-a81f-65b5fb3ebcfe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc136f46f8,0x7ffc136f4708,0x7ffc136f4718
      2⤵
        PID:4792
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:3680
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4364
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:8
          2⤵
            PID:2500
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
            2⤵
              PID:2024
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
              2⤵
                PID:4016
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:1
                2⤵
                  PID:3880
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:1
                  2⤵
                    PID:4988
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                    2⤵
                      PID:3528
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1272
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                      2⤵
                        PID:1084
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                        2⤵
                          PID:2380
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:1
                          2⤵
                            PID:4348
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                            2⤵
                              PID:4300
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:1
                              2⤵
                                PID:1084
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5548 /prefetch:8
                                2⤵
                                  PID:1056
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5556 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3880
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                                  2⤵
                                    PID:4740
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                                    2⤵
                                      PID:5280
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:1
                                      2⤵
                                        PID:5324
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3100 /prefetch:8
                                        2⤵
                                          PID:3984
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:1
                                          2⤵
                                            PID:2824
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6660 /prefetch:8
                                            2⤵
                                              PID:5484
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6772 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5728
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5892
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:6116
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3548
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4120
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5472
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5608
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3936
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5808
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5972
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4952
                                            • C:\Users\Admin\Downloads\RBF.exe
                                              "C:\Users\Admin\Downloads\RBF.exe"
                                              2⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4936
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:1
                                              2⤵
                                                PID:2836
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:1
                                                2⤵
                                                  PID:3172
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:1
                                                  2⤵
                                                    PID:540
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:1
                                                    2⤵
                                                      PID:5648
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                                                      2⤵
                                                        PID:6048
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6924 /prefetch:1
                                                        2⤵
                                                          PID:4120
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7028 /prefetch:1
                                                          2⤵
                                                            PID:3476
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                                                            2⤵
                                                              PID:3688
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:1
                                                              2⤵
                                                                PID:2576
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:1
                                                                2⤵
                                                                  PID:3264
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7228 /prefetch:1
                                                                  2⤵
                                                                    PID:5524
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                                                                    2⤵
                                                                      PID:5832
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7624 /prefetch:1
                                                                      2⤵
                                                                        PID:5856
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:1
                                                                        2⤵
                                                                          PID:5064
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7524 /prefetch:1
                                                                          2⤵
                                                                            PID:3696
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7884 /prefetch:1
                                                                            2⤵
                                                                              PID:5988
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8004 /prefetch:1
                                                                              2⤵
                                                                                PID:5876
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8476 /prefetch:1
                                                                                2⤵
                                                                                  PID:1416
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8700 /prefetch:1
                                                                                  2⤵
                                                                                    PID:2488
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8836 /prefetch:1
                                                                                    2⤵
                                                                                      PID:5328
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8852 /prefetch:1
                                                                                      2⤵
                                                                                        PID:2572
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9212 /prefetch:1
                                                                                        2⤵
                                                                                          PID:5984
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9388 /prefetch:1
                                                                                          2⤵
                                                                                            PID:4936
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8680 /prefetch:1
                                                                                            2⤵
                                                                                              PID:4900
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8804 /prefetch:1
                                                                                              2⤵
                                                                                                PID:1408
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9180 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:2412
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9624 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:6308
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8492 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:6444
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=9672 /prefetch:8
                                                                                                      2⤵
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:6724
                                                                                                    • C:\Users\Admin\Downloads\avg_secure_browser_setup.exe
                                                                                                      "C:\Users\Admin\Downloads\avg_secure_browser_setup.exe"
                                                                                                      2⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Checks for any installed AV software in registry
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:6908
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aj3774.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\aj3774.exe" /relaunch=8 /was_elevated=1 /tagdata
                                                                                                        3⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • Checks for any installed AV software in registry
                                                                                                        • Writes to the Master Boot Record (MBR)
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Checks SCSI registry key(s)
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:7100
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\AVGBrowserUpdateSetup.exe
                                                                                                          AVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9228&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --import-cookies --auto-launch-chrome"
                                                                                                          4⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in Program Files directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:6756
                                                                                                          • C:\Program Files (x86)\GUM6B43.tmp\AVGBrowserUpdate.exe
                                                                                                            "C:\Program Files (x86)\GUM6B43.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9228&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --import-cookies --auto-launch-chrome"
                                                                                                            5⤵
                                                                                                            • Event Triggered Execution: Image File Execution Options Injection
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                                            • Drops file in Program Files directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies Internet Explorer settings
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:6240
                                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:7156
                                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:5508
                                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                                7⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Loads dropped DLL
                                                                                                                • Modifies registry class
                                                                                                                PID:436
                                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                                7⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Loads dropped DLL
                                                                                                                • Modifies registry class
                                                                                                                PID:2972
                                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                                7⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Loads dropped DLL
                                                                                                                • Modifies registry class
                                                                                                                PID:3532
                                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping 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-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTIyOCIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNjA0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              PID:6340
                                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9228&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{EC5F054F-1116-4DA3-9EA7-F1E0288C9318}" /silent
                                                                                                              6⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:6344
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4630699369768422243,5753615064870311596,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=10100 /prefetch:2
                                                                                                      2⤵
                                                                                                        PID:6560
                                                                                                      • C:\Users\Admin\Downloads\RBF.exe
                                                                                                        "C:\Users\Admin\Downloads\RBF.exe"
                                                                                                        2⤵
                                                                                                        • Looks for VirtualBox Guest Additions in registry
                                                                                                        • Looks for VMWare Tools registry key
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Maps connected drives based on registry
                                                                                                        • Checks SCSI registry key(s)
                                                                                                        • Enumerates system info in registry
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4008
                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:2192
                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3852
                                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                                          C:\Windows\system32\AUDIODG.EXE 0x33c 0x4c0
                                                                                                          1⤵
                                                                                                            PID:5172
                                                                                                          • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                            "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc
                                                                                                            1⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:6444
                                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\AVGBrowserInstaller.exe
                                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --import-cookies --auto-launch-chrome --system-level
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in Program Files directory
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:6928
                                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe
                                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --import-cookies --auto-launch-chrome --system-level
                                                                                                                3⤵
                                                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in Program Files directory
                                                                                                                • Modifies registry class
                                                                                                                PID:7052
                                                                                                                • C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe
                                                                                                                  "C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24252.121 --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x7ff665ff7c40,0x7ff665ff7c50,0x7ff665ff7c60
                                                                                                                  4⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:7088
                                                                                                                • C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe
                                                                                                                  "C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe" --system-level --make-chrome-default-helper --user-data-dir="C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --module-dir="C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp" "AVG Secure Browser"
                                                                                                                  4⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:5492
                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe
                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Update\Install\{B1601615-3B86-4AA2-8B8E-9D4471BE0FA1}\CR_56481.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24252.121 --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x7ff665ff7c40,0x7ff665ff7c50,0x7ff665ff7c60
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:5956

