Analysis

  • max time kernel
    69s
  • max time network
    56s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-09-2024 17:52

General

  • Target

    CheatEngine75.exe

  • Size

    28.6MB

  • MD5

    e703b8ac5b3601deebbf05843c9a4e97

  • SHA1

    ab154e32099776e432b4d2c31366985f27950cf1

  • SHA256

    fe6c0d8f90c9c74f2986fe169342e0a5319a3b1ffcf711b513f33db7e28e863a

  • SHA512

    8280af1c2455b37c13de60f1d4a4ab26fe7d03bed7f874b074afb4ae365f2380aa71525e7e649e924347c38efd601dd3a6b7924f56aa6c09932f24b5c2f03c65

  • SSDEEP

    786432:dTCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFH2:d2EXFhV0KAcNjxAItj2

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 4 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 39 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 43 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\is-BT7O1.tmp\CheatEngine75.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BT7O1.tmp\CheatEngine75.tmp" /SL5="$60178,29071676,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod0.exe
        "C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod0.exe" -ip:"dui=3fe5095b-7a1d-4ea8-add0-943af5792bdf&dit=20240903175316&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&b=&se=true" -vp:"dui=3fe5095b-7a1d-4ea8-add0-943af5792bdf&dit=20240903175316&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&oip=26&ptl=7&dta=true" -dp:"dui=3fe5095b-7a1d-4ea8-add0-943af5792bdf&dit=20240903175316&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100" -i -v -d -se=true
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Users\Admin\AppData\Local\Temp\1mjrrjok.exe
          "C:\Users\Admin\AppData\Local\Temp\1mjrrjok.exe" /silent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\UnifiedStub-installer.exe
            .\UnifiedStub-installer.exe /silent
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1312
            • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
              "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:10
              6⤵
              • Executes dropped EXE
              PID:3340
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf
              6⤵
              • Adds Run key to start application
              PID:3884
              • C:\Windows\system32\runonce.exe
                "C:\Windows\system32\runonce.exe" -r
                7⤵
                • Checks processor information in registry
                PID:6044
                • C:\Windows\System32\grpconv.exe
                  "C:\Windows\System32\grpconv.exe" -o
                  8⤵
                    PID:1196
              • C:\Windows\system32\wevtutil.exe
                "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:248
              • C:\Windows\SYSTEM32\fltmc.exe
                "fltmc.exe" load rsKernelEngine
                6⤵
                • Suspicious behavior: LoadsDriver
                • Suspicious use of AdjustPrivilegeToken
                PID:5604
              • C:\Windows\system32\wevtutil.exe
                "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\elam\evntdrv.xml
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5416
              • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                "C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:5688
        • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\saBSI.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:952
          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\installer.exe
            "C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:3356
            • C:\Program Files\McAfee\Temp3146934938\installer.exe
              "C:\Program Files\McAfee\Temp3146934938\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:4908
              • C:\Windows\SYSTEM32\regsvr32.exe
                regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4708
                • C:\Windows\SysWOW64\regsvr32.exe
                  /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"
                  7⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5816
              • C:\Windows\SYSTEM32\regsvr32.exe
                regsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"
                6⤵
                • Loads dropped DLL
                • Modifies registry class
                PID:4416
        • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod2_extract\avg_secure_browser_setup.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod2_extract\avg_secure_browser_setup.exe" /s /run_source=avg_ads_is_control /is_pixel_psh=BjYV6dENvVuch16pF2r31DA1Mz8jKRdzdA4vQAJXs9L3iZQFcHRPAhSM3ZjRxUQoHwUpK4g314CaYBM /make-default
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\AVGBrowserUpdateSetup.exe
            AVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2432
            • C:\Program Files (x86)\GUM690A.tmp\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\GUM690A.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"
              5⤵
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1556
              • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                PID:3320
              • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                  "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies registry class
                  PID:1956
                • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                  "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies registry class
                  PID:1792
                • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                  "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies registry class
                  PID:868
              • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping 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-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiLz48YXBwIGFwcGlkPSJ7MUM4OUVGMkYtQTg4RS00REUwLTk3RkUtQ0I0MEM4RTRGRUVBfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMS44LjE2OTMuNiIgbGFuZz0iZW4tVVMiIGJyYW5kPSI5MjYzIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSI1NjMiLz48L2FwcD48L3JlcXVlc3Q-
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                PID:3380
              • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{6F4B6281-E215-42F9-8037-149880757887}" /silent
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2036
        • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\CheatEngine75.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1052
          • C:\Users\Admin\AppData\Local\Temp\is-E0IAL.tmp\CheatEngine75.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-E0IAL.tmp\CheatEngine75.tmp" /SL5="$2024A,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1468
            • C:\Windows\SYSTEM32\net.exe
              "net" stop BadlionAntic
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2720
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop BadlionAntic
                6⤵
                  PID:3964
              • C:\Windows\SYSTEM32\net.exe
                "net" stop BadlionAnticheat
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3040
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop BadlionAnticheat
                  6⤵
                    PID:1388
                • C:\Windows\SYSTEM32\sc.exe
                  "sc" delete BadlionAntic
                  5⤵
                  • Launches sc.exe
                  PID:868
                • C:\Windows\SYSTEM32\sc.exe
                  "sc" delete BadlionAnticheat
                  5⤵
                  • Launches sc.exe
                  PID:2800
                • C:\Users\Admin\AppData\Local\Temp\is-TSI9C.tmp\_isetup\_setup64.tmp
                  helper 105 0x3A8
                  5⤵
                    PID:1676
                  • C:\Windows\system32\icacls.exe
                    "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                    5⤵
                    • Modifies file permissions
                    PID:4624
                  • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe
                    "C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2656
                  • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe
                    "C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s
                    5⤵
                      PID:5076
                    • C:\Windows\system32\icacls.exe
                      "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                      5⤵
                      • Modifies file permissions
                      PID:4652
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 2264
                  3⤵
                  • Program crash
                  PID:5496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 2264
                  3⤵
                  • Program crash
                  PID:5576
            • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
              "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:10
              1⤵
              • Executes dropped EXE
              PID:1888
            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              PID:4860
              • C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\AVGBrowserInstaller.exe
                "C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1388
                • C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\CR_94DF2.tmp\setup.exe
                  "C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\CR_94DF2.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\CR_94DF2.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level
                  3⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • Modifies registry class
                  PID:3060
                  • C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\CR_94DF2.tmp\setup.exe
                    "C:\Program Files (x86)\AVG\Browser\Update\Install\{1DD4E01B-9387-409F-830D-6A4B299C511F}\CR_94DF2.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=127.0.26097.121 --initial-client-data=0x280,0x284,0x288,0x25c,0x28c,0x7ff617e9bfc0,0x7ff617e9bfcc,0x7ff617e9bfd8
                    4⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:5444
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
              1⤵
                PID:2580
              • C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
                "C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:5848
                • C:\Program Files\McAfee\WebAdvisor\UIHost.exe
                  "C:\Program Files\McAfee\WebAdvisor\UIHost.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:6328
                • C:\Program Files\McAfee\WebAdvisor\updater.exe
                  "C:\Program Files\McAfee\WebAdvisor\updater.exe"
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:6568
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )
                    3⤵
                      PID:804
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"
                      3⤵
                        PID:5016
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul
                      2⤵
                        PID:6696
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul
                        2⤵
                          PID:4208
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 568 -ip 568
                        1⤵
                          PID:5520
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 568 -ip 568
                          1⤵
                            PID:5560
                          • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe
                            "C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"
                            1⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:5756
                            • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe
                              "C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"
                              2⤵
                              • Drops file in System32 directory
                              • Drops file in Program Files directory
                              • Drops file in Windows directory
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:6216
                          • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                            "C:\Program Files\ReasonLabs\EPP\rsWSC.exe"
                            1⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:7360

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                            Filesize

                            204KB

                            MD5

                            cbcdf56c8a2788ed761ad3178e2d6e9c

                            SHA1

                            bdee21667760bc0df3046d6073a05d779fdc82cb

                            SHA256

                            e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3

                            SHA512

                            5f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e

                          • C:\Program Files (x86)\GUM690A.tmp\@PaxHeader
                            Filesize

                            27B

                            MD5

                            fc8ee03b2a65f381e4245432d5fef60e

                            SHA1

                            d2b7d9be66c75ccf24fcb45a6d0dacedd8b6dd6f

                            SHA256

                            751a04263c2ebb889fdcd11045d6f3602690318ebaaa54f66e1332d76dde9ef4

                            SHA512

                            0837f2b22c9629990165c5e070e710a69ad4951b7fcfe28bd52354c4b8a7246672497b8aaf521a8773c7ec2a4249fc4318330948ab0d8db8c6c74da57b32f1c4

                          • C:\Program Files (x86)\GUM690A.tmp\AVGBrowserCrashHandler.exe
                            Filesize

                            149KB

                            MD5

                            f73e60370efe16a6d985e564275612da

                            SHA1

                            2f829a0a611ac7add51a6bc50569e75181cdfd58

                            SHA256

                            9cf076866935a0c64366efaeff2ec76d45ac816030ebd616fd5defb1870bc30e

                            SHA512

                            2e44e87c285bb7b72d45c8119d08ea6f2d13cea77cf0005a3cf530790bb86c7f2df7c5edac9d86c9d7214abb224738c3bf6b31f6bf104051512bb1de133042dc

                          • C:\Program Files (x86)\GUM690A.tmp\AVGBrowserCrashHandler64.exe
                            Filesize

                            170KB

                            MD5

                            deef1e7382d212cd403431727be417a5

                            SHA1

                            fac0e754a5734dd5e9602a0327a66e313f7473bb

                            SHA256

                            7d410e9eabd086827b16c89ee953a643c3e2f7929616c0af579253fd8ca60088

                            SHA512

                            6b472a57fb89b128aad9ab6313a9ce8b171f7d73264c67f669adc5cf1f0421d81f654dad1419b620476abb59dd54e1aa03a74a26c5c93813f6fb8575fbd97d4d

                          • C:\Program Files (x86)\GUM690A.tmp\AVGBrowserUpdateComRegisterShell64.exe
                            Filesize

                            428KB

                            MD5

                            2a3ad7362e6c8808fbb4d4ccaba4ed4a

                            SHA1

                            3f896f7df7fe202f4a717713c503665bb4dcaed6

                            SHA256

                            4dcd341907880c8dea840819628b19c5ea42ca2b5c61ad57147d0ac7da9b6759

                            SHA512

                            892042ac713e4d5b488262a584355dafa18d967035788799c1773eb39a4616461beb9d79a230d9f85cdefd1b4076b8a5e1d4bde17254bff1f08c3eba56469679

                          • C:\Program Files (x86)\GUM690A.tmp\AVGBrowserUpdateCore.exe
                            Filesize

                            512KB

                            MD5

                            dd5dc945cd848bf503862d0a68c3ea5d

                            SHA1

                            9b277a0c733ed5698b0656da8c3b99d2f90c7ef8

                            SHA256

                            8cc98345e367b083f545ace66d93bf69e03a4fa08b84805a9925fa4c94ef3f8f

                            SHA512

                            f6eab8422bde24d89a7723c6175b4197a50e18aa0bb5b8f419e5a23b265d85dcaacaf136b8f6ef6bbf2bd6c0eaecd8f86093f594fb98e596f4b39e9c6ff227e1

                          • C:\Program Files (x86)\GUM690A.tmp\goopdate.dll
                            Filesize

                            1.4MB

                            MD5

                            04a6438c50564146e880c5eb9d57905e

                            SHA1

                            edf5d454de99159d832cc9bd0d8dbe132d749804

                            SHA256

                            26109d47bf9960e531888e6c545ca8cfc24fee2202b549df29fb8bf9c58e0812

                            SHA512

                            8705d0ab2f8a6c1ef567ad00b33ff2cca01391b105eb0ade201d981f091e4ba87e709860ab9849bf9781698fb42ab8efe53ea731af310781766bace1eb1dc19d

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_am.dll
                            Filesize

                            42KB

                            MD5

                            ba03b29d5d44341084eb06bea8f1e702

                            SHA1

                            7d8dd7556ea5e299b55ddc7477ca758fe2c64f48

                            SHA256

                            6a6aad33e2910c29a6d919aad074d89359c5e6723ced7ba4e215a62e9513749b

                            SHA512

                            29f902587b7078deb12bee6bf9993748109749ec12e6490d5f84bc9c532a5a1f414149d5760641ef052611bf2d441423d115dfb5a4c4c6f5e6d6a1f386924cf2

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_ar.dll
                            Filesize

                            41KB

                            MD5

                            9c77be0843f0fe4864a04f8d5f24a593

                            SHA1

                            be03adb4d3c33520e652c7a6ee45f09d5ff54a54

                            SHA256

                            39547fa5d7b93856235288b1021699b4f36f0bea10b10d6b89ea184a3ad77bb1

                            SHA512

                            f504c98b03a5d72c078b38a2cc4fdd94dbed159f5a2ed47c2c4a53fc6ec8a3b1fd969d5ad85fc7503e64427a36adee7a14f15f1275a9194103e43c8a8ee45d28

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_bg.dll
                            Filesize

                            44KB

                            MD5

                            c0b41217fc33a6a53ec69ae7399460f2

                            SHA1

                            d7dd8d543b7297f1a1e138efa1806972c9489c3f

                            SHA256

                            d75a1a41ad7e5277576e3bdf35a858be3a6f540d21c8ab4156c842d8f1b3295b

                            SHA512

                            37abb726b78421aaccdbc94b358cda6b581e89ac519258eb39c6a7f0706cfc64c3a96f5c29539ba67c6e2d2afd6f10b6b0c063b54366c03376ce234d132a8253