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Program Files (x86)\AVG\Browser\Application\109.0.24252.121\Installer\setup.exe

                                                                                                            Filesize

                                                                                                            4.6MB

                                                                                                            MD5

                                                                                                            3a39b6f55132bbb11adfff5a14007dd6

                                                                                                            SHA1

                                                                                                            266684a92501bbd9034a4d80534f558f06e96881

                                                                                                            SHA256

                                                                                                            b13dd9fe1164e93dc1ce1f78a64eaea34d3ad5bcd72ce586140432bf2292dd86

                                                                                                            SHA512

                                                                                                            b9b0611ef3fd19916f56bbae1c806feb089b1d48a793c65d70159ba05fced2cee7db20143381415eb64154a73b9b1387365d8a5869ae0566e510f56b128f2372

                                                                                                          • C:\Program Files (x86)\AVG\Browser\Application\SetupMetrics\20240823091905.pma

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            73f91ed1d7e35815ec1a21963507551a

                                                                                                            SHA1

                                                                                                            dda4403a0c7c863321965191dcdb463376e7b33a

                                                                                                            SHA256

                                                                                                            1e67230ddcb8a9ccad58ffac17b5a4dc57c800bee7877d3aae9f7136a75edcc1

                                                                                                            SHA512

                                                                                                            6fdd11ee4f9aeed430e6f799c6de76184436b62f1800b890992b4444677f171e833749349a2cf37576fcfa72e380ad2be79e950610c166611ae937d23d0f79ad

                                                                                                          • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\npAvgBrowserUpdate3.dll

                                                                                                            Filesize

                                                                                                            506KB

                                                                                                            MD5

                                                                                                            c6a2bff8e96b5622bf6841a671f4e564

                                                                                                            SHA1

                                                                                                            fb638e9c72604cc1b160385fa803b0ea028e5d5e

                                                                                                            SHA256

                                                                                                            7a7a12e9c0dee713700081b9354647972a0f3505596df34e4c68aaba99046992

                                                                                                            SHA512

                                                                                                            22a99f860055388e34a056af5d5e35f2e33a9294784795aca52fd42685d75aebb523add836c5e4b9b2f68fe00348d11ee56cc10208fcc662b86a6169664f934f

                                                                                                          • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe

                                                                                                            Filesize

                                                                                                            204KB

                                                                                                            MD5

                                                                                                            cbcdf56c8a2788ed761ad3178e2d6e9c

                                                                                                            SHA1

                                                                                                            bdee21667760bc0df3046d6073a05d779fdc82cb

                                                                                                            SHA256

                                                                                                            e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3

                                                                                                            SHA512

                                                                                                            5f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e

                                                                                                          • C:\Program Files (x86)\GUM6B43.tmp\@PaxHeader

                                                                                                            Filesize

                                                                                                            28B

                                                                                                            MD5

                                                                                                            1df27529705e8c503920b840d5f85e3b

                                                                                                            SHA1

                                                                                                            8524f61e878f625f93ab3cabbe7547a6d6d7abe1

                                                                                                            SHA256

                                                                                                            17031e89c51bd58bfc6659743b5ba5b721e165b9beff3214766eb21f66e73c50

                                                                                                            SHA512

                                                                                                            62d0c639479bae5265ee3ceb58f61d3c248aac2657ec0fcd990d48a4a8943732ba51c05d2447d42776f6e45668bba68ece3a2267305f34f7e07a1a63fef9488a

                                                                                                          • C:\Program Files (x86)\GUM6B43.tmp\@PaxHeader

                                                                                                            Filesize

                                                                                                            28B

                                                                                                            MD5

                                                                                                            48c62236b7038fbd47c62ea465ffef1c

                                                                                                            SHA1

                                                                                                            242ffe49cfc8d93c30860d4104410d7ae4d41c61

                                                                                                            SHA256

                                                                                                            626a588fbb4d5e0d0f9a98e36115b2dbcfd7017ac12a3a8f08cb56e3caeea293

                                                                                                            SHA512

                                                                                                            3f225406de496701d2a8fb6ddf8a75f859efdf1fb0d56e57b3e6fc25c8c1692a084f3408438aa6d050833ec0353d67c9385112a0b6816d3ea800a618e831be5f

                                                                                                          • C:\Program Files (x86)\GUM6B43.tmp\@PaxHeader

                                                                                                            Filesize

                                                                                                            27B

                                                                                                            MD5

                                                                                                            fc8ee03b2a65f381e4245432d5fef60e

                                                                                                            SHA1

                                                                                                            d2b7d9be66c75ccf24fcb45a6d0dacedd8b6dd6f

                                                                                                            SHA256

                                                                                                            751a04263c2ebb889fdcd11045d6f3602690318ebaaa54f66e1332d76dde9ef4

                                                                                                            SHA512

                                                                                                            0837f2b22c9629990165c5e070e710a69ad4951b7fcfe28bd52354c4b8a7246672497b8aaf521a8773c7ec2a4249fc4318330948ab0d8db8c6c74da57b32f1c4

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            152B

                                                                                                            MD5

                                                                                                            f9664c896e19205022c094d725f820b6

                                                                                                            SHA1

                                                                                                            f8f1baf648df755ba64b412d512446baf88c0184

                                                                                                            SHA256

                                                                                                            7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                                                                                            SHA512

                                                                                                            3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            152B

                                                                                                            MD5

                                                                                                            847d47008dbea51cb1732d54861ba9c9

                                                                                                            SHA1

                                                                                                            f2099242027dccb88d6f05760b57f7c89d926c0d

                                                                                                            SHA256

                                                                                                            10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                                                                                            SHA512

                                                                                                            bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                                                            Filesize

                                                                                                            62KB

                                                                                                            MD5

                                                                                                            c3c0eb5e044497577bec91b5970f6d30

                                                                                                            SHA1

                                                                                                            d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                                            SHA256