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_bn.dll
                            Filesize

                            44KB

                            MD5

                            aedf6d96ccb64f488379bb1fe65f697a

                            SHA1

                            901bbb7873d8f698f49c4b6be74fb50b353d7b5e

                            SHA256

                            941d22186ef1bfe27052e78d21944d6088cea152d1ede51452f04fb032c92f90

                            SHA512

                            d1d889a1fe75924f3569e07d9ee3f552afc02165210f5c439d4697be898b72db397bb89e7d0706259f92c1cb5759009f9e1ba5c52f764e63514b3da41dada1cc

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_ca.dll
                            Filesize

                            44KB

                            MD5

                            f951cf3ca93e5ae5fc1ce2da93121d98

                            SHA1

                            15bc869406857437babe41cd3f500c356913499b

                            SHA256

                            eb00cad19ed1d16f52928962f2cc6231d65eb74b2314976ebeb1ec860103e746

                            SHA512

                            b77086ad2b39723d697d7839d9243c1c0769a2cb0f6287cd3f2d64eabd6a48d8fc2d253e9089c6586637ed5dc5970c2608615fe77cef5003f0c4d53401ef73bc

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_cs.dll
                            Filesize

                            43KB

                            MD5

                            7f3dcd851645d3d75f636c8440fb057f

                            SHA1

                            85debe41ddcb46555a0d00795e41e460a35583c2

                            SHA256

                            0b31785d1931580cad5ef16d4ff5723802d12c38b56746e70fcf91d71162e043

                            SHA512

                            d0d21c397899aaa6a718b77195a6af1556309615616fd6583ecb84b04aa7087e76eb5fdd6cae0a4ff1c0f85bf72e1f51ae002042078095f640eb95da363889e4

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_da.dll
                            Filesize

                            43KB

                            MD5

                            9a421423686559027e4301d36bcf58b2

                            SHA1

                            9669424f4e7c765ddb917a515d5a8b1486f87daf

                            SHA256

                            9d8ff148793d99974fab93f38027e1999323a48620b303f82170751be5dd6b69

                            SHA512

                            f5d62fe17a820323c4b1832cd3bd9c8fa291d44dceb88a8a1a8f94c6166e550ab9baf9357c5ec3388230bc75f0ccd3aa2d5247fa5d242013d22c61001128a951

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_de.dll
                            Filesize

                            45KB

                            MD5

                            1c15851d9dd22e4ae3f3bf249da79035

                            SHA1

                            60fc5652b5e1c55056c961d4d3b961492cb3432b

                            SHA256

                            a9dd72a08c0c58a71b2289d76efae681a5c8eb5faf73e49b873f15ba4050baa6

                            SHA512

                            6da386c35b317f39613da73340631f927606bccd0a8c626537eda896eb32c9a2ed1d71c7cf838f1a4b90553f3f788eeb5e02fe84774fb0ad2f574bf4e4d7e248

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_el.dll
                            Filesize

                            45KB

                            MD5

                            0d15748f01df49dae986f1e27dc098ef

                            SHA1

                            35a435bdaaf47795977b28cdae2e4ea1fdae73a3

                            SHA256

                            df13c38061cb0b02dd8a9023a17da0bbe1cda6fdedad5203129fc702c7fdd9b1

                            SHA512

                            290e9936f50e3bd11c1b9d28decf3b43f5e23bbff16801e7b0491690773d057b6bcdcf48c48a7ee16fa2400723b3e974e2b74e3899590a8e660c2e9c78b9d141

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_en-GB.dll
                            Filesize

                            43KB

                            MD5

                            02465169cd873c4492196e03457f2771

                            SHA1

                            837ca5e54a8c12577d0d05a32996dfc04067c5ea

                            SHA256

                            4eb9edf550bf1f66382e5d8bd4958438891cd2ca46557d14f4b945dc176ec025

                            SHA512

                            e73b5f3951050f2903b80b89d2b9fd9ebf69adb922eb8238ef4c01f413ae67727d7598d4ac15f7ac8b9257aef0139e0924c70c5898357142a303d7e2b15394c3

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_en.dll
                            Filesize

                            42KB

                            MD5

                            418853fe486d8c021d0cca2e85a63d63

                            SHA1

                            9504500a7b5076579d74c23294df4bdb1b7c517d

                            SHA256

                            4cbb2591c1eeda32bcf295685c993ce4d16acc968697fa12e2a00a1b7c4b37a3

                            SHA512

                            dc2ab4e2056e6d73a274d700bc16f75c7c687b35874029c1908b183428dec010373045d4a52eb3f5745f8b91d624cf5d40cd7f37e353f3a41348e2a054a266a3

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_es-419.dll
                            Filesize

                            44KB

                            MD5

                            3e5971e8559c77e8901ce30d14034730

                            SHA1

                            04cc21ac4a84abd29f7d7585282345881fd81721

                            SHA256

                            613418b8779f7440b88f1734d6c514706df9dc9a58a623966cc1c9ba4e29c28f

                            SHA512

                            b4592b25cf676db6d6de1be811c39bdeecc24bbfd4dc72fa4b3f97de866f9b0fec7c85f7d56f048f61829c1d8b4109e4a0c7e14a9e410e30a6a8da702941e00e

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_es.dll
                            Filesize

                            45KB

                            MD5

                            5f8ea18786d5ef1927cd95537abc3ae0

                            SHA1

                            5530650ecc719d83b7aa89e0b326b5698e8adda2

                            SHA256

                            fa416294b078226a8919dbb8f75533a6ef96d63d5bd17aac854eae68791433cf

                            SHA512

                            577dc7d19e4443e8aede759a781826c091c17d12fb06e89b1306133f21e01dab919045183a916e1b5647ddf485134a8459745a9199df5c7e36abe192645d8e25

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_et.dll
                            Filesize

                            43KB

                            MD5

                            5029406d9202d6f2f279fdd3a06f55a1

                            SHA1

                            dcca8bf9392faa0038c6cb5d25929726b16804af

                            SHA256

                            cac545e04d701c39f4a730aec4c3dad177d8ea4baca10651f150925644874864

                            SHA512

                            519538e05f8e21966e4878291692cf25057bba3c993c0034a33b1da7c9eb0a8fb881565717ceb6c1139fd601b73b1f1e2aa46e20aeb6b93f897cd2ef93172934

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_fa.dll
                            Filesize

                            42KB

                            MD5

                            8564514501256ff045cf7aa6c1b5a797

                            SHA1

                            40b9aa8d04c48fe2ecf193c2089418ccc938676d

                            SHA256

                            f3f46a6da6c8ccb3ce7fdd0cb5882f45523decca95852b8c775bb90f8e92c1b3

                            SHA512

                            701077c8a1c70c1bd0c35f54aa838dba7b7b6f832e0ef2776673092fca546276166c3638676451c9655086b740b9e193cd54f952fd5fca481b964083b881bcc2