                                                                                                            eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                                            SHA512

                                                                                                            83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                            Filesize

                                                                                                            67KB

                                                                                                            MD5

                                                                                                            ed124bdf39bbd5902bd2529a0a4114ea

                                                                                                            SHA1

                                                                                                            b7dd9d364099ccd4e09fd45f4180d38df6590524

                                                                                                            SHA256

                                                                                                            48232550940208c572ebe487aa64ddee26e304ba3e310407e1fc31a5c9deed44

                                                                                                            SHA512

                                                                                                            c4d180292afa484ef9556d15db1d3850416a85ad581f6f4d5eb66654991fa90f414029b4ce13ed142271a585b46b3e53701735ee3e0f45a78b67baa9122ba532

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                            Filesize

                                                                                                            19KB

                                                                                                            MD5

                                                                                                            76a3f1e9a452564e0f8dce6c0ee111e8

                                                                                                            SHA1

                                                                                                            11c3d925cbc1a52d53584fd8606f8f713aa59114

                                                                                                            SHA256

                                                                                                            381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c

                                                                                                            SHA512

                                                                                                            a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                            Filesize

                                                                                                            41KB

                                                                                                            MD5

                                                                                                            60f8cd04587a51e31b51d1570d6f889a

                                                                                                            SHA1

                                                                                                            88574c41d0ab81721b275252464da5c7927a4835

                                                                                                            SHA256

                                                                                                            27cb4390e32a97375dd4987ae000406933bceba5199f17893711e782333b81cb

                                                                                                            SHA512

                                                                                                            84c12448ac55dd819749fef9be9919111a3df4bc51e66d2fa9f7376c11c101ed1349cb36aa119aa873cdd6c0c91027e201fbe23c2c83b89bc900a4d9077bcc52

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                            Filesize

                                                                                                            65KB

                                                                                                            MD5

                                                                                                            56d57bc655526551f217536f19195495

                                                                                                            SHA1

                                                                                                            28b430886d1220855a805d78dc5d6414aeee6995

                                                                                                            SHA256

                                                                                                            f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4

                                                                                                            SHA512

                                                                                                            7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                                                            Filesize

                                                                                                            88KB

                                                                                                            MD5

                                                                                                            b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                                                            SHA1

                                                                                                            386ba241790252df01a6a028b3238de2f995a559

                                                                                                            SHA256

                                                                                                            b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                                                            SHA512

                                                                                                            546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                                                            Filesize

                                                                                                            1.2MB

                                                                                                            MD5

                                                                                                            2049c79ddc0ba3375dfe1832624bba4c

                                                                                                            SHA1

                                                                                                            aec0cf9ae1738391d630681d653b08625b276bc3

                                                                                                            SHA256

                                                                                                            e9cff2115e36f340c8a7cee5f24c5392259cd2c440fc9890b265551e4badf572

                                                                                                            SHA512

                                                                                                            4fd7488e94e8c9c990439a9200e9317eb7dc50eed35d32d17f13292d4d468949d990afadf4c654e8abadb638aced83cdd868dd6b68d4efe5aeec2670573da0fc

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            18f4b864c969d38cd122e40870af4b25

                                                                                                            SHA1

                                                                                                            86148e1a79519eb692e27466757997e68c96a735

                                                                                                            SHA256

                                                                                                            4ada5a4981dd8f1a120b5b12edf516f9991abab615c62816f3647db198144f05

                                                                                                            SHA512

                                                                                                            9c2147239c18642b9a190b81c9bc77a875dc27f2a7bac306d4ee419c241c36ecaef3c3436b2934d0867c0a3c9a40020053b291d10c1f0a7336bceeaa8f23399b

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                            MD5

                                                                                                            d8c8264b1663aa2851222dc6c8c2d861

                                                                                                            SHA1

                                                                                                            3346b9ea5d380008a8a78b6854027db55360d034

                                                                                                            SHA256

                                                                                                            f6981c8e7f3b5c4cd1a7c3c23e2f8132482e58c3845c4d857e2b00a66e82c38f

                                                                                                            SHA512

                                                                                                            3ab45344e3292b57e128abb4e03e9fba45988aafe1425a3c59b4faf6a0fca65eec608e4d01c87d6e637a18614c323dd9a322e1c5a61bd5c2dcddb62341fb5114

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            4KB

                                                                                                            MD5

                                                                                                            484f09174fbf22fc8aa167a112b18573

                                                                                                            SHA1

                                                                                                            d81c1066e49f762d9edf65266f92ff3e95e23565

                                                                                                            SHA256

                                                                                                            a1280357f21937311bde40815b8a1ef62fe524ec3db7ade48053ceeb3e9afb49

                                                                                                            SHA512

                                                                                                            be1e37569e89a79940bc5033297544c58c2834eccaadfe061ae94d6f569cfa8a0475bb1aae2fb4f3b45027d76d601ec16adf628034c2366cd12192cda4cecb9a

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                            Filesize

                                                                                                            1022B

                                                                                                            MD5

                                                                                                            f4c2f896b4a7d673fed06df5fa11ed94

                                                                                                            SHA1

                                                                                                            f8634f428969d7a0c28cde31c4cfb7fb7b6fed68

                                                                                                            SHA256

                                                                                                            215d23de03f2e6cdc1930077a6a4d577083c127f8a83defa16030fc42eebfdbd

                                                                                                            SHA512

                                                                                                            9d54872475fe054e6c8aeb42df58bc9a3d4e79363b68ae464c8b4195c559e6fa359901bf32e7cb64b5412a4f5c70b21d21048155c97c605b73691d7f58926709

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            f01359bbde7ae36a88977f303c6fc2e2

                                                                                                            SHA1

                                                                                                            85488caf1c7c5e0a89870d07ada4205de87329a8

                                                                                                            SHA256

                                                                                                            0ae691ef7141adf5fdc40a805b8f273c2576ead7331aa998463701ded2f7b786

                                                                                                            SHA512

                                                                                                            a4b8e1ffa5322f8f007290ac038046a8d0ab740880bfef36e89df2246e7dc0f98884ac4b81f442cdb1628cc0064fc8e170672629bd7ff17d67f5823c6a5ab7ec

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            75bdc6e9495a29472f9373a0651ddd1f

                                                                                                            SHA1

                                                                                                            8e1d6f39e32412ef7a9e51d77c56b54e73bf53c9

                                                                                                            SHA256

                                                                                                            8417d74a2e34e4f920de6c03d716579b3bbfee170be2b9dfddbdcb7052157799

                                                                                                            SHA512

                                                                                                            bbf1b3697fbaf73db9edd5d1e2e10ca0910873470c69113453b02f2ab872f8e792d1740b7ae78a29dc51b913220092e512f6a0300807d545b2f9a36ad78b5d14

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            6f6f31f3345b0dd8a54ea1e90f736abc

                                                                                                            SHA1

                                                                                                            619a74e9913f81e89ad99e0c9d0bca06daf2eafd

                                                                                                            SHA256

                                                                                                            1b0adc8ae128ae4e67176ed6d9ca18ae097107cd8c85d11d4221cb72904d922e

                                                                                                            SHA512

                                                                                                            4df10728c0cf66103bf1a345e90c6d2fd21da35f413cb3d4eb31782d7631d2dcec569f8014ee05a9ce28cdbd61bf6f370a4390c7a3b041f3569490828258ceb1

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            75c125c4fabc3362d77ba43fc5a40ecb

                                                                                                            SHA1

                                                                                                            97a505181ced4f724a85e2fba6705dae02d27e89

                                                                                                            SHA256

                                                                                                            baa5caea9f62a2c69d0f308646c974dbe24424655684f9b8590583d1d37029e1

                                                                                                            SHA512

                                                                                                            63c41ed80e6a6e164c0f36f874f6611bb3c5049276aef37d8cb99a7afdd8bddad262e28012edfc4fca2258c59c5015b32f14981576614d762a5ddc7a0d7d3456

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            13KB

                                                                                                            MD5

                                                                                                            b302413c337c7537a672072d34515130

                                                                                                            SHA1

                                                                                                            0151b45c57a61fbad114b8a022f3366f292aafb4

                                                                                                            SHA256

                                                                                                            be4e3c359723f8ae610dc7bd645e4ca791e400517a828fab2ac4971d500e6195

                                                                                                            SHA512

                                                                                                            8a25b46580740399b1e21fa72929f8b744844ab060e8e7589a41960d29d9b1a07bfbd9fa99a201b08499ca7cadb9413b79c0c483e58d46976cd30dd047c6b024