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_fi.dll
                            Filesize

                            43KB

                            MD5

                            57dad7c22bd635a5af8fcdcd63d4e530

                            SHA1

                            8aa11ea5c1cacd9b23c29989f22e82c43c827d0e

                            SHA256

                            1e0d05927a455115265db9308e0f78ffb7bbb5442f36b8483549efbe415454a2

                            SHA512

                            4236609e37ec41bf46d0f45e228c9021c1624e2f98a642eab513d290a4482da13764fcc2d044f78ebdc09e0cfc63a251678d169cb33e251d6f6d5de9b96c31b6

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_fil.dll
                            Filesize

                            44KB

                            MD5

                            5ed0105f4043466a99557dde1f70e97f

                            SHA1

                            c57c935cc4b25b6375ab3fcdfbb265f4c586ec3e

                            SHA256

                            cfbe0120ddf8d5574f7c44c85488f53aecec4df9bfb25f1cefbabcad5af46096

                            SHA512

                            4fa641810f758e0031388ec146467fc130780e2f2cc8495b6a2fff0679d7bcbe7526356f85a97b5338e84d791ba14e812b2c182fdae01763640be3324fb59526

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_fr.dll
                            Filesize

                            45KB

                            MD5

                            8ddc3f7276c12ac407cadcda6e2a3e12

                            SHA1

                            78c5e802f67c8b6ae3fe13202e6a54d3cca69df4

                            SHA256

                            7f2f0f9f443a022f5aedacc40c28d0654fec488f34435c75979118464256a8b7

                            SHA512

                            0d05bdd2d5e9f36eb09182e8b13507ba03e256c4aadb77bbfedf29584a47fd1e0733a825a3f687d3058e53c8075caf6dd9d24ec93f1bdd58ca97106827323540

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_gu.dll
                            Filesize

                            45KB

                            MD5

                            a4061e8408cc59cb898adfdc4f173278

                            SHA1

                            ae34e3058a40449481590bb3a63aa0225b4f6f98

                            SHA256

                            e033c950ecc6333dfcb944e70622e77a6498ba0e23fd144117dbe9a2a0c15be6

                            SHA512

                            d8a847e9a21c86c7b9b072e16914f42185e3c0e1d99f6ea5259382eb0fb89578c7a7f9f62f892f1d20be180dfc327bc076ea038057895c8b92cb1f0c053e0b2a

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_hi.dll
                            Filesize

                            43KB

                            MD5

                            38525b8a1b15a8aeb4fcfc8bee8358bc

                            SHA1

                            ac2ba33b8ad778a8165c87b579dad0dbef5bed75

                            SHA256

                            271e83bc86e490cd5b6cb9cb34057c7684d233c56a53f4f553aa07507c9dae52

                            SHA512

                            ad8df196174ceeadce4588dcd365066665267b922078d92b328ba661a4ebfa6d06b4263a4b8a28e4efb4d86e1140d71a3c3bf4b7b60970aa20552aa7f0c73acb

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_hr.dll
                            Filesize

                            44KB

                            MD5

                            27c0dbd61a71420bb4d1a0be2373a175

                            SHA1

                            47b4c107b711caf5a6b2978bd6fd6b53ebdec5e3

                            SHA256

                            43191a4c507a112e96e06f959b6cf78406bf970b021ad8d7db59d1b9c52779bd

                            SHA512

                            d1f20e9a628bdcbd26b8d5de89b87bdbc8dab871651c86d47c023daea86c7ada0a565fdd05b48c7643a63db044639f4eb89d1640e58c9b32722e4926c3c5e72a

                          • C:\Program Files (x86)\GUM690A.tmp\goopdateres_hu.dll
                            Filesize

                            44KB

                            MD5

                            114cc594fab2e564ccb24a826f3623e4

                            SHA1

                            c3c3fb4ef6ea6ff0e7a1e0289320b2fd2788b03b

                            SHA256

                            c89e223a42d7173f915dd088ebc84b0048cec772bd4221b4b90ce4c0e419ffe6

                            SHA512

                            9a7eb5710340cecb2d32de26322dc862812e185b6d260d76c0c7f642f30cf9e43c88aec76b515148ef986db0c77fd0e31f71c8fd26d56a4cc72dff0d023abb5d

                          • C:\Program Files\AVG\Browser\Application\127.0.26097.121\Installer\setup.exe
                            Filesize

                            3.3MB

                            MD5

                            67c73b883072bd993ecf0618bbec3312

                            SHA1

                            ae589f1faec5846b4008f307538470e40eb66033

                            SHA256

                            9c454e3342fe945231e5cb53ad2d69a5b9277a83d1d9182256637146b6b318f0

                            SHA512

                            06d41673b9bddd66565b3f740b1fc9da28bf18a56d216bf4ca4c6ff072dcb5d05a92024431ac0e2e866dfe7b4a7cc18d5bbc4a9439dc241d1edd1823d3e16445

                          • C:\Program Files\McAfee\WebAdvisor\Analytics\dataConfig.cab
                            Filesize

                            73KB

                            MD5

                            bd4e67c9b81a9b805890c6e8537b9118

                            SHA1

                            f471d69f9f5fbfb23ff7d3c38b5c5d5e5c5acf27

                            SHA256

                            916f5e284237a9604115709a6274d54cb924b912b365c84322171872502d4bf8

                            SHA512

                            92e1d4a8a93f0bf68fc17288cd1547b2bb9131b8378fbd1ed67a54963a8974717f772e722477417f4eb6c6bb0b3dfba4e7847b20655c3d451cba04f6134c3ab5

                          • C:\Program Files\ReasonLabs\EPP\InstallerLib.dll
                            Filesize

                            337KB

                            MD5

                            717d63e7989f80258d29de10d8460ba2

                            SHA1

                            e705efde0afe88a02ba6bbaa1fa69ce993fbd3f9

                            SHA256

                            210fd6f1cff7875a985d2e8e2e709b2f888b3715a41f1f414b5a531dc7b765d0

                            SHA512

                            5c5a2292c30ab4096b01918f556c5c87be23bccc8beda050695f702258778ed9a8fe2ac482b9d7d721af2b776e776e7ffa9ec7961d7cfb1e9535ee600409292d

                          • C:\Program Files\ReasonLabs\EPP\mc.dll
                            Filesize

                            1.1MB

                            MD5

                            002960b0b7a0372ebd7575a700737c8c

                            SHA1

                            50d15e0f49ba4ad4a776a14845cdd353170e549b

                            SHA256

                            2564dcfd37ea80b43588fea00b6a0c5c02183b247ac898efd517e3ff045f3af8

                            SHA512

                            e2a3f3861a0eabf2e72aafacc367c6effc5c5be6875b75baa97fc8cf6dfd339c137fb8a6f3b0522c9796800d5e6ed6a11699abe896e86adc82050bf48d420ba9

                          • C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dll
                            Filesize

                            346KB

                            MD5

                            474ccefbb74f2ae94c9309891a6f675c

                            SHA1

                            26443edcb19fd5a2259371790e0153810cb640c7

                            SHA256

                            478068dca7fc676ed73d9f3f11389ae796a5bd8377d2fecdf740d3af3f071f88

                            SHA512

                            29fcd19e45c41de4ae1332c625444cb2f9c087afca74c39eb7357ac77219dcb2f795ce31868a3f3a34ca2b491dadf45905fce2d0fa9ddddad6237c7296d79fe8

                          • C:\Program Files\ReasonLabs\EPP\rsEngine.config
                            Filesize

                            6KB

                            MD5

                            da40ddb78a86b1b8c50898c4fa4c4c01

                            SHA1

                            eb030be663a5806e21edb3e0e9f9f0494a8e1af9

                            SHA256

                            326b5e5a574b6a5bf8cdf3459868f15adc509d59446285403100a792662d478f

                            SHA512

                            2c4050487e4b394534bc7b3e5804786349003226ca8addfa58000f1fb82c76b82c3f8e8dfec5ee8e771d8e164f8a4cc61a93f93d6536ef44ef8923c9de41a459

                          • C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLog
                            Filesize

                            606B

                            MD5

                            43fbbd79c6a85b1dfb782c199ff1f0e7

                            SHA1

                            cad46a3de56cd064e32b79c07ced5abec6bc1543

                            SHA256

                            19537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0

                            SHA512

                            79b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea

                          • C:\Program Files\ReasonLabs\EPP\ui\EPP.exe
                            Filesize

                            2.2MB

                            MD5

                            28ae7c94fb6d1f1998c872cec8f24d6c

                            SHA1

                            6fa98412fcf10b5e415f2ac0f56d7afb02961be9

                            SHA256

                            a2b6214df520913c4ad4a0962711d9334705f23ab9afac625b4a6594170ecfb4

                            SHA512

                            a156bfb052b08e1d1775579dcb28b71a803e1c66f38c96646e46aef5f3e770f9bb7fcbe4dc4c0149487da45db4535e68dca66041ed4bbb6c13a642e8a2f3533d

                          • C:\Program Files\ReasonLabs\EPP\x64\elam\rsElam.sys
                            Filesize

                            19KB

                            MD5

                            8129c96d6ebdaebbe771ee034555bf8f

                            SHA1

                            9b41fb541a273086d3eef0ba4149f88022efbaff

                            SHA256

                            8bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51

                            SHA512

                            ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18

                          • C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txt
                            Filesize

                            1KB

                            MD5

                            fa6d8542efadc38acdab5d72abb074f4

                            SHA1

                            2e75b4db7ab618a8ba262fe65beb68063f05f864

                            SHA256

                            1c53d4d762cb17774eea92ae52cd39d2c57ea1d4652ff7ad92aa6ed7457f7e02

                            SHA512

                            060e1a72ca828e3e90f9674c13dc7b245c5cc886a70044dbc127ac25cff53c4ef82490deefe7e5e8cc5229403f35794515a0aacd74e16dba9947b85103ac052c

                          • C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txt
                            Filesize

                            6KB

                            MD5

                            eea59a3984843896bffd6ce0ad7ecc76

                            SHA1

                            f0c54dea8751bba89fce0dfa10f488d00f4f8e69

                            SHA256

                            6fd04a4ef2e5af8b5639f5d454d6636cc79d8abf05f2a1eb99c1740e267babf4

                            SHA512

                            35a2619c9d313a297b0c5b6d4138ccc3fb22d73d59f9516a7329f2a8eb7edbf8854eed6f132d3134a5b3caa6f172f6b7070e30929622ef35fe2cf9aabc0b5300

                          • C:\Users\Admin\AppData\Local\Temp\1mjrrjok.exe
                            Filesize

                            2.4MB

                            MD5

                            a21d92bcadf5bdfc0f4754e008b8290f

                            SHA1

                            b4648409f3001c3423f425d89a44b0748731043c

                            SHA256

                            e7bd95d15ff5652c6da816893a5fa33b7ff090aa98bf0fd5e23d507b09f8c89e

                            SHA512

                            75bf74c86a15e56e47d22e54eb251294cf29c72fa67ac9298f8adc501a5f1b62e8fb56d206d3805659dd58e9ef09367aa94f7d528509542082e98fc528ded807

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\Microsoft.Win32.TaskScheduler.dll
                            Filesize

                            340KB

                            MD5

                            e6a31390a180646d510dbba52c5023e6

                            SHA1

                            2ac7bac9afda5de2194ca71ee4850c81d1dabeca

                            SHA256

                            cccc64ba9bbe3897c32f586b898f60ad0495b03a16ee3246478ee35e7f1063ec

                            SHA512

                            9fd39169769b70a6befc6056d34740629fcf680c9ba2b7d52090735703d9599455c033394f233178ba352199015a384989acf1a48e6a5b765b4b33c5f2971d42

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\Newtonsoft.Json.dll
                            Filesize

                            701KB

                            MD5

                            4f0f111120d0d8d4431974f70a1fdfe1

                            SHA1

                            b81833ac06afc6b76fb73c0857882f5f6d2a4326

                            SHA256

                            d043e6cde1f4d8396978cee2d41658b307be0ca4698c92333814505aa0ccab9a

                            SHA512

                            e123d2f9f707eb31741ef8615235e714a20c6d754a13a97d0414c46961c3676025633eb1f65881b2d6d808ec06a70459c860411d6dd300231847b01ed0ce9750

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\UnifiedStub-installer.exe
                            Filesize

                            1.0MB

                            MD5

                            493d5868e37861c6492f3ac509bed205

                            SHA1

                            1050a57cf1d2a375e78cc8da517439b57a408f09

                            SHA256

                            dc5bc92e51f06e9c66e3933d98dc8f8d217bc74b71f93d900e4d42b1fb5cc64f

                            SHA512

                            e7e37075a1c389e0cad24ce2c899e89c4970e52b3f465d372a7bc171587ed1ee7d4f0a6ba44ab40b18fdf0689f4e29dfdbccbabb07e0f004ef2f894cb20d995d

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\edb5c676-0301-43c1-a435-8de4a9d9e5a2\UnifiedStub-installer.exe\assembly\dl3\0f68d8f3\ef487441_2afeda01\rsJSON.DLL
                            Filesize

                            221KB

                            MD5

                            4ff4665dedb0cd456542d6496a0244d4

                            SHA1

                            9c5703ed072185723934a48e59dd279aa82dc284

                            SHA256

                            06fb55b0a5ac9908805867860b504ee183791088f99de5ddc02bf63b4322a86f

                            SHA512

                            28cc4ddb479a0c44d60ee12da8f9969e5bda822394ad65f16dbe5e637a6ab049ac52f4a729c3bac1725f97b8e95ee6c302a17ca10b040d5574df71ccff225896

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\edb5c676-0301-43c1-a435-8de4a9d9e5a2\UnifiedStub-installer.exe\assembly\dl3\2d1a9b6c\0aab7641_2afeda01\rsLogger.DLL
                            Filesize

                            183KB

                            MD5

                            7d3da27f015487f44111e10bd51427d8

                            SHA1

                            0ad75a0c33ddb282f5c6935f13551e26e37ddf6e

                            SHA256

                            eff54120bb45593e9d71276d45cf0c0536fa6f274f4e9aa2ff097484e2a2a882

                            SHA512

                            809ca50574f052105edcc40484369ac8774d8d86b0e447d03f41bbbf0b47dec25e24426c6fbd07c02b9817d55654d38556655e32ec70c99987bace21cddef6d6

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\edb5c676-0301-43c1-a435-8de4a9d9e5a2\UnifiedStub-installer.exe\assembly\dl3\e5ea8d29\0aab7641_2afeda01\rsServiceController.DLL
                            Filesize

                            183KB

                            MD5

                            61ee0fc6e3a5e22800dc0c508ceebc87

                            SHA1

                            d306f559b2e4c7064012dae675b7fc707e2e3b76

                            SHA256

                            ce8abebc4d0549e55068c7f4fcf66089b4c27275386b26c0c895eafd69aaa47a

                            SHA512

                            e87a5b34eb851f39a13744c8a10dbea70db8c78d4d2e6c6654bb955a1f748de5c7140a0e88d9ce230febb1c140e810ad66b88f1a49aa2742c9b4673aba3a928b

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\edb5c676-0301-43c1-a435-8de4a9d9e5a2\UnifiedStub-installer.exe\assembly\tmp\TDJ2VNMW\rsAtom.DLL
                            Filesize

                            171KB

                            MD5

                            977069f5717eb555f4105cc90337e5d5

                            SHA1

                            fd0cc9cbd6cf41bd79f7b85733bf935343013eb6

                            SHA256

                            b992d4e90f5855d6e2b23d8f07bc25ce01d036adc9a0fb8fd20980b2a3f53b6c

                            SHA512

                            7cc613891799bf8badbadd9635c63ca6a53fd4defa041fa88644f047d66823289157280c5dfb05e83673c4f3f51c8cdba348d405dc0d7251d304536dc11deda1

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\rsAtom.dll
                            Filesize

                            169KB

                            MD5

                            dc15f01282dc0c87b1525f8792eaf34e

                            SHA1

                            ad4fdf68a8cffedde6e81954473dcd4293553a94

                            SHA256

                            cc036bcf74911fe5afb8e9fcc0d52b3f08b4961bcda4e50851eda4159b1c9998

                            SHA512

                            54ee7b7a638d0defcff3a80f0c87705647b722d3d177bc11e80bfe6062a41f138ef99fc8e4c42337b61c0407469ef684b704f710b8ead92b83a14f609f0bc078

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\rsLogger.dll
                            Filesize

                            182KB

                            MD5

                            1cfc3fc56fe40842094c7506b165573a

                            SHA1

                            023b3b389fdfa7a9557623b2742f0f40e4784a5c

                            SHA256

                            187da6a5ab64c9b814ab8e1775554688ad3842c3f52f5f318291b9a37d846aa2

                            SHA512

                            6bd1ceaf12950d047a87fd2d9c1884c7ac6e45bd94f11be8df8144ddd3f71db096469d1c775cf1cb8bc7926f922e5a6676b759707053e2332aa66f86c951fbc0

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\rsStubLib.dll
                            Filesize

                            271KB

                            MD5

                            3bcbeaab001f5d111d1db20039238753

                            SHA1

                            4a9c0048bbbf04aa9fe3dfb9ce3b959da5d960f8

                            SHA256

                            897131dd2f9d1e08d66ae407fe25618c8affb99b6da54378521bf4403421b01a

                            SHA512

                            de6cde3ad47e6f3982e089700f6184e147a61926f33ead4e2ff5b00926cfc55eb28be6f63eea53f7d15f555fd820453dd3211f0ba766cb3e939c14bb5e0cfc4c

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\rsSyncSvc.exe
                            Filesize

                            798KB

                            MD5

                            f2738d0a3df39a5590c243025d9ecbda

                            SHA1

                            2c466f5307909fcb3e62106d99824898c33c7089

                            SHA256

                            6d61ac8384128e2cf3dcd451a33abafab4a77ed1dd3b5a313a8a3aaec2b86d21

                            SHA512

                            4b5ed5d80d224f9af1599e78b30c943827c947c3dc7ee18d07fe29b22c4e4ecdc87066392a03023a684c4f03adc8951bb5b6fb47de02fb7db380f13e48a7d872

                          • C:\Users\Admin\AppData\Local\Temp\7zS8D8A2F11\uninstall-epp.exe
                            Filesize

                            319KB

                            MD5

                            79638251b5204aa3929b8d379fa296bb

                            SHA1

                            9348e842ba18570d919f62fe0ed595ee7df3a975

                            SHA256

                            5bedfd5630ddcd6ab6cc6b2a4904224a3cb4f4d4ff0a59985e34eea5cd8cf79d

                            SHA512

                            ab234d5815b48555ddebc772fae5fa78a64a50053bdf08cc3db21c5f7d0e3154e0726dacfc3ea793a28765aea50c7a73011f880363cbc8d39a1c62e5ed20c5a9

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\AVG_BRW.png
                            Filesize

                            29KB

                            MD5

                            0b4fa89d69051df475b75ca654752ef6

                            SHA1

                            81bf857a2af9e3c3e4632cbb88cd71e40a831a73

                            SHA256

                            60a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e

                            SHA512

                            8106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\CheatEngine75.exe
                            Filesize

                            26.1MB

                            MD5

                            e0f666fe4ff537fb8587ccd215e41e5f

                            SHA1

                            d283f9b56c1e36b70a74772f7ca927708d1be76f

                            SHA256

                            f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af

                            SHA512

                            7f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\RAV_Cross.png
                            Filesize

                            74KB

                            MD5

                            cd09f361286d1ad2622ba8a57b7613bd

                            SHA1

                            4cd3e5d4063b3517a950b9d030841f51f3c5f1b1

                            SHA256

                            b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8

                            SHA512

                            f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\WebAdvisor.png
                            Filesize

                            47KB

                            MD5

                            4cfff8dc30d353cd3d215fd3a5dbac24

                            SHA1

                            0f4f73f0dddc75f3506e026ef53c45c6fafbc87e

                            SHA256

                            0c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856

                            SHA512

                            9d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\logo.png
                            Filesize

                            246KB

                            MD5

                            f3d1b8cd125a67bafe54b8f31dda1ccd

                            SHA1

                            1c6b6bf1e785ad80fc7e9131a1d7acbba88e8303

                            SHA256

                            21dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf

                            SHA512

                            c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod0.exe
                            Filesize

                            32KB

                            MD5

                            68bab90da25443478db8e9d0813dfbf8

                            SHA1

                            334d1776088bd26776a73a346a7075ba03d0ea92

                            SHA256

                            754e29de4a0035b371fe0e9de3808f3f1405d2f8c04201b906ed8f9318158969

                            SHA512

                            c033e2e3f0ea9dcf7541f6881f9d3fc9b470a4e520c079f80239520a9797d22e816800486d384aa7bc4fb05955a534f94b59148ac32d0cd493f84517495cb1d4

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1.zip
                            Filesize

                            515KB

                            MD5

                            f68008b70822bd28c82d13a289deb418

                            SHA1

                            06abbe109ba6dfd4153d76cd65bfffae129c41d8

                            SHA256

                            cc6f4faf4e8a9f4d2269d1d69a69ea326f789620fb98078cc98597f3cb998589

                            SHA512

                            fa482942e32e14011ae3c6762c638ccb0a0e8ec0055d2327c3acc381dddf1400de79e4e9321a39a418800d072e59c36b94b13b7eb62751d3aec990fb38ce9253

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\installer.exe
                            Filesize

                            25.9MB

                            MD5

                            622b9844fcad806c124c810c1b852b51

                            SHA1

                            123056b8bf5d09cba8a7dd3344277d1ba5500bac

                            SHA256

                            f67b177ee10e72a7865b96de49591441def17f7d33015e673d91723f8b447566

                            SHA512

                            f35ba8609990a7de7bd16e4cc2daf53c3f79badbb06c5770b8c39300624411e3aab743294d94ad987a4db7cb34447a85fea41344e5b5ebc2ed8beb192551ba9d

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod1_extract\saBSI.exe
                            Filesize

                            1.1MB

                            MD5

                            143255618462a577de27286a272584e1

                            SHA1

                            efc032a6822bc57bcd0c9662a6a062be45f11acb

                            SHA256

                            f5aa950381fbcea7d730aa794974ca9e3310384a95d6cf4d015fbdbd9797b3e4

                            SHA512

                            c0a084d5c0b645e6a6479b234fa73c405f56310119dd7c8b061334544c47622fdd5139db9781b339bb3d3e17ac59fddb7d7860834ecfe8aad6d2ae8c869e1cb9

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod2.zip
                            Filesize

                            5.7MB

                            MD5

                            6406abc4ee622f73e9e6cb618190af02

                            SHA1

                            2aa23362907ba1c48eca7f1a372c2933edbb7fa1

                            SHA256

                            fd83d239b00a44698959145449ebfcb8c52687327deac04455e77a710a3dfe1b

                            SHA512

                            dd8e43f8a8f6c6e491179240bdfefdf30002f3f2900b1a319b4251dfa9ca7b7f87ddf170ba868ab520f94de9cc7d1854e3bcfd439cad1e8b4223c7ee06d649f1

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\prod2_extract\avg_secure_browser_setup.exe
                            Filesize

                            5.8MB

                            MD5

                            591059d6711881a4b12ad5f74d5781bf

                            SHA1

                            33362f43eaf8ad42fd6041d9b08091877fd2efba

                            SHA256

                            99e8de20a35a362c2a61c0b9e48fe8eb8fc1df452134e7b6390211ab19121a65

                            SHA512

                            6280064a79ca36df725483e3269bc1e729e67716255f18af542531d7824a5d76b38a7dcefca048022c861ffcbd0563028d39310f987076f6a5da6c7898c1984c

                          • C:\Users\Admin\AppData\Local\Temp\is-8EBRC.tmp\zbShieldUtils.dll
                            Filesize

                            2.0MB

                            MD5

                            b83f5833e96c2eb13f14dcca805d51a1

                            SHA1

                            9976b0a6ef3dabeab064b188d77d870dcdaf086d

                            SHA256

                            00e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401

                            SHA512

                            8641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb

                          • C:\Users\Admin\AppData\Local\Temp\is-BT7O1.tmp\CheatEngine75.tmp
                            Filesize

                            3.1MB

                            MD5

                            349c57b17c961abbe59730d3cc5614b2

                            SHA1

                            32278b8621491e587a08f0764501b8b8314fd94c

                            SHA256

                            de28f1f10d5136dc5b30ccb73750559cca91720533717e9398ee45a44c75481b

                            SHA512

                            54d54d8b682c8cf9b06452a493e96307bfd9b8193f21e8eb5e89ad4420e1f6e066cf8bdeb70444ebcf2297520a4716ae1910124f21cab98e012f0fd19783c1f5

                          • C:\Users\Admin\AppData\Local\Temp\is-E0IAL.tmp\CheatEngine75.tmp
                            Filesize

                            3.1MB

                            MD5

                            9aa2acd4c96f8ba03bb6c3ea806d806f

                            SHA1

                            9752f38cc51314bfd6d9acb9fb773e90f8ea0e15

                            SHA256

                            1b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb

                            SHA512

                            b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\AVGBrowserUpdateSetup.exe
                            Filesize

                            1.6MB

                            MD5

                            9750ea6c750629d2ca971ab1c074dc9d

                            SHA1

                            7df3d1615bec8f5da86a548f45f139739bde286b

                            SHA256

                            cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c

                            SHA512

                            2ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\CR.History.tmp
                            Filesize

                            160KB

                            MD5

                            f310cf1ff562ae14449e0167a3e1fe46

                            SHA1

                            85c58afa9049467031c6c2b17f5c12ca73bb2788

                            SHA256

                            e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                            SHA512

                            1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\CR.History.tmp
                            Filesize

                            116KB

                            MD5

                            4e2922249bf476fb3067795f2fa5e794

                            SHA1

                            d2db6b2759d9e650ae031eb62247d457ccaa57d2

                            SHA256

                            c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1

                            SHA512

                            8e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\FF.places.tmp
                            Filesize

                            5.0MB

                            MD5

                            b11baf554aa38036dcf761f1bd7cc9d5

                            SHA1

                            1070dbd3ac639dc3662946e3496f37c0a36c9061

                            SHA256

                            87d7b081ca0e24da7c073657a545d985c28fae04da401013f1fd13a5ab1f0ddc

                            SHA512

                            daa70fb5669f8e3a5ee31a3a9a25113309a896701f6f100eb0d79568ab6785cba95929baa95445584967aee2dff35153bce2fd76703cdb04623b08a96f1f003e

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\JsisPlugins.dll
                            Filesize

                            2.1MB

                            MD5

                            bd94620c8a3496f0922d7a443c750047

                            SHA1

                            23c4cb2b4d5f5256e76e54969e7e352263abf057

                            SHA256

                            c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644

                            SHA512

                            954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\Midex.dll
                            Filesize

                            126KB

                            MD5

                            581c4a0b8de60868b89074fe94eb27b9

                            SHA1

                            70b8bdfddb08164f9d52033305d535b7db2599f6

                            SHA256

                            b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd

                            SHA512

                            94290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\StdUtils.dll
                            Filesize

                            195KB

                            MD5

                            7602b88d488e54b717a7086605cd6d8d

                            SHA1

                            c01200d911e744bdffa7f31b3c23068971494485

                            SHA256

                            2640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11

                            SHA512

                            a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\jsis.dll
                            Filesize

                            127KB

                            MD5

                            4b27df9758c01833e92c51c24ce9e1d5

                            SHA1

                            c3e227564de6808e542d2a91bbc70653cf88d040

                            SHA256

                            d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb

                            SHA512

                            666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\nsJSON.dll
                            Filesize

                            36KB

                            MD5

                            ddb56a646aea54615b29ce7df8cd31b8

                            SHA1

                            0ea1a1528faafd930ddceb226d9deaf4fa53c8b2

                            SHA256

                            07e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069

                            SHA512

                            5d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8

                          • C:\Users\Admin\AppData\Local\Temp\nsl5A37.tmp\thirdparty.dll
                            Filesize

                            93KB

                            MD5

                            070335e8e52a288bdb45db1c840d446b

                            SHA1

                            9db1be3d0ab572c5e969fea8d38a217b4d23cab2

                            SHA256

                            c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc

                            SHA512

                            6f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c

                          • memory/568-375-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-35-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-44-0x0000000002F10000-0x0000000003050000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/568-40-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-45-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-39-0x0000000002F10000-0x0000000003050000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/568-33-0x0000000002F10000-0x0000000003050000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/568-2439-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-34-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-67-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-29-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-6-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/568-25-0x0000000002F10000-0x0000000003050000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/568-26-0x0000000000400000-0x000000000071C000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/1052-251-0x0000000000400000-0x00000000004D8000-memory.dmp
                            Filesize

                            864KB

                          • memory/1052-1041-0x0000000000400000-0x00000000004D8000-memory.dmp
                            Filesize

                            864KB

                          • memory/1312-274-0x000001F2EE4E0000-0x000001F2EE526000-memory.dmp
                            Filesize

                            280KB

                          • memory/1312-301-0x000001F2EE640000-0x000001F2EE662000-memory.dmp
                            Filesize

                            136KB

                          • memory/1312-4698-0x000001F2EEF50000-0x000001F2EEF80000-memory.dmp
                            Filesize

                            192KB

                          • memory/1312-4673-0x000001F2EEDA0000-0x000001F2EEDD0000-memory.dmp
                            Filesize

                            192KB

                          • memory/1312-4662-0x000001F2EEEA0000-0x000001F2EEEDA000-memory.dmp
                            Filesize

                            232KB

                          • memory/1312-351-0x000001F2EEBA0000-0x000001F2EEBF8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1312-318-0x000001F2EE7C0000-0x000001F2EE7EE000-memory.dmp
                            Filesize

                            184KB

                          • memory/1312-3008-0x000001F2EEE40000-0x000001F2EEE96000-memory.dmp
                            Filesize

                            344KB

                          • memory/1312-272-0x000001F2D3F20000-0x000001F2D402C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/1312-278-0x000001F2D5C70000-0x000001F2D5CA0000-memory.dmp
                            Filesize

                            192KB

                          • memory/1312-4685-0x000001F2EEDA0000-0x000001F2EEDCE000-memory.dmp
                            Filesize

                            184KB

                          • memory/1312-300-0x000001F2EE700000-0x000001F2EE7B2000-memory.dmp
                            Filesize

                            712KB

                          • memory/1312-2972-0x000001F2EEC50000-0x000001F2EECA0000-memory.dmp
                            Filesize

                            320KB

                          • memory/1468-924-0x0000000000400000-0x000000000071B000-memory.dmp
                            Filesize

                            3.1MB

                          • memory/2176-0-0x0000000000400000-0x00000000004D8000-memory.dmp
                            Filesize

                            864KB

                          • memory/2176-2-0x0000000000401000-0x00000000004B7000-memory.dmp
                            Filesize

                            728KB

                          • memory/2176-27-0x0000000000400000-0x00000000004D8000-memory.dmp
                            Filesize

                            864KB

                          • memory/4908-902-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-912-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1034-0x00007FF7A7370000-0x00007FF7A7380000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1028-0x00007FF7C2AA0000-0x00007FF7C2AB0000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1015-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1013-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1011-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1010-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1005-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-996-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-989-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-988-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-967-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-959-0x00007FF806560000-0x00007FF806570000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1045-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-957-0x00007FF806560000-0x00007FF806570000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-895-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-941-0x00007FF806560000-0x00007FF806570000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-929-0x00007FF7CBC70000-0x00007FF7CBC80000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-928-0x00007FF7C94E0000-0x00007FF7C94F0000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-998-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-922-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-921-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-920-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-919-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-918-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-917-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-916-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-915-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-914-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-913-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-1044-0x00007FF7B6D30000-0x00007FF7B6D40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-911-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-923-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-910-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-909-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-908-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-907-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-897-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-899-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-901-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-905-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-906-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-903-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-904-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-900-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-898-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-892-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-893-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/4908-894-0x00007FF794B30000-0x00007FF794B40000-memory.dmp
                            Filesize

                            64KB

                          • memory/5000-66-0x00000179FE970000-0x00000179FE978000-memory.dmp
                            Filesize

                            32KB

                          • memory/5000-68-0x00007FFCDD7D3000-0x00007FFCDD7D5000-memory.dmp
                            Filesize

                            8KB

                          • memory/5000-69-0x0000017999940000-0x0000017999E68000-memory.dmp
                            Filesize

                            5.2MB

                          • memory/5688-4724-0x00000172031D0000-0x00000172031FE000-memory.dmp
                            Filesize

                            184KB

                          • memory/5688-4733-0x00000172031D0000-0x00000172031FE000-memory.dmp
                            Filesize

                            184KB

                          • memory/5688-4747-0x00000172036D0000-0x000001720370C000-memory.dmp
                            Filesize

                            240KB

                          • memory/5688-4746-0x0000017203670000-0x0000017203682000-memory.dmp
                            Filesize

                            72KB

                          • memory/7360-4785-0x0000023670D80000-0x00000236710E6000-memory.dmp
                            Filesize

                            3.4MB

                          • memory/7360-4786-0x00000236710F0000-0x000002367126C000-memory.dmp
                            Filesize

                            1.5MB

                          • memory/7360-4787-0x0000023670310000-0x000002367032A000-memory.dmp
                            Filesize

                            104KB

                          • memory/7360-4788-0x0000023670A40000-0x0000023670A62000-memory.dmp
                            Filesize

                            136KB