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            de13fdeeac4c9d944605aa7645f6bed1

                                                                                                            SHA1

                                                                                                            9ad8f9faa847ced15253b6e853e4a4a092d064dd

                                                                                                            SHA256

                                                                                                            df160692f2319083a788a5d3e4d53e4a54290a6211f89216b1770f486fce63f5

                                                                                                            SHA512

                                                                                                            2683ba1bdcdc42f1a996ffbf3dda09af729b1648534b16fbee63c7f0cf1386d92e7d78da3bdfb751fcf1f7ac980429dccff3b32cec1eb987db9c48010bd05570

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            818d492b42bb82b32db7415fdc16f9fc

                                                                                                            SHA1

                                                                                                            eac99b8fb0ba8a7c01652f8f1da2ae9962441485

                                                                                                            SHA256

                                                                                                            c63842dc5b171c95ceb4644ca65c868936c9a7c7ce07c3f2b3a50eaf53d21341

                                                                                                            SHA512

                                                                                                            95dc76f58ecab46225faa9f1ecaebafe92fdb44ccf51bc8823f51c228e89d3645f93425dfef4f8983f0e7cd20af0aa468f197b1f16498bfb6e61e2ac74e621a2

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            dcd1244696590c356fd58d658172c98d

                                                                                                            SHA1

                                                                                                            f71027a629ed83415493c5e1929835fc7b353a2c

                                                                                                            SHA256

                                                                                                            aed817a7c0239f117ddb9b4be1186278f19b530cf5da8a68751f1d808a4c31a2

                                                                                                            SHA512

                                                                                                            7ea47386ffedfcba7904976fa3071fe4b993166a847a3fa482db01ce2861d775dda7b27163ecaede396597c0a1f8ae9378266ad90496eb18d9a38ab830e2f351

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            9ea62d805d085a06dacf494a7c12f8cd

                                                                                                            SHA1

                                                                                                            6831a29f73df6081964490d47d2029fc4c644537

                                                                                                            SHA256

                                                                                                            c47186f8e71f5158ad387103928351562b84f5cbd42b94eebc35f463a66fdad5

                                                                                                            SHA512

                                                                                                            691c247d95b3fc443e814dfd69dc13774e464377cc85b76d013a40c194c5ba998d74a19b4c88a6d9a5ee77ed53348de646dabef5135ccd4e9d0570149f4a0a8d

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580644.TMP

                                                                                                            Filesize

                                                                                                            873B

                                                                                                            MD5

                                                                                                            bdb668026c39cf06679ff2197b021bb0

                                                                                                            SHA1

                                                                                                            007647c457e74df3e874e550389f06fe96245695

                                                                                                            SHA256

                                                                                                            4f5e56ea91f102e4ab03fffa20e8797eed931d69884645233d1c04994497dd9c

                                                                                                            SHA512

                                                                                                            4adf408873987517369f2be3f10b5d5718222c64f9b97e11b2fee1ef8ba652d9d1a7c4fa47380b199ef0e03565b0810a8428ca4ff67743821ceb365940882903

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c44fffba-cbae-48c0-8922-05bbfab7d7c3.tmp

                                                                                                            Filesize

                                                                                                            6KB

                                                                                                            MD5

                                                                                                            2d1aaf5eaef40a4950fd596567cf2de5

                                                                                                            SHA1

                                                                                                            3f28a7468ca0e41415e58aa0d6033e0f6ab33a20

                                                                                                            SHA256

                                                                                                            faf54ca9059301b1fc186fb7ca0a075c1fb3633b3266fe939ba532e10a36a8af

                                                                                                            SHA512

                                                                                                            870e52b06b87b2641b097cee93d78d706bfa421a078e39af95f0de1005b4dc4ce9c9a5ad93e2ac0984174720570d01200fd3aa87568d2489a39c68f6b786fe19

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                            Filesize

                                                                                                            16B

                                                                                                            MD5

                                                                                                            6752a1d65b201c13b62ea44016eb221f

                                                                                                            SHA1

                                                                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                            SHA256

                                                                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                            SHA512

                                                                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            375cf841c78559ee91e830671b38ffdd

                                                                                                            SHA1

                                                                                                            f4ac089e89bc23dddfef0d71568baf638dd42273

                                                                                                            SHA256

                                                                                                            0c3e91d4015178bb88b2236325afa4c4a5bb60ef8b4f684fe32b937b43f1e018

                                                                                                            SHA512

                                                                                                            c5c3856eb878178486d422f28f06b158f7b5da81d40435f51aa547b4061d6da7c3794eafe0294619f7841e32775821cbaa52db71a90fbb9f6580c3ab76fa5881

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            12KB

                                                                                                            MD5

                                                                                                            70760d88aafb416f0976fb6ef1fb5453

                                                                                                            SHA1

                                                                                                            df60b9b0aee3a24441ac4505ba8ba9c4d1facd07

                                                                                                            SHA256

                                                                                                            7b837a9bed7bc1ca54780b833ef0b874f5c5b1463861735504e23587bea6c772

                                                                                                            SHA512

                                                                                                            08217de199365ef3cd4348bf3ee8ef993ca3baf54978d5dff4d0d8984fc6ef199203b8cfff8a140c4cf265b000b0444873303d047c9ac4a8dcaa4dffcc4ae1a8

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            de399161a18049eba900625903268c3f

                                                                                                            SHA1

                                                                                                            d7f235748c495105ec288d74025352973915efcd

                                                                                                            SHA256

                                                                                                            49256c9df4f50e690f220328eda4f6da9a2c061a9fc778470ee5b081b51a6bd6

                                                                                                            SHA512

                                                                                                            e93bee67a4566e88ac99d2ccf391a1d5914222c971c2692c7f6cfc26edab37696d714d49e3e39696f7753916784cefe803906e122446be19137611bada143578

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\login.db

                                                                                                            Filesize

                                                                                                            40KB

                                                                                                            MD5

                                                                                                            a182561a527f929489bf4b8f74f65cd7

                                                                                                            SHA1

                                                                                                            8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                            SHA256

                                                                                                            42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                            SHA512

                                                                                                            9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsh2FA3.tmp\JsisPlugins.dll

                                                                                                            Filesize

                                                                                                            2.1MB

                                                                                                            MD5

                                                                                                            d21ae3f86fc69c1580175b7177484fa7

                                                                                                            SHA1

                                                                                                            2ed2c1f5c92ff6daa5ea785a44a6085a105ae822

                                                                                                            SHA256

                                                                                                            a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450

                                                                                                            SHA512

                                                                                                            eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsh2FA3.tmp\StdUtils.dll

                                                                                                            Filesize

                                                                                                            195KB

                                                                                                            MD5

                                                                                                            34939c7b38bffedbf9b9ed444d689bc9

                                                                                                            SHA1

                                                                                                            81d844048f7b11cafd7561b7242af56e92825697

                                                                                                            SHA256

                                                                                                            b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0

                                                                                                            SHA512

                                                                                                            bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\AVGBrowserUpdateSetup.exe

                                                                                                            Filesize

                                                                                                            1.6MB

                                                                                                            MD5

                                                                                                            9750ea6c750629d2ca971ab1c074dc9d

                                                                                                            SHA1

                                                                                                            7df3d1615bec8f5da86a548f45f139739bde286b

                                                                                                            SHA256

                                                                                                            cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c

                                                                                                            SHA512

                                                                                                            2ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\CR.History.tmp

                                                                                                            Filesize

                                                                                                            160KB

                                                                                                            MD5

                                                                                                            f310cf1ff562ae14449e0167a3e1fe46

                                                                                                            SHA1

                                                                                                            85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                            SHA256

                                                                                                            e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                            SHA512

                                                                                                            1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\CR.History.tmp

                                                                                                            Filesize

                                                                                                            124KB

                                                                                                            MD5

                                                                                                            ff279781dfdd01953a1dea7bc0a892ca

                                                                                                            SHA1

                                                                                                            4871779dfb86fde8f8369dbcf273ef02485ba9dd

                                                                                                            SHA256

                                                                                                            c2a292b398ebaf30c82e5a6ae27aefcdb8180feaf816c56fec06ab265c75d1f5

                                                                                                            SHA512

                                                                                                            4b159b2365b40640f63efa6836800dfaef701fc6d20e623e831446ff92b0ed7a18b583737957d8d6adef7b827d4828bdcf16ff1ec7c657e10801c160ca8d1953

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\FF.places.tmp

                                                                                                            Filesize

                                                                                                            5.0MB

                                                                                                            MD5

                                                                                                            cbece3c2194c72ccb5970bc76f5b257e

                                                                                                            SHA1

                                                                                                            b33cddd26253cf1fbbf7e63f9529fc0f8ad270cb

                                                                                                            SHA256

                                                                                                            5217ba740476f6b332769e9e84b8f2ecdec8c1f4ad7145c9a9b802011644353a

                                                                                                            SHA512

                                                                                                            4f3de0fe5a2ab6d1e7685a79b6cfbdc69740bd7853a52afb5bb189ad21b8b899cea19522ac1e7e02dbd4e58fc3794e7ae3cb9faa429988573ec5b5748b77af3f

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\Midex.dll

                                                                                                            Filesize

                                                                                                            126KB

                                                                                                            MD5

                                                                                                            2597a829e06eb9616af49fcd8052b8bd

                                                                                                            SHA1

                                                                                                            871801aba3a75f95b10701f31303de705cb0bc5a

                                                                                                            SHA256

                                                                                                            7359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87

                                                                                                            SHA512

                                                                                                            8e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\jsis.dll

                                                                                                            Filesize

                                                                                                            127KB

                                                                                                            MD5

                                                                                                            2027121c3cdeb1a1f8a5f539d1fe2e28

                                                                                                            SHA1

                                                                                                            bcf79f49f8fc4c6049f33748ded21ec3471002c2

                                                                                                            SHA256

                                                                                                            1dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1

                                                                                                            SHA512

                                                                                                            5b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\nsJSON.dll

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            f840a9ddd319ee8c3da5190257abde5b

                                                                                                            SHA1

                                                                                                            3e868939239a5c6ef9acae10e1af721e4f99f24b

                                                                                                            SHA256

                                                                                                            ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a

                                                                                                            SHA512

                                                                                                            8e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsl387D.tmp\thirdparty.dll

                                                                                                            Filesize

                                                                                                            93KB

                                                                                                            MD5

                                                                                                            7b4bd3b8ad6e913952f8ed1ceef40cd4

                                                                                                            SHA1

                                                                                                            b15c0b90247a5066bd06d094fa41a73f0f931cb8

                                                                                                            SHA256

                                                                                                            a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754

                                                                                                            SHA512

                                                                                                            d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2

                                                                                                          • C:\Users\Admin\Downloads\Unconfirmed 670824.crdownload

                                                                                                            Filesize

                                                                                                            41KB

                                                                                                            MD5

                                                                                                            09d12c328c88bfdfef9dcc0927dca671

                                                                                                            SHA1

                                                                                                            4f61a36bc05dbd9229b56db5ead4ea3d37e4308a

                                                                                                            SHA256

                                                                                                            64e772d1da472d9da1dde4d9b070c1d9acf98d9819ec04058a0161f020022e49

                                                                                                            SHA512

                                                                                                            4774119f1eb6f3f712fc29f7c7cceb31a67c62c01a6b7f09ccf17a85a4d78b3fed4f3a9532c353490f9058aae5db58d305a92a65a8e8039e7c123f48e73d1d51

                                                                                                          • C:\Users\Admin\Downloads\Unconfirmed 833503.crdownload

                                                                                                            Filesize

                                                                                                            5.8MB

                                                                                                            MD5

                                                                                                            0dc93e1f58cbb736598ce7fa7ecefa33

                                                                                                            SHA1

                                                                                                            6e539aab5faf7d4ce044c2905a9c27d4393bae30

                                                                                                            SHA256

                                                                                                            4ec941f22985fee21d2f9d2ae590d5dafebed9a4cf55272b688afe472d454d36

                                                                                                            SHA512

                                                                                                            73617da787e51609ee779a12fb75fb9eac6ed6e99fd1f4c5c02ff18109747de91a791b1a389434edfe8b96e5b40340f986b8f7b88eac3a330b683dec565a7eff

                                                                                                          • memory/5892-446-0x00000000001D0000-0x00000000001E0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB