Analysis
-
max time kernel
108s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
CheatEngine75 (1).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CheatEngine75 (1).exe
Resource
win10v2004-20240802-en
General
-
Target
CheatEngine75 (1).exe
-
Size
28.6MB
-
MD5
e703b8ac5b3601deebbf05843c9a4e97
-
SHA1
ab154e32099776e432b4d2c31366985f27950cf1
-
SHA256
fe6c0d8f90c9c74f2986fe169342e0a5319a3b1ffcf711b513f33db7e28e863a
-
SHA512
8280af1c2455b37c13de60f1d4a4ab26fe7d03bed7f874b074afb4ae365f2380aa71525e7e649e924347c38efd601dd3a6b7924f56aa6c09932f24b5c2f03c65
-
SSDEEP
786432:dTCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFH2:d2EXFhV0KAcNjxAItj2
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat.tmp disable_win_def -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
setup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\ = "AVG Secure Browser" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\StubPath = "\"C:\\Program Files\\AVG\\Browser\\Application\\128.0.26382.138\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{48F69C39-1356-4A7B-A899-70E3539D4982}\Localized Name = "AVG Secure Browser" setup.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
UnifiedStub-installer.exedescription ioc process File opened for modification C:\Windows\system32\drivers\rsElam.sys UnifiedStub-installer.exe File created C:\Windows\system32\drivers\rsCamFilter020502.sys UnifiedStub-installer.exe File created C:\Windows\system32\drivers\rsKernelEngine.sys UnifiedStub-installer.exe File created C:\Windows\system32\drivers\rsElam.sys UnifiedStub-installer.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
Processes:
AVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGBrowserUpdate.exe\DisableExceptionChainValidation = "0" AVGBrowserUpdate.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rsEDRSvc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rsEDRSvc.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UIHost.exeCheat Engine.exeCheat Engine.exeCheatEngine75 (1).tmpprod0.exeavg_secure_browser_setup.exeAVGBrowserUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation UIHost.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Cheat Engine.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Cheat Engine.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation CheatEngine75 (1).tmp Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation prod0.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation avg_secure_browser_setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation AVGBrowserUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 43 IoCs
Processes:
CheatEngine75 (1).tmpprod0.exesaBSI.exeavg_secure_browser_setup.exeeedkdy35.exeCheatEngine75.exeUnifiedStub-installer.exeCheatEngine75.tmp_setup64.tmprsSyncSvc.exeinstaller.exersSyncSvc.exeinstaller.exeAVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeKernelmoduleunloader.exeAVGBrowserUpdateComRegisterShell64.exeServiceHost.exewindowsrepair.exeAVGBrowserUpdateComRegisterShell64.exeUIHost.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeCheat Engine.execheatengine-x86_64-SSE4-AVX2.exeCheat Engine.execheatengine-x86_64-SSE4-AVX2.exeupdater.exeAVGBrowserInstaller.exesetup.exesetup.exersWSC.exersWSC.exersClientSvc.exersClientSvc.exersEngineSvc.exersEngineSvc.exersEDRSvc.exersEDRSvc.exepid process 2972 CheatEngine75 (1).tmp 2632 prod0.exe 3628 saBSI.exe 4612 avg_secure_browser_setup.exe 1208 eedkdy35.exe 4956 CheatEngine75.exe 2512 UnifiedStub-installer.exe 4820 CheatEngine75.tmp 4108 _setup64.tmp 4304 rsSyncSvc.exe 1464 installer.exe 2184 rsSyncSvc.exe 2268 installer.exe 2508 AVGBrowserUpdateSetup.exe 3272 AVGBrowserUpdate.exe 6548 AVGBrowserUpdate.exe 5184 AVGBrowserUpdate.exe 6040 AVGBrowserUpdateComRegisterShell64.exe 6616 Kernelmoduleunloader.exe 6724 AVGBrowserUpdateComRegisterShell64.exe 6788 ServiceHost.exe 4356 windowsrepair.exe 5144 AVGBrowserUpdateComRegisterShell64.exe 6280 UIHost.exe 6840 AVGBrowserUpdate.exe 6892 AVGBrowserUpdate.exe 6996 AVGBrowserUpdate.exe 4484 Cheat Engine.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6292 Cheat Engine.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 7100 updater.exe 856 AVGBrowserInstaller.exe 3212 setup.exe 3612 setup.exe 5924 rsWSC.exe 6412 rsWSC.exe 424 rsClientSvc.exe 6760 rsClientSvc.exe 4536 rsEngineSvc.exe 7176 rsEngineSvc.exe 8116 rsEDRSvc.exe 8128 rsEDRSvc.exe -
Loads dropped DLL 53 IoCs
Processes:
CheatEngine75 (1).tmpavg_secure_browser_setup.exeinstaller.exeAVGBrowserUpdate.exeregsvr32.exeAVGBrowserUpdate.exeregsvr32.exeAVGBrowserUpdate.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeServiceHost.exeAVGBrowserUpdateComRegisterShell64.exeUIHost.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeUnifiedStub-installer.execheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exersEngineSvc.exersEDRSvc.exepid process 2972 CheatEngine75 (1).tmp 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 2268 installer.exe 3272 AVGBrowserUpdate.exe 2772 regsvr32.exe 6548 AVGBrowserUpdate.exe 5308 regsvr32.exe 5184 AVGBrowserUpdate.exe 6040 AVGBrowserUpdateComRegisterShell64.exe 5184 AVGBrowserUpdate.exe 6724 AVGBrowserUpdateComRegisterShell64.exe 5184 AVGBrowserUpdate.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 5144 AVGBrowserUpdateComRegisterShell64.exe 6788 ServiceHost.exe 5184 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 6280 UIHost.exe 6280 UIHost.exe 6840 AVGBrowserUpdate.exe 6892 AVGBrowserUpdate.exe 6996 AVGBrowserUpdate.exe 2512 UnifiedStub-installer.exe 6996 AVGBrowserUpdate.exe 6892 AVGBrowserUpdate.exe 6996 AVGBrowserUpdate.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 6588 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe 2512 UnifiedStub-installer.exe 7176 rsEngineSvc.exe 8128 rsEDRSvc.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exeicacls.exepid process 6060 icacls.exe 5084 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks for any installed AV software in registry 1 TTPs 11 IoCs
Processes:
CheatEngine75 (1).tmpavg_secure_browser_setup.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Browser\Installed CheatEngine75 (1).tmp Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Avira\Browser\Installed CheatEngine75 (1).tmp Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\AVAST Software\Avast avg_secure_browser_setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast CheatEngine75 (1).tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir CheatEngine75 (1).tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Browser\Installed CheatEngine75 (1).tmp Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\AVG\AV\Dir CheatEngine75 (1).tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast avg_secure_browser_setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast CheatEngine75 (1).tmp Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\AVAST Software\Avast CheatEngine75 (1).tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir CheatEngine75 (1).tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies powershell logging option 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
avg_secure_browser_setup.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exedescription ioc process File opened for modification \??\PhysicalDrive0 avg_secure_browser_setup.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe File opened for modification \??\PhysicalDrive0 AVGBrowserUpdate.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp autoit_exe -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
rsEDRSvc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName rsEDRSvc.exe -
Drops file in System32 directory 64 IoCs
Processes:
cheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exedescription ioc process File opened for modification C:\Windows\SYSTEM32\wininet.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\MSCTF.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ucrtbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\win32u.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\GDI32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\advapi32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\sechost.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcp_win.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ws2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\user32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\shell32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\win32u.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ucrtbase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\user32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\gdi32full.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\KERNELBASE.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\SHLWAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\MSCTF.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\imm32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ws2_32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\winmm.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\combase.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\apphelp.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\advapi32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\msvcrt.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\clbcatq.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\SHLWAPI.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\system32\explorerframe.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\RPCRT4.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\version.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\oleaut32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\version.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\comdlg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\ole32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\System32\psapi.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\SYSTEM32\winmm.dll cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
installer.exeCheatEngine75.tmpUnifiedStub-installer.exeinstaller.exeAVGBrowserUpdateSetup.exesetup.execheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exeServiceHost.exedescription ioc process File created C:\Program Files\McAfee\Temp3998184786\jslang\eula-fr-FR.txt installer.exe File created C:\Program Files\Cheat Engine 7.5\plugins\c# template\CEPluginLibrary\SDK\is-1FLT7.tmp CheatEngine75.tmp File created C:\Program Files\ReasonLabs\EPP\System.Text.Encoding.dll UnifiedStub-installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-score-toast-es-MX.js installer.exe File created C:\Program Files (x86)\GUM2D74.tmp\goopdateres_it.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Wsc.dll UnifiedStub-installer.exe File created C:\Program Files\AVG\Browser\Temp\source3212_477834564\Safer-bin\128.0.26382.138\MEIPreload\manifest.json setup.exe File opened for modification C:\Program Files\Cheat Engine 7.5\autorun\dlls\64\CEJVMTI.dll CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\autorun\forms\is-C84JA.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\dll\tcc64-64.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.6.0\locales\ms.pak UnifiedStub-installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\user32.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\Temp3998184786\jslang\eula-pt-PT.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-pscore-toast-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-el-GR.js installer.exe File created C:\Program Files\McAfee\Temp3998184786\wa_install_error.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-ru-RU.js installer.exe File created C:\Program Files\Cheat Engine 7.5\is-S06UM.tmp CheatEngine75.tmp File created C:\Program Files\ReasonLabs\EPP\System.IO.Pipes.dll UnifiedStub-installer.exe File created C:\Program Files (x86)\GUM2D74.tmp\goopdateres_mr.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-fr-FR.js installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.IO.FileSystem.Primitives.dll UnifiedStub-installer.exe File created C:\Program Files\Cheat Engine 7.5\is-1QDAO.tmp CheatEngine75.tmp File opened for modification C:\Program Files\Cheat Engine 7.5\ucrtbase.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\shell32.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\user32.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.Net.Requests.dll UnifiedStub-installer.exe File created C:\Program Files\AVG\Browser\Temp\source3212_477834564\Safer-bin\128.0.26382.138\Locales\lt.pak setup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-ru-RU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-nl-NL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-pps-zh-TW.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\context\msspstatus.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\wabadgenotificationcounter.luc installer.exe File opened for modification C:\Program Files\McAfee\Webadvisor\Analytics\config_manager.js ServiceHost.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\InputHost.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\System.Reflection.dll UnifiedStub-installer.exe File created C:\Program Files (x86)\GUM2D74.tmp\goopdateres_hu.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-hu-HU.js installer.exe File created C:\Program Files\Cheat Engine 7.5\is-JHTH0.tmp CheatEngine75.tmp File created C:\Program Files\Cheat Engine 7.5\include\is-BE1U8.tmp CheatEngine75.tmp File created C:\Program Files\McAfee\WebAdvisor\analyticstelemetry\context\wssversion.luc installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.6.0\locales\zh-TW.pak UnifiedStub-installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\rpcrt4.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\lua53-64.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\mwb\wb-rocket-icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\new-tab-res-toast-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\switch_off.png installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dll\psapi.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\symbols\dll\Windows.Storage.pdb cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Program Files\Cheat Engine 7.5\dbghelp.pdb cheatengine-x86_64-SSE4-AVX2.exe File created C:\Program Files\ReasonLabs\EPP\ui\app.asar.unpacked\electron\node_modules\@reasonsoftware\windows-notification-state\prebuilds\win32-x64\@reasonsoftware+windows-notification-state.node UnifiedStub-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\System.Resources.Writer.dll UnifiedStub-installer.exe File created C:\Program Files\AVG\Browser\Temp\source3212_477834564\Safer-bin\128.0.26382.138\Locales\ro.pak setup.exe File created C:\Program Files\McAfee\Temp3998184786\jslang\wa-res-shared-sk-SK.js installer.exe File created C:\Program Files (x86)\GUM2D74.tmp\goopdateres_sw.dll AVGBrowserUpdateSetup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\mcafee-logo-1.png installer.exe File created C:\Program Files\ReasonLabs\EPP\System.IO.IsolatedStorage.dll UnifiedStub-installer.exe File created C:\Program Files\AVG\Browser\Temp\source3212_477834564\Safer-bin\128.0.26382.138\chrome_elf.dll setup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-pl-PL.js installer.exe File opened for modification C:\Program Files\Cheat Engine 7.5\profapi.pdb cheatengine-x86_64-SSE4-AVX2.exe -
Drops file in Windows directory 2 IoCs
Processes:
cheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exedescription ioc process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\comctl32.dll cheatengine-x86_64-SSE4-AVX2.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 3604 sc.exe 2784 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 6696 2972 WerFault.exe CheatEngine75 (1).tmp 6872 2972 WerFault.exe CheatEngine75 (1).tmp -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
saBSI.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exeCheat Engine.exeCheatEngine75 (1).exeAVGBrowserUpdateSetup.exeAVGBrowserUpdate.exeKernelmoduleunloader.exeAVGBrowserUpdate.exeavg_secure_browser_setup.exeeedkdy35.exeCheatEngine75.tmpregsvr32.exeCheatEngine75 (1).tmpCheatEngine75.exeAVGBrowserUpdate.exeCheat Engine.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saBSI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cheat Engine.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75 (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdateSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kernelmoduleunloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avg_secure_browser_setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eedkdy35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75 (1).tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngine75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVGBrowserUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cheat Engine.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
AVGBrowserUpdate.exepid process 6840 AVGBrowserUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
avg_secure_browser_setup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rsEDRSvc.exeCheatEngine75 (1).tmprunonce.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rsEDRSvc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine75 (1).tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine75 (1).tmp Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rsEDRSvc.exe -
Processes:
AVGBrowserUpdate.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppName = "AVGBrowserUpdateBroker.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{28E08968-59C8-4A77-BEBA-12C9394AE077}\Policy = "3" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppName = "AVGBrowserUpdateWebPlugin.exe" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\AppPath = "C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6" AVGBrowserUpdate.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
updater.exersEDRSvc.exeServiceHost.exeAVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\endpoint = "update.avgbrowser.com" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\AVG\Browser\Update\MachineIdDate = "20241001" AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\AVG AVGBrowserUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs rsEDRSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs updater.exe -
Modifies registry class 64 IoCs
Processes:
setup.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeCheatEngine75.tmpAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdateComRegisterShell64.exeAVGBrowserUpdate.exeregsvr32.exeAVGBrowserUpdate.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\OpenWithProgIds\AvgHTML setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB785069-B832-4423-B813-47F7422BA6E5}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{079CAB07-5001-4E71-9D5A-B412842E5178}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CETRAINER CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BAAD654E-4B50-4C9F-A261-CF29CF884478}\ProgID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DD8E03F-6BE1-41E2-B931-A37C7D1C0317}\ = "ICredentialDialog" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{804EC8ED-BF49-41ED-BCD0-CA1D716D3E98}\NumMethods\ = "10" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.Update3WebMachine\CLSID AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CheatEngine\DefaultIcon CheatEngine75.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C32E10AE-6600-4A1E-8BEA-EF89A3072F93}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BAAD654E-4B50-4C9F-A261-CF29CF884478}\ProgID\ = "AVGUpdate.OnDemandCOMClassMachineFallback.1.0" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgHTML\shell\open\command\ = "\"C:\\Program Files\\AVG\\Browser\\Application\\AVGBrowser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\ = "IJobObserver" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CCD3788-C8CC-4EE9-8DF7-944B7D9674F2}\ProxyStubClsid32 AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ = "IProcessLauncher2" AVGBrowserUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0929891C-854C-4BFF-AE54-7EE10636719D} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachineFallback\CurVer\ = "AVGUpdate.OnDemandCOMClassMachineFallback.1.0" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{513C6D01-E4A3-4F34-9BD9-3D83C35A3498}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\ = "IProcessLauncher" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachineFallback\CLSID\ = "{BAAD654E-4B50-4C9F-A261-CF29CF884478}" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{40C1C1D3-AAEA-46EE-AA2B-79A2CC62F257}\VersionIndependentProgID\ = "AVGUpdate.CredentialDialogMachine" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B02B2F29-8637-4B78-892A-CFD7CCE793EC}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.OnDemandCOMClassMachine.1.0\CLSID AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23AE0B95-20F3-4632-A2AE-C3D706E1D5D9}\ = "Google Update Core Class" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CredentialDialogMachine AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AVGUpdate.CredentialDialogMachine\ = "goopdate CredentialDialog" AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\AvgHTML\shell setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2DAE1732-F855-42A3-9D28-B7F6E291ECCD}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5CCD3788-C8CC-4EE9-8DF7-944B7D9674F2} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A708F91-06A3-409E-83BC-4A5CF10C8025}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BEBC1D02-EC16-479A-83F6-AA4247CA7F70}\LocalizedString = "@C:\\Program Files (x86)\\AVG\\Browser\\Update\\1.8.1693.6\\goopdate.dll,-3000" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}\InProcServer32\ThreadingModel = "Both" AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C7E81D6-0463-485E-8DF5-2ADAD81FAF40}\ = "IGoogleUpdate3Web" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D37D106C-CDD2-4821-BC7A-F08990DDCA74}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6972DB5C-E9D6-4A81-B352-B415A3A61CA6} AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{358EC846-617A-4763-8656-50BF6E0E8AA2}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C7B73E65-20BA-407F-8A89-DF649EF82559} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A708F91-06A3-409E-83BC-4A5CF10C8025}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9E6B2FC-34C6-435F-BC66-1EA330DB1270}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23AE0B95-20F3-4632-A2AE-C3D706E1D5D9} AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\AvgHTML setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82C85EAA-7C94-4702-AA75-DF39403AE358}\VersionIndependentProgID\ = "AVGUpdate.Update3COMClassService" AVGBrowserUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7BA03866-1403-40EA-81A9-23FCD97810E2}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0C0BAA6C-52FD-4A3F-8731-F588C5E8F191} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67F69D86-C3AA-4CBF-A536-C73B5D785FFC}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E21E991-301D-47FD-AB7A-99FBE864EF65}\ProxyStubClsid32 AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6CEBE594-0680-4815-86E1-615A6BE65E0E} AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8C50E3A4-12A8-41FB-9941-E8EEB222E07E}\ProxyStubClsid32\ = "{2E7A212B-A33C-45D6-9EFD-2AB58EFAACF0}" AVGBrowserUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FBDC15B-BBCD-402B-A45F-1853B01A9E3C} AVGBrowserUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BE1521-7935-42E6-B606-058A559910BA}\NumMethods AVGBrowserUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{925547A3-663F-4673-A7B7-3FCACCDC4879}\ = "IAppCommand" AVGBrowserUpdateComRegisterShell64.exe -
Processes:
ServiceHost.exeUnifiedStub-installer.exesaBSI.exeupdater.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 updater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 UnifiedStub-installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 updater.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 updater.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 UnifiedStub-installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 5c0000000100000004000000001000001900000001000000100000005d1b8ff2c30f63f5b536edd400f7f9b40300000001000000140000004efc31460c619ecae59c1bce2c008036d94c84b809000000010000000c000000300a06082b060105050703031d00000001000000100000005467b0adde8d858e30ee517b1a19ecd91400000001000000140000001f00bf46800afc7839b7a5b443d95650bbce963b53000000010000001f000000301d301b060567810c010330123010060a2b0601040182373c0101030200c06200000001000000200000007b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df860b000000010000004200000047006c006f00620061006c005300690067006e00200043006f006400650020005300690067006e0069006e006700200052006f006f007400200052003400350000000f0000000100000030000000c130bba37b8b350e89fd5ed76b4f78777feee220d3b9e729042bef6af46e8e4c1b252e32b3080c681bc9a8a1afdd0a3c040000000100000010000000e94fb54871208c00df70f708ac47085b200000000100000076050000308205723082035aa00302010202107653feac75464893f5e5d74a483a4ef8300d06092a864886f70d01010c05003053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f7420523435301e170d3230303331383030303030305a170d3435303331383030303030305a3053310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613129302706035504031320476c6f62616c5369676e20436f6465205369676e696e6720526f6f742052343530820222300d06092a864886f70d01010105000382020f003082020a0282020100b62dc530dd7ae8ab903d0372b03a4b991661b2e5ffa5671d371ce57eec9383aa84f5a3439b98458ab863575d9b00880425e9f868924b82d84bc94a03f3a87f6a8f8a6127bda144d0fdf53f22c2a34f918db305b22882915dfb5988050b9706c298f82ca73324ee503a41ccf0a0b07b1d4dd2a8583896e9dff91b91bb8b102cd2c7431da20974a180af7be6330a0c596b8ebcf4ab5a977b7fae55fb84f080fe844cd7e2babdc475a16fbd61107444b29807e274abff68dc6c263ee91fe5e00487ad30d30c8d037c55b816705c24782025eb676788abba4e34986b7011de38cad4bea1c09ce1df1e0201d83be1674384b6cffc74b72f84a3bfba09373d676cb1455c1961ab4183f5ac1deb770d464773cebfbd9595ed9d2b8810fefa58e8a757e1b3cfa85ae907259b12c49e80723d93dc8c94df3b44e62680fcd2c303f08c0cd245d62ee78f989ee604ee426e677e42167162e704f960c664a1b69c81214e2bc66d689486c699747367317a91f2d48c796e7ca6bb7e466f4dc585122bcf9a224408a88537ce07615706171224c0c43173a1983557477e103a45d92da4519098a9a00737c4651aaa1c6b1677f7a797ec3f1930996f31fbea40b2e7d2c4fac9d0f050767459fa8d6d1732bef8e97e03f4e787759ad44a912c850313022b4280f2896a36cfc84ca0ce9ef8cb8dad16a7d3ded59b18a7c6923af18263f12e0e2464df0203010001a3423040300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604141f00bf46800afc7839b7a5b443d95650bbce963b300d06092a864886f70d01010c050003820201005e2bba749734445f764828408493ee016ee9a1b3d68025e67be4bc09913d0ffc76add7d43020bb8f60d091d61cf29cef781a2b943202c12496525202d0f3d1fcf29b396e99e11f8e43417d9a1e5bc95d9a84fc26e687f3747226ada41bd93d3b6a52a03c091e2f1e7bb333b445c7f7acb1af9360ad76aeb8b21578eb836aebffdb46ab24e5ee02fa901f59c02f5dd6b75da45c10b77253f8414eccfa781a254acafe85624361c3b437aa81d2f4d63a0fbd8d597e3047de2b6be72150335fd4679bd4b8679f3c279903ff85438e7312ca20cde861d5b166dc17d6396d0fdbcf2337a182894e1c6b3fd6a0cdaa079d3e4226aad70ceefa47bf1a527ed17581d3c98a62176d4f88a021a0263eaf6dd962301fe99828ae6e8dd58e4c726693808d2ae355c760679042565c22510fb3dc4e39ee4dddd91d7810543b6ed0976f03b51eb22373c612b29a64d0fc958524a8ffdfa1b0dc9140aedf0933abb9dd92b7f1cc91743b69eb67971b90bfe7c7a06f71bb57bfb78f5aed7a406a16cd80842d2fe102d4249443b315fc0c2b1bfd716ffccbbc75173a5e83d2c9b32f1bd59c8d7f54fe7e7ee456a387a79de1595294418f6d5bbe86959aff1a76dd40d2514a70b41f336323773fec271e59e40887ed34824a0f3ffea01dc1f56773458678f4aa29e92787c619dbc61314c33949874da097e06513f59d7756e9dab358c73af2c0cd82 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 ServiceHost.exe -
Runs net.exe
-
Script User-Agent 5 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 91 Cheat Engine 7.5 : luascript-ceshare HTTP User-Agent header 91 Cheat Engine 7.5 : luascript-CEVersionCheck HTTP User-Agent header 96 Cheat Engine 7.5 : luascript-ceshare HTTP User-Agent header 96 Cheat Engine 7.5 : luascript-CEVersionCheck -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CheatEngine75 (1).tmpsaBSI.exeavg_secure_browser_setup.exeUnifiedStub-installer.exeCheatEngine75.tmpAVGBrowserUpdate.exeServiceHost.exepid process 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 2972 CheatEngine75 (1).tmp 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 3628 saBSI.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 2512 UnifiedStub-installer.exe 2512 UnifiedStub-installer.exe 4820 CheatEngine75.tmp 4820 CheatEngine75.tmp 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 4612 avg_secure_browser_setup.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 3272 AVGBrowserUpdate.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe 6788 ServiceHost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
fltmc.exepid process 2188 fltmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
prod0.exeUnifiedStub-installer.exeAVGBrowserUpdate.execheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exeAVGBrowserInstaller.exewevtutil.exefltmc.exewevtutil.exersWSC.exersWSC.exersEngineSvc.exersEngineSvc.exersEDRSvc.exedescription pid process Token: SeDebugPrivilege 2632 prod0.exe Token: SeDebugPrivilege 2512 UnifiedStub-installer.exe Token: SeShutdownPrivilege 2512 UnifiedStub-installer.exe Token: SeCreatePagefilePrivilege 2512 UnifiedStub-installer.exe Token: SeDebugPrivilege 3272 AVGBrowserUpdate.exe Token: SeDebugPrivilege 3272 AVGBrowserUpdate.exe Token: SeDebugPrivilege 3272 AVGBrowserUpdate.exe Token: SeDebugPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLoadDriverPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreateGlobalPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLockMemoryPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeSecurityPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTakeOwnershipPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeManageVolumePrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeBackupPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreatePagefilePrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeShutdownPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeRestorePrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeIncBasePriorityPrivilege 6588 cheatengine-x86_64-SSE4-AVX2.exe Token: SeDebugPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTcbPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLoadDriverPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreateGlobalPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeLockMemoryPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeSecurityPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeTakeOwnershipPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeManageVolumePrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeBackupPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeCreatePagefilePrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeShutdownPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeRestorePrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: SeIncBasePriorityPrivilege 3516 cheatengine-x86_64-SSE4-AVX2.exe Token: 33 856 AVGBrowserInstaller.exe Token: SeIncBasePriorityPrivilege 856 AVGBrowserInstaller.exe Token: SeDebugPrivilege 2512 UnifiedStub-installer.exe Token: SeSecurityPrivilege 6184 wevtutil.exe Token: SeBackupPrivilege 6184 wevtutil.exe Token: SeLoadDriverPrivilege 2188 fltmc.exe Token: SeSecurityPrivilege 5844 wevtutil.exe Token: SeBackupPrivilege 5844 wevtutil.exe Token: SeDebugPrivilege 5924 rsWSC.exe Token: SeDebugPrivilege 6412 rsWSC.exe Token: SeDebugPrivilege 4536 rsEngineSvc.exe Token: SeDebugPrivilege 4536 rsEngineSvc.exe Token: SeDebugPrivilege 4536 rsEngineSvc.exe Token: SeBackupPrivilege 4536 rsEngineSvc.exe Token: SeRestorePrivilege 4536 rsEngineSvc.exe Token: SeLoadDriverPrivilege 4536 rsEngineSvc.exe Token: SeDebugPrivilege 7176 rsEngineSvc.exe Token: SeDebugPrivilege 7176 rsEngineSvc.exe Token: SeDebugPrivilege 7176 rsEngineSvc.exe Token: SeBackupPrivilege 7176 rsEngineSvc.exe Token: SeRestorePrivilege 7176 rsEngineSvc.exe Token: SeLoadDriverPrivilege 7176 rsEngineSvc.exe Token: SeDebugPrivilege 8128 rsEDRSvc.exe Token: SeShutdownPrivilege 2512 UnifiedStub-installer.exe Token: SeCreatePagefilePrivilege 2512 UnifiedStub-installer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
CheatEngine75 (1).tmpCheatEngine75.tmpcheatengine-x86_64-SSE4-AVX2.execheatengine-x86_64-SSE4-AVX2.exepid process 2972 CheatEngine75 (1).tmp 4820 CheatEngine75.tmp 6588 cheatengine-x86_64-SSE4-AVX2.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Cheat Engine.execheatengine-x86_64-SSE4-AVX2.exepid process 6292 Cheat Engine.exe 3516 cheatengine-x86_64-SSE4-AVX2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CheatEngine75 (1).exeCheatEngine75 (1).tmpprod0.exeeedkdy35.exeCheatEngine75.exeCheatEngine75.tmpnet.exenet.exeUnifiedStub-installer.exesaBSI.exeinstaller.exeavg_secure_browser_setup.exeAVGBrowserUpdateSetup.exeinstaller.exeregsvr32.exeAVGBrowserUpdate.exeAVGBrowserUpdate.exedescription pid process target process PID 776 wrote to memory of 2972 776 CheatEngine75 (1).exe CheatEngine75 (1).tmp PID 776 wrote to memory of 2972 776 CheatEngine75 (1).exe CheatEngine75 (1).tmp PID 776 wrote to memory of 2972 776 CheatEngine75 (1).exe CheatEngine75 (1).tmp PID 2972 wrote to memory of 2632 2972 CheatEngine75 (1).tmp prod0.exe PID 2972 wrote to memory of 2632 2972 CheatEngine75 (1).tmp prod0.exe PID 2972 wrote to memory of 3628 2972 CheatEngine75 (1).tmp saBSI.exe PID 2972 wrote to memory of 3628 2972 CheatEngine75 (1).tmp saBSI.exe PID 2972 wrote to memory of 3628 2972 CheatEngine75 (1).tmp saBSI.exe PID 2972 wrote to memory of 4612 2972 CheatEngine75 (1).tmp avg_secure_browser_setup.exe PID 2972 wrote to memory of 4612 2972 CheatEngine75 (1).tmp avg_secure_browser_setup.exe PID 2972 wrote to memory of 4612 2972 CheatEngine75 (1).tmp avg_secure_browser_setup.exe PID 2632 wrote to memory of 1208 2632 prod0.exe eedkdy35.exe PID 2632 wrote to memory of 1208 2632 prod0.exe eedkdy35.exe PID 2632 wrote to memory of 1208 2632 prod0.exe eedkdy35.exe PID 2972 wrote to memory of 4956 2972 CheatEngine75 (1).tmp CheatEngine75.exe PID 2972 wrote to memory of 4956 2972 CheatEngine75 (1).tmp CheatEngine75.exe PID 2972 wrote to memory of 4956 2972 CheatEngine75 (1).tmp CheatEngine75.exe PID 1208 wrote to memory of 2512 1208 eedkdy35.exe UnifiedStub-installer.exe PID 1208 wrote to memory of 2512 1208 eedkdy35.exe UnifiedStub-installer.exe PID 4956 wrote to memory of 4820 4956 CheatEngine75.exe CheatEngine75.tmp PID 4956 wrote to memory of 4820 4956 CheatEngine75.exe CheatEngine75.tmp PID 4956 wrote to memory of 4820 4956 CheatEngine75.exe CheatEngine75.tmp PID 4820 wrote to memory of 2208 4820 CheatEngine75.tmp net.exe PID 4820 wrote to memory of 2208 4820 CheatEngine75.tmp net.exe PID 2208 wrote to memory of 3860 2208 net.exe net1.exe PID 2208 wrote to memory of 3860 2208 net.exe net1.exe PID 4820 wrote to memory of 2268 4820 CheatEngine75.tmp installer.exe PID 4820 wrote to memory of 2268 4820 CheatEngine75.tmp installer.exe PID 2268 wrote to memory of 1460 2268 net.exe net1.exe PID 2268 wrote to memory of 1460 2268 net.exe net1.exe PID 4820 wrote to memory of 3604 4820 CheatEngine75.tmp sc.exe PID 4820 wrote to memory of 3604 4820 CheatEngine75.tmp sc.exe PID 4820 wrote to memory of 2784 4820 CheatEngine75.tmp sc.exe PID 4820 wrote to memory of 2784 4820 CheatEngine75.tmp sc.exe PID 4820 wrote to memory of 4108 4820 CheatEngine75.tmp _setup64.tmp PID 4820 wrote to memory of 4108 4820 CheatEngine75.tmp _setup64.tmp PID 2512 wrote to memory of 4304 2512 UnifiedStub-installer.exe rsSyncSvc.exe PID 2512 wrote to memory of 4304 2512 UnifiedStub-installer.exe rsSyncSvc.exe PID 3628 wrote to memory of 1464 3628 saBSI.exe installer.exe PID 3628 wrote to memory of 1464 3628 saBSI.exe installer.exe PID 4820 wrote to memory of 5084 4820 CheatEngine75.tmp icacls.exe PID 4820 wrote to memory of 5084 4820 CheatEngine75.tmp icacls.exe PID 1464 wrote to memory of 2268 1464 installer.exe installer.exe PID 1464 wrote to memory of 2268 1464 installer.exe installer.exe PID 4612 wrote to memory of 2508 4612 avg_secure_browser_setup.exe AVGBrowserUpdateSetup.exe PID 4612 wrote to memory of 2508 4612 avg_secure_browser_setup.exe AVGBrowserUpdateSetup.exe PID 4612 wrote to memory of 2508 4612 avg_secure_browser_setup.exe AVGBrowserUpdateSetup.exe PID 2508 wrote to memory of 3272 2508 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 2508 wrote to memory of 3272 2508 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 2508 wrote to memory of 3272 2508 AVGBrowserUpdateSetup.exe AVGBrowserUpdate.exe PID 2268 wrote to memory of 1732 2268 installer.exe regsvr32.exe PID 2268 wrote to memory of 1732 2268 installer.exe regsvr32.exe PID 1732 wrote to memory of 2772 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 2772 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 2772 1732 regsvr32.exe regsvr32.exe PID 3272 wrote to memory of 6548 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 3272 wrote to memory of 6548 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 3272 wrote to memory of 6548 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 2268 wrote to memory of 5308 2268 installer.exe regsvr32.exe PID 2268 wrote to memory of 5308 2268 installer.exe regsvr32.exe PID 3272 wrote to memory of 5184 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 3272 wrote to memory of 5184 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 3272 wrote to memory of 5184 3272 AVGBrowserUpdate.exe AVGBrowserUpdate.exe PID 5184 wrote to memory of 6040 5184 AVGBrowserUpdate.exe AVGBrowserUpdateComRegisterShell64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatEngine75 (1).exe"C:\Users\Admin\AppData\Local\Temp\CheatEngine75 (1).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\is-TA8AN.tmp\CheatEngine75 (1).tmp"C:\Users\Admin\AppData\Local\Temp\is-TA8AN.tmp\CheatEngine75 (1).tmp" /SL5="$601DA,29071676,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75 (1).exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod0.exe"C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod0.exe" -ip:"dui=c186ecc3-67e4-4d2b-8682-b6c322da87aa&dit=20241001050852&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&b=&se=true" -vp:"dui=c186ecc3-67e4-4d2b-8682-b6c322da87aa&dit=20241001050852&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100&oip=26&ptl=7&dta=true" -dp:"dui=c186ecc3-67e4-4d2b-8682-b6c322da87aa&dit=20241001050852&oc=ZB_RAV_Cross_Tri_NCB&p=cdc2&a=100" -i -v -d -se=true3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\eedkdy35.exe"C:\Users\Admin\AppData\Local\Temp\eedkdy35.exe" /silent4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\UnifiedStub-installer.exe.\UnifiedStub-installer.exe /silent5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:106⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf6⤵
- Adds Run key to start application
PID:8944 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
PID:8980 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵PID:9088
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml6⤵
- Suspicious use of AdjustPrivilegeToken
PID:6184 -
C:\Windows\SYSTEM32\fltmc.exe"fltmc.exe" load rsKernelEngine6⤵
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\elam\evntdrv.xml6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5844 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5060
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5924 -
C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe" -i6⤵
- Executes dropped EXE
PID:424 -
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe" -i6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4536 -
C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe" -i6⤵
- Executes dropped EXE
PID:8116 -
C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe"C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe" -i -i6⤵PID:956
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:424
-
C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe"C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe" -i -i6⤵PID:7380
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files\McAfee\Temp3998184786\installer.exe"C:\Program Files\McAfee\Temp3998184786\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:5308 -
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod2_extract\avg_secure_browser_setup.exe"C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod2_extract\avg_secure_browser_setup.exe" /s /run_source=avg_ads_is_control /is_pixel_psh=BjYV6dOhP3h2t1XrszxQ9AhmYrauKmrSSO1xRGSUn2Xvh8IryKY5nj6MtzU9UN81cerXVljD5rclr69 /make-default3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\AVGBrowserUpdateSetup.exeAVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\GUM2D74.tmp\AVGBrowserUpdate.exe"C:\Program Files (x86)\GUM2D74.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6548 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:6040 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:6724 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5144 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgb21haGFpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHVwZGF0ZXJ2ZXJzaW9uPSIxLjguMTY5My42IiBzaGVsbF92ZXJzaW9uPSIxLjguMTY5My42IiBpc21hY2hpbmU9IjEiIGlzX29tYWhhNjRiaXQ9IjAiIGlzX29zNjRiaXQ9IjEiIHNlc3Npb25pZD0ie0YzOEU5RjlDLUREM0EtNDJBNi04NTI0LTVEMDYxRENBOTNCMX0iIGNlcnRfZXhwX2RhdGU9IjIwMjUwOTE3IiB1c2VyaWQ9IntFNkI1Q0IyQi02QUQ1LTQ5RDAtQTFBRC1BRThBRjdDQjQ4NEN9IiB1c2VyaWRfZGF0ZT0iMjAyNDEwMDEiIG1hY2hpbmVpZD0iezAwMDBDQkM0LUFBNTMtOTMyRC1GNjQ2LTgzNTZEQzZDRUMyNH0iIG1hY2hpbmVpZF9kYXRlPSIyMDI0MTAwMSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiB0ZXN0c291cmNlPSJhdXRvIiByZXF1ZXN0aWQ9Ins1NDIyNUU1Ri1CQjQzLTQ1RUUtOEE5OC1ENzIwNTc4MkExMzN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjgiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTI2MyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNDk2OSIvPjwvYXBwPjwvcmVxdWVzdD46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6840 -
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9263&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{F38E9F9C-DD3A-42A6-8524-5D061DCA93B1}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6892 -
C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe --heartbeat --install --create-profile4⤵PID:5072
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=128.0.26382.138 --initial-client-data=0xf4,0xf8,0xfc,0xd0,0x100,0x7ff8cdbd6c28,0x7ff8cdbd6c34,0x7ff8cdbd6c405⤵PID:1484
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=1892 /prefetch:25⤵PID:8780
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2272,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:35⤵PID:6484
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2432,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=2444 /prefetch:85⤵PID:9084
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:15⤵PID:8452
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3500,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:25⤵PID:1464
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=3568,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:85⤵PID:6904
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3476,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:25⤵PID:6128
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4656,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:85⤵PID:7236
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4784,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=4796 /prefetch:85⤵PID:7400
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4840,i,3416363570699635328,6862955871723029238,262144 --variations-seed-version --mojo-platform-channel-handle=4852 /prefetch:85⤵PID:8824
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exeAVGBrowser.exe --silent-launch4⤵PID:2568
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=128.0.26382.138 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8cdbd6c28,0x7ff8cdbd6c34,0x7ff8cdbd6c405⤵PID:8012
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1860,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=1856 /prefetch:25⤵PID:8016
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1984,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=2016 /prefetch:35⤵PID:4284
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2452,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=2604 /prefetch:85⤵PID:8752
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=3288 /prefetch:25⤵PID:7440
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4024,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:85⤵PID:7608
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4060,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4168 /prefetch:85⤵PID:1640
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4020,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:85⤵PID:6980
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4056,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:85⤵PID:7004
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4324,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4368 /prefetch:85⤵PID:7008
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4352,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:85⤵PID:9080
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4204,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:85⤵PID:2436
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4360,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:85⤵PID:9132
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4632,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4472 /prefetch:85⤵PID:8812
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4212,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:85⤵PID:6052
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4208,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4712 /prefetch:85⤵PID:3820
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4132,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4872 /prefetch:85⤵PID:8312
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4860,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:85⤵PID:2084
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5144,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5148 /prefetch:85⤵PID:7316
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5404,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:15⤵PID:6572
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5424,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:25⤵PID:7604
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5576,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:25⤵PID:8616
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4412,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:85⤵PID:6192
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4180,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:85⤵PID:4912
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4424,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:85⤵PID:4528
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5236,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:85⤵PID:8584
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4420,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5108 /prefetch:85⤵PID:5232
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5184,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:85⤵PID:8892
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4736,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:85⤵PID:4844
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4852,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=6008 /prefetch:85⤵PID:8352
-
C:\Program Files\AVG\Browser\Application\AVGBrowser.exe"C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=renderer --extension-process --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=5288,i,4801226725681946539,3161858477191135853,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:25⤵PID:8832
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\CheatEngine75.exe"C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\is-F1FBF.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-F1FBF.tmp\CheatEngine75.tmp" /SL5="$9002A,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAntic5⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAntic6⤵PID:3860
-
C:\Windows\SYSTEM32\net.exe"net" stop BadlionAnticheat5⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BadlionAnticheat6⤵PID:1460
-
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAntic5⤵
- Launches sc.exe
PID:3604 -
C:\Windows\SYSTEM32\sc.exe"sc" delete BadlionAnticheat5⤵
- Launches sc.exe
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\is-9SF49.tmp\_isetup\_setup64.tmphelper 105 0x4545⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:5084 -
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe"C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6616 -
C:\Program Files\Cheat Engine 7.5\windowsrepair.exe"C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s5⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\system32\icacls.exe"icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)5⤵
- Modifies file permissions
PID:6060 -
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 9243⤵
- Program crash
PID:6696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 9243⤵
- Program crash
PID:6872
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:101⤵
- Executes dropped EXE
PID:2184
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:6788 -
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6280 -
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
PID:7100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵PID:5060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵PID:5460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul2⤵PID:5332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul2⤵PID:5316
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe"C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6996 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\AVGBrowserInstaller.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\CR_D3A17.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\CR_D3A17.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\CR_D3A17.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=msedge --import-cookies --auto-launch-chrome --system-level3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
PID:3212 -
C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\CR_D3A17.tmp\setup.exe"C:\Program Files (x86)\AVG\Browser\Update\Install\{AE4D8D48-B8A4-46E4-BD1A-9C378FF57B0B}\CR_D3A17.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=128.0.26382.138 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff77a2a54d0,0x7ff77a2a54dc,0x7ff77a2a54e84⤵
- Executes dropped EXE
PID:3612 -
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler.exe"2⤵PID:7428
-
C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe"C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserCrashHandler64.exe"2⤵PID:7492
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6292 -
C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2972 -ip 29721⤵PID:5376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2972 -ip 29721⤵PID:6848
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6412
-
C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"1⤵
- Executes dropped EXE
PID:6760
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:7176 -
\??\c:\program files\reasonlabs\epp\rsHelper.exe"c:\program files\reasonlabs\epp\rsHelper.exe"2⤵PID:9116
-
\??\c:\program files\reasonlabs\EPP\ui\EPP.exe"c:\program files\reasonlabs\EPP\ui\EPP.exe" --minimized --first-run2⤵PID:4528
-
C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" "c:\program files\reasonlabs\EPP\ui\app.asar" --engine-path="c:\program files\reasonlabs\EPP" --minimized --first-run3⤵PID:3756
-
C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1720,i,8873458568192638235,9438435345620111782,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1712 /prefetch:24⤵PID:8456
-
C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --field-trial-handle=2152,i,8873458568192638235,9438435345620111782,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2148 /prefetch:34⤵PID:5680
-
C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2424,i,8873458568192638235,9438435345620111782,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2420 /prefetch:14⤵PID:8164
-
C:\program files\reasonlabs\epp\rsLitmus.A.exe"C:\program files\reasonlabs\epp\rsLitmus.A.exe"2⤵PID:6836
-
C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:8128
-
C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe"C:\Program Files\ReasonLabs\VPN\rsVPNClientSvc.exe"1⤵PID:7720
-
C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe"C:\Program Files\ReasonLabs\VPN\rsVPNSvc.exe"1⤵PID:6816
-
\??\c:\program files\reasonlabs\VPN\ui\VPN.exe"c:\program files\reasonlabs\VPN\ui\VPN.exe" --minimized --focused --first-run2⤵PID:8332
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" "c:\program files\reasonlabs\VPN\ui\app.asar" --engine-path="c:\program files\reasonlabs\VPN" --minimized --focused --first-run3⤵PID:1836
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2240 --field-trial-handle=2244,i,6538953179299121641,12665848781251704776,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵PID:7528
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --mojo-platform-channel-handle=2668 --field-trial-handle=2244,i,6538953179299121641,12665848781251704776,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵PID:4496
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --app-user-model-id=com.reasonlabs.vpn --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2748 --field-trial-handle=2244,i,6538953179299121641,12665848781251704776,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵PID:5268
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN" --app-user-model-id=com.reasonlabs.vpn --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3828 --field-trial-handle=2244,i,6538953179299121641,12665848781251704776,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵PID:6404
-
C:\Program Files\AVG\Browser\Application\128.0.26382.138\elevation_service.exe"C:\Program Files\AVG\Browser\Application\128.0.26382.138\elevation_service.exe"1⤵PID:2024
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:8244
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3984
-
C:\Program Files\AVG\Browser\Application\128.0.26382.138\elevation_service.exe"C:\Program Files\AVG\Browser\Application\128.0.26382.138\elevation_service.exe"1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
7Software Discovery
1Security Software Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exeFilesize
204KB
MD5cbcdf56c8a2788ed761ad3178e2d6e9c
SHA1bdee21667760bc0df3046d6073a05d779fdc82cb
SHA256e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3
SHA5125f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e
-
C:\Program Files (x86)\GUM2D74.tmp\@PaxHeaderFilesize
27B
MD5fc8ee03b2a65f381e4245432d5fef60e
SHA1d2b7d9be66c75ccf24fcb45a6d0dacedd8b6dd6f
SHA256751a04263c2ebb889fdcd11045d6f3602690318ebaaa54f66e1332d76dde9ef4
SHA5120837f2b22c9629990165c5e070e710a69ad4951b7fcfe28bd52354c4b8a7246672497b8aaf521a8773c7ec2a4249fc4318330948ab0d8db8c6c74da57b32f1c4
-
C:\Program Files\AVG\Browser\Application\128.0.26382.138\Installer\setup.exeFilesize
3.4MB
MD526bf30358c8fdaecd3c83b9cf76514ee
SHA14f76fe57a8cc48b28b9fd4f1ff75254976ad4515
SHA256f0809a96fb1a5e039a5bf5559e4e5b57bcbbbcd07e7dd6bf60872e9a0e6f0856
SHA51220a8f1df4a5eefd617fa6096d5f2c47770ef20efaf3cba007588f8759bcb72cf9e3d4eb89505d333bbe7c2ed4e8d9202421485e22ee99f29812682c0cbaf2040
-
C:\Program Files\Cheat Engine 7.5\Cheat Engine.exeFilesize
389KB
MD5f921416197c2ae407d53ba5712c3930a
SHA16a7daa7372e93c48758b9752c8a5a673b525632b
SHA256e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e
SHA5120139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce
-
C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exeFilesize
236KB
MD59af96706762298cf72df2a74213494c9
SHA14b5fd2f168380919524ecce77aa1be330fdef57a
SHA25665fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d
SHA51229a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4
-
C:\Program Files\Cheat Engine 7.5\badassets\scoreboard.pngFilesize
5KB
MD55cff22e5655d267b559261c37a423871
SHA1b60ae22dfd7843dd1522663a3f46b3e505744b0f
SHA256a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9
SHA512e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50
-
C:\Program Files\Cheat Engine 7.5\is-C39RG.tmpFilesize
12.2MB
MD55be6a65f186cf219fa25bdd261616300
SHA1b5d5ae2477653abd03b56d1c536c9a2a5c5f7487
SHA256274e91a91a7a520f76c8e854dc42f96484af2d69277312d861071bde5a91991c
SHA51269634d85f66127999ea4914a93b3b7c90bc8c8fab1b458cfa6f21ab0216d1dacc50976354f7f010bb31c5873cc2d2c30b4a715397fb0e9e01a5233c2521e7716
-
C:\Program Files\Cheat Engine 7.5\windowsrepair.exeFilesize
262KB
MD59a4d1b5154194ea0c42efebeb73f318f
SHA1220f8af8b91d3c7b64140cbb5d9337d7ed277edb
SHA2562f3214f799b0f0a2f3955dbdc64c7e7c0e216f1a09d2c1ad5d0a99921782e363
SHA5126eef3254fc24079751fc8c38dda9a8e44840e5a4df1ff5adf076e4be87127075a7fea59ba7ef9b901aaf10eb64f881fc8fb306c2625140169665dd3991e5c25b
-
C:\Program Files\McAfee\Temp3998184786\analyticsmanager.cabFilesize
1.8MB
MD5948d496f4ad6e8b149db6056be02c8f7
SHA18e2aeec2e560e44fbe3c8364ed397982f8155c4c
SHA256c52816565ae77cd08e0525b702379caf97e2436ed7efbd7411057b38741e52c4
SHA51272947258a90fc7f82330abdef5586f77b8c7a0408cab349e19ee49102e7e80eec1526961925dec18af7b97490b19d9c88167915c10d4ce815e0322640d177f41
-
C:\Program Files\McAfee\Temp3998184786\analyticstelemetry.cabFilesize
48KB
MD5f580c51c1cb2e8337a2985310dd2fcbf
SHA1b16d9c5235a3fcfb49a7a629b5a5b6aa481420bb
SHA256cc03ec78334232f8204e62f73a9c547bf97ca205f2588d19be260a3ac742b2ad
SHA512cacdb1927e150da7d66c4a0a02d165536c21b45f15f138a82036e9c399d9a534d1a9f9be87d70489757d5905d92152003fdd6b0273d1200d7158b66f1454862d
-
C:\Program Files\McAfee\Temp3998184786\browserhost.cabFilesize
1.3MB
MD5e9383df7daf869a69eee9ff7ec07989b
SHA10196df29cbdd819ac16df198396e08f92932c70c
SHA2565487bab12503446edc939ed5b2928ef5e5237a987cfe2fbdcabe8d41ed7a956b
SHA512f1cf7bb7d134e5f469a97b785e3b2179dae6b76e60adacfe86b5c8581b8330e615faac0c045c70e8d94238449997ded15f2e50d90e22a9c7fc2b3266170760ba
-
C:\Program Files\McAfee\Temp3998184786\browserplugin.cabFilesize
4.8MB
MD55a0b1351afb4c6e82e1e2fdb040cfb40
SHA125f8de6c83a40daa388bd28d4f2de1080293e816
SHA256b121285658ee1230f975dc834dcb5dfb1d9a80c8f2abdd9898dfc1ea877fee0a
SHA512c66274c38998d0aa9064600b2bcde1a6a4ed551a4e00a0a622046e447843cd300bf15a14e2b361a54a47644cd3a16a68e3f78b884e6ec198d67385ee1d11cc0f
-
C:\Program Files\McAfee\Temp3998184786\eventmanager.cabFilesize
1.5MB
MD537b3275879c23c99fbf4e6539fc4c8f6
SHA148c6fb2f083be017bcc7de3934321329c363bf9d
SHA2565f93db4b3a5c08498f22903ad3196551d080c59b2283e988f5095d95ac47b700
SHA5127dc01b625c1627e22c57b2c9e90e06ca2e4ceeacee2ffc5c21d5821c245314a68546429770fd0c9b1566bc8e7cd925347fc5efdd799f0296241dfe7c33da1cdc
-
C:\Program Files\McAfee\Temp3998184786\installer.exeFilesize
2.9MB
MD5c484b9d06655c8272d1d185e9c9a2496
SHA1e55f7af8eac4e8dff8b2eb845b34d75c5937df9a
SHA256db4ef534357ff1c2a0d6cf925743f0f904866404c71f446d8e771d14e8a94b7a
SHA512a81895a53c46be9d990912592c9903d361c0bccc1d04da41f529b4542e7f0b8ca6050d9eeec20c17c7030d502abcc4c79e6e8996b09f83fc55e35a7bcc70dfb9
-
C:\Program Files\McAfee\Temp3998184786\l10n.cabFilesize
263KB
MD59c392136d2f86c7943af5c5fba254697
SHA1b0e4a19480b58e0d425d267e6721c2c1d6e1c1ee
SHA2569fda6ad872e73260562d46932fe2323ecc8a93f176289c0f34a98743a6d10e98
SHA512ff1411549e49b2545350fd044250200290223f7d4c4e000992163d707bc0b220c8e3c87af444ad5b8178e7e041f0488a6fb694a81b79371768e136f12acb84b5
-
C:\Program Files\McAfee\Temp3998184786\logicmodule.cabFilesize
1.5MB
MD581f22bcf2faf5d08db345c82987a4b25
SHA1af56eba04562a2c2a1d6def1c6cce3e01a89951d
SHA256a40903e9d84fdbbde037e52cc46bbfec95112086e34d03c22e0c5f4619a54f45
SHA512f749f0376d07e46010e7118ccb5e81ee0cbf88bfb484a35462811eeaa2046678c73d5e9e176c78badd08e2e34dd4dfcb1b94d20a879985551b37e4ac182b9e0a
-
C:\Program Files\McAfee\Temp3998184786\logicscripts.cabFilesize
50KB
MD57d236b3a5f33a736cccaa9943a3c89d1
SHA1551272bffd8510b5d84ef82587474e0416f3c03a
SHA2564fd07c5bce2a6321580991a73f61b35de7738bca6af43b2bf78995301e17506e
SHA512980c05a7d339e40c5f8cbafdb6e3098a3de7be4dda96ea3ffb06d967d8fc8e01f319a967a45f3ae2cd55cd9c93f9425078db6406bc56be1b016e3d440551d241
-
C:\Program Files\McAfee\Temp3998184786\mfw-mwb.cabFilesize
20KB
MD50b88f2ce8a77f3b7be6e2e86bdda1937
SHA15b68e2ab98686a2767b28da7ffd5ad43a67a0af9
SHA256826b84079e8339f41480e8eaed430fb28b49cd32dd883f4eb8f2a97240b14f8c
SHA512ea192fa5adb815256aec313f4f9e8cc1a072c5b789b7db5f3e499be04dd8adbacd2fe00266052fccf68c8857097112b57ded8ce2a3da16732e607dd74032169b
-
C:\Program Files\McAfee\Temp3998184786\mfw-nps.cabFilesize
22KB
MD5554c5a07f082abfa4c8a9ca813905cb4
SHA1936365bd10f41d53ff2166c42f04caecbe6fdfd2
SHA25680e4a81c367539686db74789f25bea849ee7fd87a41d7152a1739b5ec38b1415
SHA512a2d2c8d55ea5c378590e49d0c1b6e09feeb0c05fdf2ef336b34b7352ba4a9ef3f72d415437b829a4ac1b47ac1c4a8bf67abb65cc3bca14a732d87a90fcb63d71
-
C:\Program Files\McAfee\Temp3998184786\mfw-webadvisor.cabFilesize
798KB
MD558f465e0295353de4a02870901785d2c
SHA14a6fc92bcdbb237b551d3e2d586f350ce3b7d4f0
SHA2565d53ee618aaadeaca1d5ee1d0e2c301730381e775e3f6bd7d8677cb87ac6abe8
SHA512e4bc76da62a13c36e0fe74acb2a6ec8e727a825062eac8d1fcbfba73d2234cf3b5e950b8c990e65f406dba38bf8d7145714a3d092f363902d0c29ae02af5a015
-
C:\Program Files\McAfee\Temp3998184786\mfw.cabFilesize
300KB
MD5d8fdb5d408de3fb3d9ea77f5ec70d55d
SHA11ae0ef14cc4b08c728c6d3586a62f14a905b5f74
SHA25677ad4e648e2d7d30ac670af0f8899a4429889686cb54873859414d969636667d
SHA5120cd48a77d7e7bde547b54d62247a83172ee99d94ff1eefd7f5b967413c4b05ac7e1baf528068bcd9742423e417066348ece256b06965aea06909a5e3bddceab3
-
C:\Program Files\McAfee\Temp3998184786\resourcedll.cabFilesize
37KB
MD570bd5acece22d3586fbff94fe2fe0a7e
SHA14b46e6b3bf7d88c90090b74bf4ef902833651c20
SHA256f1c9b3cb7c8a1b3a68dfe014b149909387d01d0cc192f5834f882b1972e06fbd
SHA512c603344152632c108f5b9fd88d7f34d3f5f0a4d0ae5b780b364fe61e2f00ff63615ca6575258fd25c668a4f3e0240ada281491b2081022511feac4f5b9c7929c
-
C:\Program Files\McAfee\Temp3998184786\servicehost.cabFilesize
326KB
MD59fe9b6abd88e593f9288bb63446a2ae7
SHA124ed3766b72c89e9cf8da76f3bc9a2552ed7f23c
SHA256a4b2f56755c454d2745d21b30b5c878e79be1a04119e188886cbe8a0e1ccd297
SHA5122e94cfa974ee431f2e2304f1ae6c1779ab089024e86f525570657804322f040bef222ed1c64c03eb4e2ef6a8e1c527301812eb97108a24a2829b192597ec78d4
-
C:\Program Files\McAfee\Temp3998184786\settingmanager.cabFilesize
783KB
MD550b3b5266f709bb84ce80dcda040cdea
SHA1e1862427c715d70425a0d714528c3a117796d010
SHA256146147344df10dfdd23aba2dfbbcd00a60024b8972d8a57b769a5c9a49c4150c
SHA512cae266eece6386048efe5088800c32a4b72b96a59837b3fc4075b46647a33eaea1f6bea620def9c53c7c24ea08dafce68ae49a2a4cf977d205dfc33276ca995b
-
C:\Program Files\McAfee\Temp3998184786\taskmanager.cabFilesize
3.0MB
MD54108ee83a46fffeef0430631bda817a9
SHA1425b10edc4bbe8a50ab309f4633759a029589d88
SHA256a488bde45358dbfe3275e7e0a67ee480849014dc82200e5513d6157abe037119
SHA512d4b30ce00c1849647b7d7a698dc9cc73fff30adde71638294e4db7f3d00feb2d9bd4e14d4aa586aebf780315f728c26d710d1232b393f3c910ba5c388fbe49b3
-
C:\Program Files\McAfee\Temp3998184786\telemetry.cabFilesize
78KB
MD5721ab0661c9c2df45f8fc81c29b19006
SHA1612ee04ff11e37ae75c2752ede42d2bd07e61efc
SHA2568d2c570437fca975c5210886323c6aecee29cdeeac1460c8d01905435097371e
SHA512fd706e7c9353b31004a71bd61705564e9e83cbe6c0bf8b3235103c86aea7b55f72f7429b6a9ef6c52d616b188b0a49f1c7b159fad61bcc51093188f94f557ca7
-
C:\Program Files\McAfee\Temp3998184786\uihost.cabFilesize
322KB
MD5983896bed04e562e81908342aac6c0ae
SHA18d0ba502d7fae61d7402d289f3e77831261de94b
SHA256b54d15c751e3abc2e14ed02cfbafddcbba42979e6d15399406355141ca09668c
SHA512379e0a917090dabd60901fba5941c2f68290400b2194f589ab3de333b36e734492b49ff70ac2b1750cbb3457d616c9c466f7548714c98428ba90cc59f7301773
-
C:\Program Files\McAfee\Temp3998184786\uimanager.cabFilesize
1.8MB
MD5d15a4eb083f7d2cea8ddb9f44545fa23
SHA176422171056209cf6e5732e0082a924f5d6be662
SHA25644b08bcf216ce5bbc6842510d4cf6b20c3c1b97792bb791c50ec8200e66606aa
SHA51231175f52e64507fd7ea45367e2bb9963ba4a685f1fedea0a0dbc000dadbf30876429d0fd6a802fee8cdafc16648213cb77a4c7b84d3c5ecc378f2ace8f13dd9b
-
C:\Program Files\McAfee\Temp3998184786\uninstaller.cabFilesize
1.0MB
MD5bff18033b19b6fed1ef103687a4cf8f6
SHA1c03d295934cb3c1509b92d978c68fa1efe7fe1e1
SHA256d5b7c8b90ef85e380e4173a7dae6f8fb8048b50ac1f5daa0b24dded20a2eab7e
SHA51243ce5e41d6289d03d6714623eab56c23c6670f7b53cbc3fed8a09e85a875e9dd47cd7f670d31e6483fd71dca2ba9c5010cb0b0776e01a856f4e8bff320eec9eb
-
C:\Program Files\McAfee\WebAdvisor\Analytics\dataConfig.cabFilesize
73KB
MD5bd4e67c9b81a9b805890c6e8537b9118
SHA1f471d69f9f5fbfb23ff7d3c38b5c5d5e5c5acf27
SHA256916f5e284237a9604115709a6274d54cb924b912b365c84322171872502d4bf8
SHA51292e1d4a8a93f0bf68fc17288cd1547b2bb9131b8378fbd1ed67a54963a8974717f772e722477417f4eb6c6bb0b3dfba4e7847b20655c3d451cba04f6134c3ab5
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exeFilesize
798KB
MD5f2738d0a3df39a5590c243025d9ecbda
SHA12c466f5307909fcb3e62106d99824898c33c7089
SHA2566d61ac8384128e2cf3dcd451a33abafab4a77ed1dd3b5a313a8a3aaec2b86d21
SHA5124b5ed5d80d224f9af1599e78b30c943827c947c3dc7ee18d07fe29b22c4e4ecdc87066392a03023a684c4f03adc8951bb5b6fb47de02fb7db380f13e48a7d872
-
C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallLogFilesize
388B
MD51068bade1997666697dc1bd5b3481755
SHA14e530b9b09d01240d6800714640f45f8ec87a343
SHA2563e9b9f8ed00c5197cb2c251eb0943013f58dca44e6219a1f9767d596b4aa2a51
SHA51235dfd91771fd7930889ff466b45731404066c280c94494e1d51127cc60b342c638f333caa901429ad812e7ccee7530af15057e871ed5f1d3730454836337b329
-
C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallLogFilesize
633B
MD56895e7ce1a11e92604b53b2f6503564e
SHA16a69c00679d2afdaf56fe50d50d6036ccb1e570f
SHA2563c609771f2c736a7ce540fec633886378426f30f0ef4b51c20b57d46e201f177
SHA512314d74972ef00635edfc82406b4514d7806e26cec36da9b617036df0e0c2448a9250b0239af33129e11a9a49455aab00407619ba56ea808b4539549fd86715a2
-
C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallStateFilesize
7KB
MD5362ce475f5d1e84641bad999c16727a0
SHA16b613c73acb58d259c6379bd820cca6f785cc812
SHA2561f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899
SHA5127630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b
-
C:\Program Files\ReasonLabs\EPP\InstallerLib.dllFilesize
339KB
MD5030ec41ba701ad46d99072c77866b287
SHA137bc437f07aa507572b738edc1e0c16a51e36747
SHA256d5a78100ebbcd482b5be987eaa572b448015fb644287d25206a07da28eae58f8
SHA512075417d0845eb54a559bd2dfd8c454a285f430c78822ebe945b38c8d363bc4ccced2c276c8a5dec47f58bb6065b2eac627131a7c60f5ded6e780a2f53d7d4bde
-
C:\Program Files\ReasonLabs\EPP\mc.dllFilesize
1.1MB
MD5e0f93d92ed9b38cab0e69bdbd067ea08
SHA1065522092674a8192d33dac78578299e38fce206
SHA25673ad69efeddd3f1e888102487a4e2dc1696ca222954a760297d45571f8d10d31
SHA512eb8e3e8069ff847b9e8108ad1e9f7bd50aca541fc135fdd2ad440520439e5c856e8d413ea3ad8ba45dc6497ba20d8f881ed83a6b02d438f5d3940e5f47c4725c
-
C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dllFilesize
348KB
MD541dd1b11942d8ba506cb0d684eb1c87b
SHA14913ed2f899c8c20964fb72d5b5d677e666f6c32
SHA256bd72594711749a9e4f62baabfadfda5a434f7f38d199da6cc13ba774965f26f1
SHA5123bb1a1362da1153184c7018cb17a24a58dab62b85a8453371625ce995a44f40b65c82523ef14c2198320220f36aafdade95c70eecf033dd095c3eada9dee5c34
-
C:\Program Files\ReasonLabs\EPP\rsEngine.configFilesize
6KB
MD587ac4effc3172b757daf7d189584e50d
SHA19c55dd901e1c35d98f70898640436a246a43c5e4
SHA25621b6f7f9ebb5fae8c5de6610524c28cbd6583ff973c3ca11a420485359177c86
SHA5128dc5a43145271d0a196d87680007e9cec73054b0c3b8e92837723ce0b666a20019bf1f2029ed96cd45f3a02c688f88b5f97af3edc25e92174c38040ead59eefe
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLogFilesize
406B
MD50dd7ab115062ec8b9181580dbd12ff02
SHA128a9115deb8d858c2d1e49bec5207597a547ccf0
SHA2562fe9b5c64e7ef21c1ea477c15eff169189bac30fd2028f84df602f52c8fc6539
SHA5122c1a4e5ebf7ab056d4510ea56613fec275ca1da8bb15ed8118e9192fc962833e77974a0363538cebf9ab2a1a1ff9486c3078d14b4820c2a8df803f80f94e19f1
-
C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLogFilesize
606B
MD543fbbd79c6a85b1dfb782c199ff1f0e7
SHA1cad46a3de56cd064e32b79c07ced5abec6bc1543
SHA25619537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0
SHA51279b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea
-
C:\Program Files\ReasonLabs\EPP\ui\EPP.exeFilesize
2.2MB
MD5508e66e07e31905a64632a79c3cab783
SHA1ad74dd749a2812b9057285ded1475a75219246fa
SHA2563b156754e1717c8af7fe4c803bc65611c63e1793e4ca6c2f4092750cc406f8e9
SHA5122976096580c714fb2eb7d35c9a331d03d86296aa4eb895d83b1d2f812adff28f476a32fca82c429edc8bf4bea9af3f3a305866f5a1ab3bbb4322edb73f9c8888
-
C:\Program Files\ReasonLabs\EPP\x64\elam\rsElam.sysFilesize
19KB
MD58129c96d6ebdaebbe771ee034555bf8f
SHA19b41fb541a273086d3eef0ba4149f88022efbaff
SHA2568bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51
SHA512ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18
-
C:\Program Files\ReasonLabs\VPN\Uninstall.exeFilesize
192KB
MD5dfbdb770e1978ed8be16217b71d088cd
SHA15bfdae715d9c66c4616a6b3d1e45e9661a36f2c0
SHA25604d18ccd404a7b20e5ae3a17ca9a01be54f82b511e349379677e7e62aa6a68b9
SHA5127d4801250d8449d3fcbf714351fe86d64201ad22ecbfaa91588046bb1ef88f22912a58689876ac7b1f94e83047920893b488589d14accf4570e5c116c667ef12
-
C:\Program Files\ReasonLabs\VPN\rsVPNSvc.InstallLogFilesize
248B
MD55f2d345efb0c3d39c0fde00cf8c78b55
SHA112acf8cc19178ce63ac8628d07c4ff4046b2264c
SHA256bf5f767443e238cf7c314eae04b4466fb7e19601780791dd649b960765432e97
SHA512d44b5f9859f4f34123f376254c7ad3ba8e0716973d340d0826520b6f5d391e0b4d2773cc165ef82c385c3922d8e56d2599a75e5dc2b92c10dad9d970dce2a18b
-
C:\Program Files\ReasonLabs\VPN\rsVPNSvc.InstallLogFilesize
633B
MD5db3e60d6fe6416cd77607c8b156de86d
SHA147a2051fda09c6df7c393d1a13ee4804c7cf2477
SHA256d6cafeaaf75a3d2742cd28f8fc7045f2a703823cdc7acb116fa6df68361efccd
SHA512aec90d563d8f54ac1dbb9e629a63d65f9df91eadc741e78ba22591ca3f47b7a5ff5a105af584d3a644280ff95074a066781e6a86e3eb7b7507a5532801eb52ee
-
C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txtFilesize
1KB
MD5419e62b72214ea2e2bd4167fab1abe4b
SHA142899941db73c9944c22704905cdb1ddc20cf84b
SHA2569a5367e37b82fb087a2aae9603570ce33aad7c172dc06261beaf621fab1237d0
SHA512433adb967a8ba662d220c89263c524462403042d61aba86037d7068710fe141595d6206d85911ea0d2db3fde678e10e9d358d2f4c1b2a0491f7d9581c1d9299d
-
C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txtFilesize
2KB
MD531657461846425fb637d2872cb728563
SHA182d8b499334e51f34f45e27a7f9667bc329667cf
SHA25618286e2419ed79a5c46e1971fbcfdd2c81bb3b98809d85b48c3b3173156ec335
SHA5123e3cd9a2cf9bd08fc045a6f224ae08124edef2de2ff3ddad336a4b4a7b639a39d451cebbdd7716bfb717582ceed31885c5ec836540d6b4363f07f61f965653fc
-
C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txtFilesize
748B
MD53305fd542fa33a658dcf75064aaef838
SHA1418ade8a868179f956c7a7948f09ab9d0a52fefe
SHA256e9f6466d543df3ab8b1c9c5d584d68edf8fe92a6f372b7ef395c2ca8c1ef8a45
SHA51200f3362927fb09afb7168b71a6c31ef3f6e016984028eec536803b73ea5086bed846f708cef00008f34117b69fb90a536f208fb7d686b2b2a2f0956d8b4f38da
-
C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txtFilesize
2KB
MD5255655dd48ee7cee14b2336ef5ff151c
SHA1954c1b9c28e14a2c4a1ac2e9c557c49097c0c621
SHA256a554819daab8bac672f005172e3f470ecae2617f1f528a28719448af9aad608f
SHA512c6aaacd07238b958742b57e862595ddc397d360f8c2f6d0022c5e463684e53c84d8c12e01a4792dd858aef82ad90953b7e2854511d642207f58b01f8496e9c5b
-
C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txtFilesize
6KB
MD565b2142fd9e77c3f524447ed1cb6ebb2
SHA16018bdec9f6a05c4c90a5b89562056d8468f92b9
SHA256db672d96c19200cffcfa7b513a8745e0066e1bd62a49ccc3136ff04d7343b60a
SHA512c7019936dce6190cd541887f1dcfd0aa048af480ab09e12e015bcff77dea5046e5fceb41fb583130c2df1a5a6b84d01a5d24db1430e9ac10ca5509bb9329e0f5
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYF.dat.tmpFilesize
5.4MB
MD5f04f4966c7e48c9b31abe276cf69fb0b
SHA1fa49ba218dd2e3c1b7f2e82996895d968ee5e7ae
SHA25653996b97e78c61db51ce4cfd7e07e6a2a618c1418c3c0d58fa5e7a0d441b9aaa
SHA5127c8bb803cc4d71e659e7e142221be2aea421a6ef6907ff6df75ec18a6e086325478f79e67f1adcc9ce9fd96e913e2a306f5285bc8a7b47f24fb324fe07457547
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmpFilesize
2.9MB
MD52a69f1e892a6be0114dfdc18aaae4462
SHA1498899ee7240b21da358d9543f5c4df4c58a2c0d
SHA256b667f411a38e36cebd06d7ef71fdc5a343c181d310e3af26a039f2106d134464
SHA512021cc359ba4c59ec6b0ca1ea9394cfe4ce5e5ec0ba963171d07cdc281923fb5b026704eeab8453824854d11b758ac635826eccfa5bb1b4c7b079ad88ab38b346
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat.tmpFilesize
592KB
MD58b314905a6a3aa1927f801fd41622e23
SHA10e8f9580d916540bda59e0dceb719b26a8055ab8
SHA25688dfaf386514c73356a2b92c35e41261cd7fe9aa37f0257bb39701c11ae64c99
SHA51245450ae3f4a906c509998839704efdec8557933a24e4acaddef5a1e593eaf6f99cbfc2f85fb58ff2669d0c20362bb8345f091a43953e9a8a65ddcf1b5d4a7b8e
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\3add33e3-9368-4e6e-b828-5960399c16f6.tmpFilesize
168KB
MD527e0a973f1449e90508c04e5a6a5b86e
SHA1a73aeda6a24c88cd513edb51fe82057888b33e31
SHA2561a1d3f226e1b5d6b13a15080b67865bbd624d8bfd9c4f8a2f7e35b029c6b39d0
SHA5128724eced195065a2bbb38f3fa940ae8b66202690e12fdc598a669574ffaee36d86a32e7fc608b23c83715f7859e6cfb556cc659181f7c90178b7241240449679
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD50287c4b1fa058f3a93cac2d4545f7309
SHA1fac9808c9054a6db877649b32a783e11e9cd6d53
SHA2567dc549e223f36dc05be6bed35603bf0030fad1ae75df05d83dd2e98918dc12fa
SHA5122fe4d5aca2c9729318e1e33925ac8a0a84c115be8761310724b0b00ecae53b8b12ffb93e9d5ca285b07368d0a8a8a9939c16425c94e1fff1be8759898e9eeea3
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\Temp\scoped_dir2568_1848542078\CRX_INSTALL\js\options.bundle.js.LICENSE.txtFilesize
2KB
MD54e994bc011dc4913520bd9f4cefd135a
SHA1de9aa409a953bce76c488dd9b7297a23f63eb909
SHA256923090b15eca2d9a8c7f02431cbc23961b45e34a33c6ca0df8c162abc6f91688
SHA5122d64ebcf3b135c6249d4883c54de3f9bc0cef36c9c071b1295816ee416481659ee1f62d06c92c1b4a92e48c88cb29312398d8cf4e54d3dd5112d801ef3b080db
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\Temp\scoped_dir2568_77149720\CRX_INSTALL\background.jsFilesize
101KB
MD50b370ff3af34cac8e4a8b3b12c78b755
SHA1e4fb824d2b3c9a5c083ce5d8e2c090bbd69b7e81
SHA256f0561da0762e9438ccac13ab7e067cbf2b5989f91b43d5c7218efaa5c1b48765
SHA512942a898d75f8955dc47dbd4ac787e1149606d78e3f626868039af685ef5fae22d364896e93bd6c4be55b2f840d5efc76168bfa5cd7ace7fdc46f04b33e158f7f
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\Temp\scoped_dir2568_77149720\CRX_INSTALL\background.js.LICENSE.txtFilesize
336B
MD5275fe79abee3b697f1673c8bd9c58856
SHA1cf2b1a01feb5dba1eadb49e8fe087675fe70a7fd
SHA256d33efbdf4d309bfa4448199551371ff81d5f57661b781faf79d256554e038595
SHA512f6c93cc7bb4d678fcd51ba4024371915d614621b0f526130ae0a51ac4711c8cacc8881282538674867c11b0e37c1f0cfb5a64bb047c92594e0a4d4c25b26a932
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\Temp\scoped_dir2568_77149720\CRX_INSTALL\img\icons\icon48.pngFilesize
701B
MD574d658682a89aedc22582c15fe8d8583
SHA1d0320a5c085a96d7f87a8f07e2045ffabb56449d
SHA2567f4b72bd4bb72d574b516de85126cb91d9e9492af939f3a9bae80a8ccfd53b56
SHA512cf62c3b790ac34bc07411ea158bd5a1d3e3549738aafdae6202fc37a2b429effda94ab2569f3314ad48d05c0fcf99ba97dc65b5faa1e5b92d9da41f548f0acb1
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\gjcfnponmdkenfdibginkmlmediekpnm\1.28.2.1030_0\_locales\en\messages.jsonFilesize
118B
MD5c01bda904507ad435bc35744985c4ef7
SHA12c298313661fef987782c54829d0f16dd8b129f2
SHA256661505cb11e4b456a6eff122a081aa95e742b405de833106761a90193b2789ba
SHA51252870e5b03ab7db71a9588e775b379bacfa34a4d6afa856d4b09902ceb86b8f92b5b610c4e6db164a13a8fa92241030bc110fc6688a612185902af6e24d1aa83
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\gjcfnponmdkenfdibginkmlmediekpnm\1.28.2.1030_0\img\icons\icon128.pngFilesize
2KB
MD56a26cb923b8a415d07c30e8b74ccd136
SHA1d51efe6a0c87537874de4e6d1aab53bdeae5929d
SHA256adc7ed578516e060e17cc37241d1fc058777cb0fc808def60d8bfa2309bbbead
SHA51258b57af5d6b6755b136e1fcb32e5a97302c473c560b69b5c2c1500bf204a5092ab0b143a10a50e4bcf0a2cfc926a98f1d63f9964097dcac5bea7968624d47789
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\gjcfnponmdkenfdibginkmlmediekpnm\1.28.2.1030_0\img\logos\norton\icon.pngFilesize
3KB
MD575e461d8925e8468b3994dc838bfb68d
SHA140a05fdacfcc9f153cd3df62a95c75fe148fc0fe
SHA256fef31cd788c1845647cb739db304cb65fa21129a93500f51d8865ce52f75a0d3
SHA512880c83b8414bd441d20d61360b7018b4f6fcb68c2affd8b1e32b1d9317e86dda8f9eba925df31b552011d5158eee2f30970756b26b2e77f3cb91ae35c8c37cc0
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\gjcfnponmdkenfdibginkmlmediekpnm\1.28.2.1030_0\img\logos\norton\icon.svgFilesize
6KB
MD52ee58c8732aea4203ecb92e16e5ac68c
SHA1f8cff9d53e57833e10ad2cb2489fb75a57ea7003
SHA256cbd20bdea1a73d4cc506fbafb729d201d01fa08f1884f4495289672f34f398c8
SHA512f6deeb2e330be99e4d5ac63625f7b7f2a052ef2f778c99657714245e9b2ad912dae5029e8dfcd5affc13bc4c892d4ea508db471f009d6c550030c477ee98d87d
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\gjcfnponmdkenfdibginkmlmediekpnm\1.28.2.1030_0\manifest.jsonFilesize
4KB
MD53ba91132ef2a3a1a0d54762ef6d225dc
SHA11869a413cc252602c555903eab78640c4ca0a786
SHA25670ba9f91907b38eb1f3859a99225fe05e3e8aaed5c378f0eb373660e58cdf0be
SHA512373c2e6dac4885dc02379d42c9f3227c142a9a8c59455d3cadbe20d0324f350c2128206620a76cb121c72f273bf98df47abfdefa3b6632435f681786c2b15c8f
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\en_GB\messages.jsonFilesize
7KB
MD5b8645df606dd756306208ec441e9c0dd
SHA18ebd4f5103dc792b6a563768d1c3d6e3b4729c54
SHA2566dde990f4e64d1ecbde90db9d3939f33b3b5c3d1b89704dbb8ec84df8f046de2
SHA51225b256e3ae975c4928d1ab696e821a4be3d5534090902573136f9cb9e3c8005e77e159918d418eb6d6a2c6c7156564d7e7846fb4ab923494ff0d2b0df1304011
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\pt_PT\messages.jsonFilesize
7KB
MD599a9a28a0b5665a1a8e3fa8b85076cf0
SHA1fb644e756930c3216c9effd585236e87f690583c
SHA256518747e12bec5a7a554b7deabefbf510beda3a96cd04427e123e85c123eedf52
SHA512cea778cf5b844aa800676c5e47a91367827abef833519512c402d87c52471020558535aca2983844f6ed4d033abf6011755d424ab921b4592cf82ed95ee17ca8
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\ro\messages.jsonFilesize
8KB
MD5178c7ed90c03f20f19c71e9b5705f3b9
SHA1470896ee040a674614bb6e4cc0062d4111f42eb3
SHA256311db1d0381c412c13d92f5337bde5345e4716d0e43bb3e80d7d688c9aebd5f9
SHA512c98fc7e6bd862a5b69260f8d3d4c825f0ca0828b63d644857e5ca7ed68336c82695ff8b49198e53a609f55d7731bbbfb39b3af28926a719f8af9deddbd755508
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\ru\messages.jsonFilesize
11KB
MD5bbcdfa5b9387e8b6b80c4f4d30a89d1a
SHA1bcd706291baf0bbbbb9055474afe335f6a2c4c5b
SHA256bac067e2e7ac645444397f7f814ce8fadc5d529e5fc808ef178ea505d3281334
SHA512eb93d89995380d28cd57ff65f41023255adf2527ee14b30e155337a7bd518f17d4555bf6b3724085d67a3845bff78d08c1d34ca26797e053c9ec98c36f6ec9dd
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\sk\messages.jsonFilesize
8KB
MD52a430d827ec839a1786efb246693d5e6
SHA1bf2617519899ab91e31ef331196b4ad2f96c0be8
SHA2564ca48885d3d1c0e426774e4de941e041c531291253e6f97ec53f9fb3b057c866
SHA512e5088a0fe2e4924bcc681ce2929862eb30b3b44165eb388128fac3ad790a89063dc433ea095914846d8ed5acb6f523aa80936884a5bc5611efae705cf8607f71
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\sl\messages.jsonFilesize
7KB
MD5a6d4fe43eb63bfe30122108a9576f31b
SHA1d1adba5b437652da1573d61105d4b3029f15b9cd
SHA256ace6ce075ef716b0d8c963c55b28b9d033bca05c62e667f0e99620affe7c1304
SHA512c02203ad3cc82607e204e715f816425101a9999a1cfe93a8cb8a6a2ce6ba0aee6f8528768febb0c954a16610e9484a9e1f1901d7bc667072068358940c8db528
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\sr\messages.jsonFilesize
7KB
MD520c999b9a9b74b3469222ff08f75c3ea
SHA19b335722addbef9c7e2c1ba7cc25d63e776a5cf0
SHA25607a3af371cd2f03d3e900820dae661a1dafa0622b1ec4275a3a89a4e373cd627
SHA51280e6990799b432d474cb781145810ad9954092e334c03f1e5aea881fad50f039868106910067d01c84d45254050c47f7d7e8a4508c48151f0960678954d78ae3
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\sv\messages.jsonFilesize
7KB
MD5a5b18ab5d81a8b455585f164690044a2
SHA1e9ad69a6fd8f2c3549192e7334304e0fc7534f71
SHA2563a5bb1a65cd59348b7f08e51df5ecabc0b90dda55e1fba9a8a7a22289a0f8dd2
SHA512c8ad7bebef69177b98127608adccaddc2fabf6994fae10f0411fdbc13b0e030d0d04dc988d978d232138ce008699cfdae13f215574b2c7ce61f8b7a4af5e3f32
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\th\messages.jsonFilesize
13KB
MD54280b9ce51454aec225d05e59912202f
SHA1f2853f3668d1663e791acbc6e2b64ca0a4fdced7
SHA256f8cd2509caeb97a2d03aabad0066e765ae1b8f9661d5b637a5b62bcce35d2bcd
SHA512a4460144525049b71f9de264caafbb05c41dad7c97173d2b19e00aa90335d45d1ca5de1063478025c158fbd7383cf71091deca8f3eabb1c0aa40856fb4df1ef8
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\tr\messages.jsonFilesize
7KB
MD514cb2de66d573768f6ff9cab96c400cd
SHA1c3eabdc9b778be25210dcdadeca214453957b686
SHA2564ce902abffa76397a8370bd01eac687d301e2ed4d81e00191e66d04d83b2da8d
SHA51228edb203eec685e1185d5482bcff76f80f9a0588450cec6b8c5776b8c49a00c905308e55aea6e56e61c4f79f11c71c55c64226d8918ecf69f4085537c6e92cf7
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\uk\messages.jsonFilesize
11KB
MD56db1c3b4e5938435e45cc8e90d3baaaa
SHA15689b628c3adf89a4d19c5cd19ab9b6206560640
SHA256cba5eefa9faa7347ad98d1afeceae3fc5db42efa4c8408f35496dcf431304533
SHA512e300060116fe6fb69f6f62708fee41a6e282f4d4b3c09c4ce9f26516e9c2a4768fd1f5f9470293928ea45a2dba22ac99d71865331a80c2f79d247934914d02a8
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\ur\messages.jsonFilesize
10KB
MD5d3e3ede899cd40534ddeae337a43022d
SHA1ec9fe1b045fe6d7c3c2120cc138c730b1389c02b
SHA256a5ded924c38bed6d9b09821a7dde4431d04f3f20da4de87277d830f82479fd21
SHA512237aacaf486c10d39ba123125ee181d906d14b45183698796be8f2808c249085b070e9caa347e8076446b73e1ae56c424dbae2e96db601e4aa19427e0f737f84
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\vi\messages.jsonFilesize
9KB
MD57e56c43693a8d7657ca3f40f5396f56d
SHA13fbc2219df565301b75ef8d3e45fe96e1e4b273c
SHA256c1946c6f14ff53483644763d00733f7cdcf1ddd5287a287927c26d495c3761fa
SHA5122bbcbbf51d426b14d99368c51bb83f6add404d403d30acf5d2680f28e07b52fc8e0f08dd3f054d3341fe96ce37e3394e9ef5eaac8dc7e13ebb23aba632ad3133
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\zh_CN\messages.jsonFilesize
7KB
MD561ab8dbd962b6da3f16f080a65a57e4a
SHA1c931cf969f1b4b0254b76c6acbe0ca19ff666b11
SHA256a4d2d3787c2255afeabc2db94abab36417e72e334a903a69215c172e669a6433
SHA512c3e4132c2cf981abd3431e1eafbe36d8a8bcf3421b433263e68f2e2d43ef90dee57e19f86682af3ffb698331d96c4d4303409c6954c47879d1d2bfc4ad66950d
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\_locales\zh_TW\messages.jsonFilesize
7KB
MD5dff7aac6c2369dc370aaa47c2f99d3b3
SHA1cdc8e7d712ae2ed0f1cb01be8c3e9182aecad682
SHA25697a1208d7dc54ab112581557ec348977e932b755e467f0a68e5ab52f0cf302a4
SHA512fdfaecfe8c79807b1ca3dd7ae758a31668ffa6dc9fff51ff4d49ab8f378719cf8c45584c805d904a03268e375b20f13e76db5a62ffed7374c453741a15d1d287
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu4WxKOzY.woff2Filesize
7KB
MD5c1e9793c84cb26c44ef2a2cf8b6f49ce
SHA116ac6efcfa07f298d6ea07f523d48cbbdb38a840
SHA256a223f1cb930ff49e86d7a550fb70d89526b89358f5649efbf5d0589aac159357
SHA5124b81bae4e9bfd128ae8869e6471abff66ffc636932a326d2766395898270b5e9d7254f7a29830401c93d0815fc5520abb609730eead20af26e66dd699ec821d0
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu4mxK.woff2Filesize
15KB
MD5479970ffb74f2117317f9d24d9e317fe
SHA181c796737cbe44d4a719777f0aff14b73a3efb1e
SHA25648c3fa6f86c54f1d9bb519220713d4b0a1f8cd1a589a3c03b9fa82e98ecb13e3
SHA51213f6b2ecc2407445c1f97109ededcc8ac64fae89fc90432a28ffdaef233b373089be25731718408c32ff3cf632afb260d0035f85fbd8b1b4e068a0d7baf9f6a8
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu5mxKOzY.woff2Filesize
9KB
MD58bb64952764a884d67019b3486296ab9
SHA17541837ef0d1a0e69be10243488c3f2141fd632d
SHA256491158614c16e4a767df0f1ddbb82a8462b6ba308b8774c698b82e850a425291
SHA5121eeb9c017cef91b6bd309bf5f9a1cf71ecef7d2fd667d66db2ef52cbf39d61dbd96c996d9c151742c628e0c28ce73c107a3071522839c0b8734168566c5c6856
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu72xKOzY.woff2Filesize
15KB
MD54743c758a952f2bd4a35d4e42afc002b
SHA1394a00a8ed0de504af13ec49be0f0884dfdac1c9
SHA2567aa3c7e43ee40c94ef77505e7da7dc587b0ebb3dd261a2c176a5d17cd0cdda5a
SHA512bcb9d877dc286dbffc397713010fd2cdb6926c3233a439cf4c6bef0c0e5c0fa62349dc621fc673bc0f415d8601b7f76164311106e1eaa96c1eeabf7baa0ef863
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu7GxKOzY.woff2Filesize
11KB
MD5455200cb007fe1212c668721d827c691
SHA1cfac52972c0f5bf3ea1152fe02ed3093c2217350
SHA2564c84629456a70df1137ab4bdcddba32050a2524568912630c2538746cbbcdc51
SHA512a1d5f9b2f52355648cb35fdb8aa58133a61a7a57769ae084ca109a0017a52b323e7300ed500f8ecf2ebf137994de067c6d47f4d1382197b84430704899622096
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu7WxKOzY.woff2Filesize
5KB
MD5a8be5b46d06bb541b0968196ee5e6bb8
SHA18bf73bc09e50908cdba9b5f808d26eeb083269ae
SHA25667afba35bed24f3ccf531a6bfd2c71ee2c6e5de74a3f28fe2b6188a8699f4e04
SHA512a29d0f79b7ff1b259e705bb118f21dea6f8422e140bd943e311019e6d09ce10422d5ac8d0a375740bd12e456d83485bbfaefbaf152efc837cc8e6fd353871b7e
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\css\roboto\KFOmCnqEu92Fr1Mu7mxKOzY.woff2Filesize
1KB
MD5182ee6a4872ca8fa78048951b1561a5c
SHA1f8c3c7692ff285bac213ac0bb28d2b59ec10ad16
SHA256f2b770189d05bc3da6d684147175a1f2ab4f8f030c520f011252df8f7d6201f3
SHA512aefbd6f0b82d1cf81632b0fad08f2c20ad0bc3984cf30beb62ea25df115ab5c5f4df15a3964dd433e64dc6524a124af5c30dd67fa8f56b90ebb1fd03d879ce2a
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\allowed.pngFilesize
1KB
MD5659d696b05fd116ca3316067d7d3db92
SHA159ac6d66b9f37aca2d7073308a99809a14fdbb6a
SHA2563c7721fc41b7c3dd694ebefac4533e6a71e85cd0bb18bc66f57fc3910bcda8fa
SHA5120eae3e619e9ff32474b8094b0319066795c6dd5d4e4e757dbdae5dc1fec9fcb22b4e9d857b73e0adfbf710abada04a51e957184a107133aec1a3d9a8ae8c818b
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\blocked.pngFilesize
1KB
MD58d1763050160343e774a05ecfcecab6f
SHA16590bc6f21e90a7c7d0880201b40cf868de1bcec
SHA2562e9c44dea5527888048883f0558313247049bf86809f4a2fe86f5e86912a9916
SHA5127f5cf621a248aa3ece2fcda0c0820009a660b9f6d8fb781c9056527d75c236ee6b7330323f08746a85f48515a3f3b8a920fc1529f2f293f44ce6b81afaef5c44
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\icon_close.pngFilesize
219B
MD555054c3a7a61162423844dd2c568bf28
SHA1c9ecde134d44be4d386f3c78ad3d49f7c453d3ed
SHA256fa374fb5a21037211bbf15277fdcd87c30acdc2e1cdc5f2600fea674f0394bd8
SHA512766c328ccc325d3852fa3503e3e7a4bf6f7e2a9289adbadb6fd19f53c4cf803bbe492315951d8401754cfc48a3b014e079802e27446466580e6d790661c95875
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\logger_icon.pngFilesize
1KB
MD570b8782333cd514d136052bd5bd11dbe
SHA1ed55be7868aad61d3bcfd626d439780b5afa8731
SHA256b3ab89cc16fbae38b4dfb36ab1f99d10e076542d5eb8c2edd9db3b1d1b721824
SHA5125c54e3180ffc13064eb8e744faa12ab5225a18da99dd54105c759c74175d6de1ec6f8ea45933fafdf3a8f6bce0604ac2e3a25e0a4a33df8fd93a9237d3649a9a
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\logger_table_icon.jpgFilesize
2KB
MD5e90e5deda1c50ec222eb95e8a01b0944
SHA11a7b456677ce61aec40fb37830184af2f975e804
SHA2566f2fb146e6e7cac9c5634663605b6ca6318f5264587af5dd0713b04556bf53db
SHA512bf8213038767d164b6a9a8e73cebdcd0415a44f2ccd115c93f5c09e8213aae2f2bf38bd461bff87b8c331490b60d797527dca20b1746e79bcfd20591d6df700b
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\pro.pngFilesize
1KB
MD516edb603cf8b20ac9fd88cef8d1c902f
SHA1680774dd3f5554b5f3801116532acf2a2e79ba04
SHA256c8a059b78c2e4bf67afd1be5bf217236136b37388b5b236168ff51aa77a9fa2c
SHA5127c66c9b0a6a3ef962ce12dd757a4fae4401219ca2e0c6551fb1e1da4f6686376bcab541b707352fa3383353d65be0477cd53ca1bfcefb4b0545e5ab2e680299f
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\table_list_icon.pngFilesize
573B
MD5c5375879372df0cc99a68f5df816a231
SHA115bdaf45007394c57bd04f5608d4a029a045ca15
SHA2569342bc0b79fcbb310c8b87bcbd7c7b8fe2926de73d517e44a107c62be8d3e8fc
SHA5120417898f95b623e125ff76ba506a94aecfcb4f1c1dce0d9ef217741e550a706848a256efc0f251cf263d0da8313006dd6a27ecfbf0020bd743b0d96ef4ba1176
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\table_regex_icon.pngFilesize
915B
MD525881ceeccbc9c4811fcb3fd27f7293e
SHA111e7931e1b0a8a685cdae2b3322eece073b17195
SHA256438036b862d153a25a63e4681b87b3fc03201d1dac9278be0401ff6d27c69c06
SHA512a2c7505fe6b936af88b4787c0456cfab304832aae73017a69141685a2209a7288d3837c6bc950c49e504f327fe6509b21b718f00a60b055f99e940c8266e59be
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Extensions\onochehmbbbmkaffnheflmfpfjgppblm\5.0.555_0\img\normal\warning.pngFilesize
848B
MD52c5397bd7a1dfd8dabfb46bdc53a9203
SHA12b80882640e83038a377ad9936e842375fa65961
SHA2566f22c135d9518b7e2f5b19c2d12454620594cb6925e1869dfa206aa31abc7d53
SHA512431b3ca97bc398e341491ea389757f2c2694474be043ed1a639504776a99452d6e6f557c2dfecbe7f2e241533dc9cc3d0af0d99cda0387e1aadbc9d92728e75d
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Network\c92b984e-a478-43d5-af40-d9b46b1db2fb.tmpFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\PreferencesFilesize
64KB
MD598a9ac495fc2e3e1c4207ecae9a911aa
SHA1f7ae927887842be73c68a707e3f946ef616d3f1d
SHA2565d80cf81ad4b9d7fc4d1c3cc8ee9ff73c99a3b44193278e7c2c7aaac1395e689
SHA512cd7d0b98c1e3815e734e12eef79d2f889c25306aa4b89cef280adbda31e680bac5a05a8e9b34789c231ecc91386bc254defa12231b2a85a8007d7c558226a673
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD58bac0c6bcafea5f9ffed768f1d26155a
SHA1a009a40129d8ffd7ae5e888ea77a1ff857c15806
SHA2563c4341e51784283bac6b21985f555cc390df80d4b7a056b1796daaf5a1e0437b
SHA512e1e45182c298033f9d2380da99326973ca11c77f0979e63d1107e4cec2a5cfdacbae4bb00a239603126d39a4220c3e9d0794266d5681fa556f17ec5972f4ee59
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Site Characteristics Database\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Default\Site Characteristics Database\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
10KB
MD5bdf5f16e935cbfc29dad59c7b16e9099
SHA17193c25f9ab6225501666410f9a0d64878788518
SHA2567db34d8c0e9d83d3bf47b84707f5679f80f4bfc5563966807c9729068b949f88
SHA512ff66b3d6fc0ecc17b2f1b5335fc50fd86224180096b9e22cb60ea82d4b76067b91bdd375c259f14da3996d299b0bacf8edc815afacd793a21ff076369a3ca792
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local StateFilesize
1KB
MD56d442f6463d6f408e5ac2ef61b418e6b
SHA18d05f8a86caa82c4edb2690801cfa926c8b653f7
SHA2569190a16d4b5eab83371627b2c2a5e6a21a252da2ffa62f1f466867134ed33957
SHA512b4bc2defe74a85b79ed8128d5ae0e61ce052605819d3f1d795fc3bd56ca895bdb48f1a9a038c65026ae3a096d9b1fc5c9db4f863876e4e015634f5fd317e688d
-
C:\Users\Admin\AppData\Local\AVG\Browser\User Data\Local State~RFe5911e8.TMPFilesize
1KB
MD5c1d84d2c02892be92c1038fbbe120a88
SHA1bde97a91aa8d798f4ad2ec4952b9d6db6f67cfca
SHA2560f2c8b12a971e01f865b93ee42d9416dc4e07adeba26d15a13da4a57c72e1d94
SHA5128684bd0876ec50bf5cffa85254e8792f63d6507d79a59c4b8788cb45ef90ec201efb214ac40f5d014a9a07a1a01cda02a94059ab369e802fc285e8304e839a5d
-
C:\Users\Admin\AppData\Local\Temp\71e970e9-8e89-4db0-afdc-b6b0b0e97b67.tmpFilesize
1.2MB
MD54309d5e871697249cfca67e67a8708ee
SHA15dbd4b5b22332b2a70ea425df0a812714f4f3ef0
SHA256b5eba951ae25d50168359f7f456afab7c69ee8c86127bb72eeb4402c1ca9bd14
SHA512285147c13b996a5b66514475bb106aa2fe499b52a78ddfa3bd540a1ee1693a892f095f31c83c7c4ac06c487b482ae22142453e992d79054d18efe336a94cb70e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\596d91fb-1dbb-42e3-898f-ff47d0e5632e\UnifiedStub-installer.exe\assembly\dl3\7196a112\44add91e_c013db01\rsServiceController.DLLFilesize
183KB
MD54f7ae47df297d7516157cb5ad40db383
SHA1c95ad80d0ee6d162b6ab8926e3ac73ac5bd859a3
SHA256e916df4415ae33f57455e3ea4166fbb8fbe99eeb93a3b9dcab9fe1def45e56ed
SHA5124398652b53b8d8c8bac584f83d5869985d32fa123f0e976ef92f789b1f7116572a15d0bb02be3fbc80ed326cfb18eea80fec03ee20ed261e95daa4e91e61c65e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\596d91fb-1dbb-42e3-898f-ff47d0e5632e\UnifiedStub-installer.exe\assembly\dl3\cba2c515\e0e7d41e_c013db01\rsAtom.DLLFilesize
171KB
MD5de22fe744074c51cf3cf1128fcd349cb
SHA1f74ecb333920e8f2785e9686e1a7cce0110ab206
SHA256469f983f68db369448aa6f81fd998e3bf19af8bec023564c2012b1fcc5c40e4b
SHA5125d3671dab9d6d1f40a9f8d27aeea0a45563898055532f6e1b558100bed182c69e09f1dfd76574cb4ed36d7d3bb6786eff891d54245d3fab4f2ade3fe8f540e48
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\596d91fb-1dbb-42e3-898f-ff47d0e5632e\UnifiedStub-installer.exe\assembly\dl3\fbcfef4f\44add91e_c013db01\rsJSON.DLLFilesize
221KB
MD5e3a81be145cb1dc99bb1c1d6231359e8
SHA1e58f83a32fe4b524694d54c5e9ace358da9c0301
SHA256ee938d09bf75fc3c77529ccd73f750f513a75431f5c764eca39fdbbc52312437
SHA512349802735355aac566a1b0c6c779d6e29dfd1dc0123c375a87e44153ff353c3bfc272e37277c990d0b7e24502d999804e5929ddc596b86e209e6965ffb52f33b
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\596d91fb-1dbb-42e3-898f-ff47d0e5632e\UnifiedStub-installer.exe\assembly\dl3\fff1f302\44add91e_c013db01\rsLogger.DLLFilesize
183KB
MD554ff6dfafb1ee7d42f013834312eae41
SHA17f30c2ffb6c84725d90ce49ca07eb4e246f2b27b
SHA256ef5ce90acf6eb5196b6ba4a24db00d17c83b4fbd4adfa1498b4df8ed3bf0bd0c
SHA512271f1203ee1bacac805ab1ffa837cad3582c120cc2a1538610364d14ffb4704c7653f88a9f1cccf8d89a981caa90a866f9b95fb12ed9984a56310894e7aae2da
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\6b9126ca-fef7-4e8b-8b0a-d5bd52e934bb\UnifiedStub-installer.exe\assembly\dl3\6690bfed\c5ec502c_c013db01\rsServiceController.DLLFilesize
173KB
MD5068958f78fab4b76e5196051df3af162
SHA16f7489e40d3c48b922511622238fdb8383560ac3
SHA256c3009c36e9353ee749a69b1569efc81b91dc1e7af403c8742787a412a7429aa8
SHA5128a7daf88049912f00434b0cc239bad4b07682532d96a9f3e30e2f1cdb33e0441e2e7742ab727854f7b9372d4168ebd24af5350b0ee36247719c026e018975e2b
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\6b9126ca-fef7-4e8b-8b0a-d5bd52e934bb\UnifiedStub-installer.exe\assembly\dl3\80e02e8d\aa8a4e2c_c013db01\rsAtom.DLLFilesize
157KB
MD54bc064996097db51318511ed2566851d
SHA1413e6d0217172bc1a86d1c916dc575d080d7ff3f
SHA2561caf633d64246a4a0597232c7fb87f2b8a3e35648f3d30f575cbc69249959203
SHA512332dfe6c28d932d8d4868432edded14fe816f17d80d9c543da0ce3cf87f796e70acb1a0c8a3e1653c5f9994834c17b972047cc8679508634217362e7205f281e
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\6b9126ca-fef7-4e8b-8b0a-d5bd52e934bb\UnifiedStub-installer.exe\assembly\dl3\a575a035\c5ec502c_c013db01\rsLogger.DLLFilesize
178KB
MD52f2164b351afc5d08420257cd32b9c4e
SHA11ea3c935c7c72a94f863e7dbe7dacccd39980970
SHA256ec54e4f32f3ea10486839080cffb4c13aecf12b278622bf048f5b5fa64c98437
SHA512949179ceef6995b3c9692110b22cf07fb7f187adbb22a78b15d239b93fc12c461ca1008c3cbc87c62fd68e1482a10710fea40679b3e82a11ca5fdec6df6174fb
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\6b9126ca-fef7-4e8b-8b0a-d5bd52e934bb\UnifiedStub-installer.exe\assembly\dl3\e1251b79\c5ec502c_c013db01\rsJSON.DLLFilesize
216KB
MD57dd406fa2b496d691f866eddc790d6cc
SHA1692422b46102af2ab31f7902a970c912a2ba000d
SHA256bd7b33b101f222846b09f057bc54bc586ed5da63fe189e9ab19bcc43ecf85956
SHA512c8ac9e9491f6695de1d9c3fee1ddbdd0261b8e32928bc228858021851fed501cb6b12adc5dc282e703a1e8efdf372073c1794f202943149e7320831846708979
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\Microsoft.Win32.TaskScheduler.dllFilesize
340KB
MD5e6a31390a180646d510dbba52c5023e6
SHA12ac7bac9afda5de2194ca71ee4850c81d1dabeca
SHA256cccc64ba9bbe3897c32f586b898f60ad0495b03a16ee3246478ee35e7f1063ec
SHA5129fd39169769b70a6befc6056d34740629fcf680c9ba2b7d52090735703d9599455c033394f233178ba352199015a384989acf1a48e6a5b765b4b33c5f2971d42
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\Newtonsoft.Json.dllFilesize
701KB
MD54f0f111120d0d8d4431974f70a1fdfe1
SHA1b81833ac06afc6b76fb73c0857882f5f6d2a4326
SHA256d043e6cde1f4d8396978cee2d41658b307be0ca4698c92333814505aa0ccab9a
SHA512e123d2f9f707eb31741ef8615235e714a20c6d754a13a97d0414c46961c3676025633eb1f65881b2d6d808ec06a70459c860411d6dd300231847b01ed0ce9750
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\UnifiedStub-installer.exeFilesize
1.0MB
MD5493d5868e37861c6492f3ac509bed205
SHA11050a57cf1d2a375e78cc8da517439b57a408f09
SHA256dc5bc92e51f06e9c66e3933d98dc8f8d217bc74b71f93d900e4d42b1fb5cc64f
SHA512e7e37075a1c389e0cad24ce2c899e89c4970e52b3f465d372a7bc171587ed1ee7d4f0a6ba44ab40b18fdf0689f4e29dfdbccbabb07e0f004ef2f894cb20d995d
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\rsAtom.dllFilesize
169KB
MD5dc15f01282dc0c87b1525f8792eaf34e
SHA1ad4fdf68a8cffedde6e81954473dcd4293553a94
SHA256cc036bcf74911fe5afb8e9fcc0d52b3f08b4961bcda4e50851eda4159b1c9998
SHA51254ee7b7a638d0defcff3a80f0c87705647b722d3d177bc11e80bfe6062a41f138ef99fc8e4c42337b61c0407469ef684b704f710b8ead92b83a14f609f0bc078
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\rsLogger.dllFilesize
182KB
MD51cfc3fc56fe40842094c7506b165573a
SHA1023b3b389fdfa7a9557623b2742f0f40e4784a5c
SHA256187da6a5ab64c9b814ab8e1775554688ad3842c3f52f5f318291b9a37d846aa2
SHA5126bd1ceaf12950d047a87fd2d9c1884c7ac6e45bd94f11be8df8144ddd3f71db096469d1c775cf1cb8bc7926f922e5a6676b759707053e2332aa66f86c951fbc0
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\rsStubLib.dllFilesize
271KB
MD53bcbeaab001f5d111d1db20039238753
SHA14a9c0048bbbf04aa9fe3dfb9ce3b959da5d960f8
SHA256897131dd2f9d1e08d66ae407fe25618c8affb99b6da54378521bf4403421b01a
SHA512de6cde3ad47e6f3982e089700f6184e147a61926f33ead4e2ff5b00926cfc55eb28be6f63eea53f7d15f555fd820453dd3211f0ba766cb3e939c14bb5e0cfc4c
-
C:\Users\Admin\AppData\Local\Temp\7zS8B465508\uninstall-epp.exeFilesize
319KB
MD579638251b5204aa3929b8d379fa296bb
SHA19348e842ba18570d919f62fe0ed595ee7df3a975
SHA2565bedfd5630ddcd6ab6cc6b2a4904224a3cb4f4d4ff0a59985e34eea5cd8cf79d
SHA512ab234d5815b48555ddebc772fae5fa78a64a50053bdf08cc3db21c5f7d0e3154e0726dacfc3ea793a28765aea50c7a73011f880363cbc8d39a1c62e5ed20c5a9
-
C:\Users\Admin\AppData\Local\Temp\8790c4ce-4808-40a3-baa9-2a504a0f7014.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\89acd1b8-bc0c-4d51-8765-c7667453fbee.tmpFilesize
1.9MB
MD521b06e448a0bee23eb6b80dfb39f1e82
SHA1d60b3a9021a704247af4ba58bd539d42f780661f
SHA2563cad9f24f2ec2bee7bef2410ef713924640bda964e865096db6dde37103481ba
SHA5129678b1302eb289f04c0fad0a60455da7d24da4bb72177561f8668f0995d695485eba915bb222d7231a8188ac6ff3b4b0ffbbfe3b725b9c0112ca6af9465f5709
-
C:\Users\Admin\AppData\Local\Temp\9058eaa3-d76d-4e81-b0f2-6ecba4ee8481.tmpFilesize
88KB
MD574638a4d191dee2a0f0314eda3d0b51c
SHA184cb3a270cab5a24eb298082f436f36256b0042a
SHA256685533a3ba2457337e069f1d933bf33950730486c0d61976be01e82cd70765fa
SHA5121795743f43a4dabeacd75603b80040591f6de364fa37255b9e30a2db17004275a3883216ac54555629af3d5afd93109a4b4afa25a6e658a8e13744f80e0f2403
-
C:\Users\Admin\AppData\Local\Temp\9ba083aa-d5c5-4fef-9431-c1971ea36b7d.tmpFilesize
3.8MB
MD568bd679218d97c36a02d46442ac3c84d
SHA1c11a7633763b70f5ed8fcc5bcefde808800dfc03
SHA256654df99e4671942e469f32e713d36eacda10b859939d9dff530b5c6b168b6776
SHA51235186a8dedb317795718abf2c0b79c5c7ab9cfe5cb56bb15f95986bbbce5bf4880ce9fcf0892e5b61c5c5e8ec57261a047734c30725faf943b2b53e67cf7235e
-
C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{E6C0CC98-E9CC-4E72-A660-1A600B2B53D2}\ADDRESSES.TMPFilesize
7B
MD5ecdf0684a14d5b747c245d659b5f33b1
SHA1fee7035409106461ca06d14236db42543aa042ee
SHA256631bdc5422d1339287bf86b7a204f35956f676d473b27879f304d608238c318d
SHA512e4cdd4b29e1a8cb4d1161a019a304122df5299d62001c3a03426d89b9b7f1fe69e3c3adff0bd036f333490d8673081da50b3165d44c4978e00980b4df7aa920d
-
C:\Users\Admin\AppData\Local\Temp\abb1316f-2268-4c54-9789-c6b47e8deb08.tmpFilesize
1.3MB
MD506d466a1cde4306356506b35153c5ebd
SHA1c43850528e8150e1f0e253653d2f0155d00585fd
SHA2566b1205e9b435c6241ab9c244b1dc3c309c1d82211268501e71e43c4425fbf590
SHA5125d79ae61fea7097ddf4b5f2c639ddd1ebdffb7d0e69b74aac47e166afbe94e88e3a4dbd1cf34d55c6c8b0fcba3c30b676c8460b120470c17278caf22896b0b33
-
C:\Users\Admin\AppData\Local\Temp\eedkdy35.exeFilesize
2.4MB
MD546d0300b54803a2c04635bd372c74640
SHA12d12898c9d47d8c7e598737afe602637b13df3ca
SHA2565ac295ba10c6e3dfec2297a2469874829d1517c14ad3176f897a7e8d542a7e27
SHA5124edb9178d010237108639b77c1662fa2b1d34922094e36d51f7db40db75735edb7d595b7936072e139592d4c690f448307be3c9795b59de11efa770c56299ab8
-
C:\Users\Admin\AppData\Local\Temp\is-9SF49.tmp\_isetup\_setup64.tmpFilesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
C:\Users\Admin\AppData\Local\Temp\is-F1FBF.tmp\CheatEngine75.tmpFilesize
3.1MB
MD59aa2acd4c96f8ba03bb6c3ea806d806f
SHA19752f38cc51314bfd6d9acb9fb773e90f8ea0e15
SHA2561b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb
SHA512b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\AVG_BRW.pngFilesize
29KB
MD50b4fa89d69051df475b75ca654752ef6
SHA181bf857a2af9e3c3e4632cbb88cd71e40a831a73
SHA25660a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e
SHA5128106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\CheatEngine75.exeFilesize
26.1MB
MD5e0f666fe4ff537fb8587ccd215e41e5f
SHA1d283f9b56c1e36b70a74772f7ca927708d1be76f
SHA256f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af
SHA5127f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\RAV_Cross.pngFilesize
74KB
MD5cd09f361286d1ad2622ba8a57b7613bd
SHA14cd3e5d4063b3517a950b9d030841f51f3c5f1b1
SHA256b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8
SHA512f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\WebAdvisor.pngFilesize
47KB
MD54cfff8dc30d353cd3d215fd3a5dbac24
SHA10f4f73f0dddc75f3506e026ef53c45c6fafbc87e
SHA2560c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856
SHA5129d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\logo.pngFilesize
246KB
MD5f3d1b8cd125a67bafe54b8f31dda1ccd
SHA11c6b6bf1e785ad80fc7e9131a1d7acbba88e8303
SHA25621dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf
SHA512c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod0.exeFilesize
32KB
MD53830230b5e919a39b8d2571dec72181a
SHA136604c1f5b1c9dddee4ad38b589ccc4d1d55958c
SHA256421dcbae07951d9d61fad63cf7743506c45cc5869401373c4b55b79ff0561eac
SHA512379a3f6bf1a80528bd98bd2d471545ebbfe23b27fdf1404b28c6ad4a7db1e0083d4e631588c4535946dbf9e50b5600c0c3d8152865f6097e6fe4dc886a3cef87
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1.zipFilesize
515KB
MD5f68008b70822bd28c82d13a289deb418
SHA106abbe109ba6dfd4153d76cd65bfffae129c41d8
SHA256cc6f4faf4e8a9f4d2269d1d69a69ea326f789620fb98078cc98597f3cb998589
SHA512fa482942e32e14011ae3c6762c638ccb0a0e8ec0055d2327c3acc381dddf1400de79e4e9321a39a418800d072e59c36b94b13b7eb62751d3aec990fb38ce9253
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\installer.exeFilesize
24.4MB
MD51f33ef139e68dd3964151053787a95e9
SHA1e8dc0eb54526fb427e7cb7ee6c8d0ad330ba97b8
SHA256a3a8e3067c8c1aade62617b6882c3dddd6d681994346c957f85c22a073c725b6
SHA512c2896443e41ad4adc6f86e7e73897213dacb2eee93e249ac01a348f40ba3c2b8ee16f2b029c6a681ea694338ff6ffd126e0147b4a1509bf8e34b8edf202fc46a
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod1_extract\saBSI.exeFilesize
1.1MB
MD5143255618462a577de27286a272584e1
SHA1efc032a6822bc57bcd0c9662a6a062be45f11acb
SHA256f5aa950381fbcea7d730aa794974ca9e3310384a95d6cf4d015fbdbd9797b3e4
SHA512c0a084d5c0b645e6a6479b234fa73c405f56310119dd7c8b061334544c47622fdd5139db9781b339bb3d3e17ac59fddb7d7860834ecfe8aad6d2ae8c869e1cb9
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod2.zipFilesize
5.7MB
MD56406abc4ee622f73e9e6cb618190af02
SHA12aa23362907ba1c48eca7f1a372c2933edbb7fa1
SHA256fd83d239b00a44698959145449ebfcb8c52687327deac04455e77a710a3dfe1b
SHA512dd8e43f8a8f6c6e491179240bdfefdf30002f3f2900b1a319b4251dfa9ca7b7f87ddf170ba868ab520f94de9cc7d1854e3bcfd439cad1e8b4223c7ee06d649f1
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\prod2_extract\avg_secure_browser_setup.exeFilesize
5.8MB
MD5591059d6711881a4b12ad5f74d5781bf
SHA133362f43eaf8ad42fd6041d9b08091877fd2efba
SHA25699e8de20a35a362c2a61c0b9e48fe8eb8fc1df452134e7b6390211ab19121a65
SHA5126280064a79ca36df725483e3269bc1e729e67716255f18af542531d7824a5d76b38a7dcefca048022c861ffcbd0563028d39310f987076f6a5da6c7898c1984c
-
C:\Users\Admin\AppData\Local\Temp\is-NU31T.tmp\zbShieldUtils.dllFilesize
2.0MB
MD5b83f5833e96c2eb13f14dcca805d51a1
SHA19976b0a6ef3dabeab064b188d77d870dcdaf086d
SHA25600e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401
SHA5128641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb
-
C:\Users\Admin\AppData\Local\Temp\is-TA8AN.tmp\CheatEngine75 (1).tmpFilesize
3.1MB
MD5349c57b17c961abbe59730d3cc5614b2
SHA132278b8621491e587a08f0764501b8b8314fd94c
SHA256de28f1f10d5136dc5b30ccb73750559cca91720533717e9398ee45a44c75481b
SHA51254d54d8b682c8cf9b06452a493e96307bfd9b8193f21e8eb5e89ad4420e1f6e066cf8bdeb70444ebcf2297520a4716ae1910124f21cab98e012f0fd19783c1f5
-
C:\Users\Admin\AppData\Local\Temp\mwa2A66.tmpFilesize
161KB
MD5662de59677aecac08c7f75f978c399da
SHA11f85d6be1fa846e4bc90f7a29540466cf3422d24
SHA2561f5a798dde9e1b02979767e35f120d0c669064b9460c267fb5f007c290e3dceb
SHA512e1186c3b3862d897d9b368da1b2964dba24a3a8c41de8bb5f86c503a0717df75a1c89651c5157252c94e2ab47ce1841183f5dde4c3a1e5f96cb471bf20b3fdd0
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\AVGBrowserUpdateSetup.exeFilesize
1.6MB
MD59750ea6c750629d2ca971ab1c074dc9d
SHA17df3d1615bec8f5da86a548f45f139739bde286b
SHA256cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c
SHA5122ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\CR.History.tmpFilesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\CR.History.tmpFilesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\FF.places.tmpFilesize
5.0MB
MD5c822ad3a46e58afab84d23614a08e0bc
SHA1196f257903ccefa439dc673690c6910356bd1d81
SHA256a8dc0fe0bcf7f1553cf0f530f88b38f033b914170d71df05f84093498d82d438
SHA512bc5da3bac510289c47d7c835ae6dd50fe96f64e1f522ac930be451cd9e47c5d395b5ff463f9b4aee33b98785f1bd4eec6a0d321962ecbc60e2eb5a0d66c735d2
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\JsisPlugins.dllFilesize
2.1MB
MD5bd94620c8a3496f0922d7a443c750047
SHA123c4cb2b4d5f5256e76e54969e7e352263abf057
SHA256c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644
SHA512954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\Midex.dllFilesize
126KB
MD5581c4a0b8de60868b89074fe94eb27b9
SHA170b8bdfddb08164f9d52033305d535b7db2599f6
SHA256b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd
SHA51294290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\StdUtils.dllFilesize
195KB
MD57602b88d488e54b717a7086605cd6d8d
SHA1c01200d911e744bdffa7f31b3c23068971494485
SHA2562640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11
SHA512a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\jsis.dllFilesize
127KB
MD54b27df9758c01833e92c51c24ce9e1d5
SHA1c3e227564de6808e542d2a91bbc70653cf88d040
SHA256d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb
SHA512666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\nsJSON.dllFilesize
36KB
MD5ddb56a646aea54615b29ce7df8cd31b8
SHA10ea1a1528faafd930ddceb226d9deaf4fa53c8b2
SHA25607e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069
SHA5125d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8
-
C:\Users\Admin\AppData\Local\Temp\nsg14FC.tmp\thirdparty.dllFilesize
93KB
MD5070335e8e52a288bdb45db1c840d446b
SHA19db1be3d0ab572c5e969fea8d38a217b4d23cab2
SHA256c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc
SHA5126f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\logs\logzio.txtFilesize
3KB
MD587b6860d6843e640916ef0fc88e1d8ea
SHA127799b3177262d6d92c62971d8dada2d91c4f9ec
SHA25669f7b1b22aa7604ce447256dc2bb702deed99a5c548013b4a542b45baa23467e
SHA512ef22dac55873336e5938bdfd904b0ef861fd083a54755c368aedb5a0b41195f87f82a9c3e791b5ce3b7232e1cd2c82dac2200deebdde324f744b679b3dd9976f
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN\Partitions\plan-picker_2.18.0\Code Cache\js\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN\Partitions\plan-picker_2.18.0\DawnCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN\Partitions\plan-picker_2.18.0\GPUCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN\Partitions\plan-picker_2.18.0\GPUCache\data_1Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\VPN\Partitions\plan-picker_2.18.0\GPUCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BD96F9183ADE69B6DF458457F594566C_48BDF541C9BF1B2BAD41358CD874DC4BFilesize
2KB
MD5ccf7c2f4dd078c89219c5be8e0daf530
SHA1c3d043fb096ba571bb152b891d00067ba43f96fe
SHA25643b6ee36cd63bcc96e55920354bb2af8a91f38467244f32e4f12413c9cc93394
SHA512b0c93da476e09399e63cf823cfdf7cabfed9bc3051f5e0b936d334563bd898ace3144492d598ee68f33d77d63e46095cddf2969a4c2742dbf5917a7f6ed21f94
-
C:\Windows\Temp\Tmp1993.tmpFilesize
25KB
MD57100b585987b70e4f85686e78c52f283
SHA1dbc2358993f73a97897815a8524804fb692c6165
SHA256937dcaf57370af649133e5f48aafed6e25345c93d599a981aca520ce6da8c1c0
SHA512739a2190659fe679721d5d4f8d6c0913b1bb54d44c67b6620b52d49b3d42c692d80a0c5358bfa480eb348f6d2b36125cd2d9563eff3ec49f17008ede671c688f
-
C:\Windows\Temp\Tmp1BD7.tmpFilesize
26KB
MD5c36eb8336b91d277dfa8575eb00d6364
SHA19ec81b49e7675548449e010950bc50bff7cbc960
SHA2564336e05960fee8c775b343209911f14acbfdde1e8d5aa9d1f0ea680fb4407307
SHA5120abe6e367d1c934fec8a89617b5fbfea5ab7f8e557ada7a667aedb495f637c8782a2f4723c2d68b9edae4f426deb5bbc0536f643fc65ecc2cd33295078474394
-
C:\Windows\Temp\Tmp1E0C.tmpFilesize
26KB
MD50f3432346a273777b5f4d2e6a3bca343
SHA1f1042c066712444f12300f03892d4437c1cca00a
SHA2564853d61601a860c628771993f3a57b5ab842c88d696235febfaa3cd890ebcd1e
SHA51250f769a888cd9c732d334818549a66a2894d18756e1a142b1c7593224a1bb310e59c611b6a9e12f5f4e76444f0db0c54cf61d0d660740107300a2f245c680a49
-
C:\Windows\Temp\TmpE6F.tmpFilesize
6.4MB
MD5f40c5626532c77b9b4a6bb384db48bbe
SHA1d3124b356f6495288fc7ff1785b1932636ba92d3
SHA256e6d594047deecb0f3d49898475084d286072b6e3e4a30eb9d0d03e9b3228d60f
SHA5128eabf1f5f6561a587026a30258c959a6b3aa4fa2a2d5a993fcd7069bff21b1c25a648feea0ac5896adcf57414308644ac48a4ff4bdc3a5d6e6b91bc735dc1056
-
memory/776-2-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/776-27-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/776-0-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2268-772-0x00007FF7A8840000-0x00007FF7A8850000-memory.dmpFilesize
64KB
-
memory/2268-565-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-564-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-572-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-563-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-562-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-579-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-763-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-831-0x00007FF772650000-0x00007FF772660000-memory.dmpFilesize
64KB
-
memory/2268-847-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-877-0x00007FF766190000-0x00007FF7661A0000-memory.dmpFilesize
64KB
-
memory/2268-884-0x00007FF7A9220000-0x00007FF7A9230000-memory.dmpFilesize
64KB
-
memory/2268-875-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-961-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-973-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-955-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-953-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-949-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-929-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-927-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-925-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-873-0x00007FF7794C0000-0x00007FF7794D0000-memory.dmpFilesize
64KB
-
memory/2268-867-0x00007FF766190000-0x00007FF7661A0000-memory.dmpFilesize
64KB
-
memory/2268-865-0x00007FF766190000-0x00007FF7661A0000-memory.dmpFilesize
64KB
-
memory/2268-777-0x00007FF794EF0000-0x00007FF794F00000-memory.dmpFilesize
64KB
-
memory/2268-765-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-821-0x00007FF7A9220000-0x00007FF7A9230000-memory.dmpFilesize
64KB
-
memory/2268-808-0x00007FF774670000-0x00007FF774680000-memory.dmpFilesize
64KB
-
memory/2268-577-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-802-0x00007FF794EF0000-0x00007FF794F00000-memory.dmpFilesize
64KB
-
memory/2268-584-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-770-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-769-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-587-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-768-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-767-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-592-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-593-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-595-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-766-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-602-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-604-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-695-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-757-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-758-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-759-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-760-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-761-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-762-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2268-764-0x00007FF76BC70000-0x00007FF76BC80000-memory.dmpFilesize
64KB
-
memory/2512-5407-0x000001ECA6ED0000-0x000001ECA6F00000-memory.dmpFilesize
192KB
-
memory/2512-350-0x000001EC8D110000-0x000001EC8D13E000-memory.dmpFilesize
184KB
-
memory/2512-5432-0x000001ECA7080000-0x000001ECA70B0000-memory.dmpFilesize
192KB
-
memory/2512-5419-0x000001ECA6ED0000-0x000001ECA6EFE000-memory.dmpFilesize
184KB
-
memory/2512-5396-0x000001ECA6FD0000-0x000001ECA700A000-memory.dmpFilesize
232KB
-
memory/2512-3718-0x000001ECA6F70000-0x000001ECA6FC8000-memory.dmpFilesize
352KB
-
memory/2512-3681-0x000001ECA6D80000-0x000001ECA6DD0000-memory.dmpFilesize
320KB
-
memory/2512-296-0x000001EC8D080000-0x000001EC8D0B0000-memory.dmpFilesize
192KB
-
memory/2512-370-0x000001ECA5910000-0x000001ECA5968000-memory.dmpFilesize
352KB
-
memory/2512-294-0x000001EC8CF10000-0x000001EC8CF56000-memory.dmpFilesize
280KB
-
memory/2512-322-0x000001ECA5AD0000-0x000001ECA5B82000-memory.dmpFilesize
712KB
-
memory/2512-328-0x000001EC8D0E0000-0x000001EC8D102000-memory.dmpFilesize
136KB
-
memory/2512-292-0x000001EC8B260000-0x000001EC8B36C000-memory.dmpFilesize
1.0MB
-
memory/2632-1887-0x00007FF8D4493000-0x00007FF8D4495000-memory.dmpFilesize
8KB
-
memory/2632-67-0x00007FF8D4493000-0x00007FF8D4495000-memory.dmpFilesize
8KB
-
memory/2632-68-0x000001BFB6D10000-0x000001BFB6D18000-memory.dmpFilesize
32KB
-
memory/2632-69-0x000001BFD1670000-0x000001BFD1B98000-memory.dmpFilesize
5.2MB
-
memory/2972-43-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-25-0x0000000004C10000-0x0000000004D50000-memory.dmpFilesize
1.2MB
-
memory/2972-109-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-52-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-6-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-311-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-44-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-42-0x0000000004C10000-0x0000000004D50000-memory.dmpFilesize
1.2MB
-
memory/2972-38-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-37-0x0000000004C10000-0x0000000004D50000-memory.dmpFilesize
1.2MB
-
memory/2972-33-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-3138-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-32-0x0000000004C10000-0x0000000004D50000-memory.dmpFilesize
1.2MB
-
memory/2972-28-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/2972-26-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/4536-5517-0x00000158FF920000-0x00000158FF97A000-memory.dmpFilesize
360KB
-
memory/4536-5543-0x00000158FFCD0000-0x00000158FFF28000-memory.dmpFilesize
2.3MB
-
memory/4536-5519-0x00000158FF500000-0x00000158FF54A000-memory.dmpFilesize
296KB
-
memory/4536-5529-0x00000158FFA20000-0x00000158FFA64000-memory.dmpFilesize
272KB
-
memory/4536-5518-0x00000158FF8C0000-0x00000158FF8E8000-memory.dmpFilesize
160KB
-
memory/4536-5516-0x00000158FF500000-0x00000158FF54A000-memory.dmpFilesize
296KB
-
memory/4956-156-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/5924-5458-0x00000209FBD20000-0x00000209FBD4E000-memory.dmpFilesize
184KB
-
memory/5924-5459-0x00000209FBD20000-0x00000209FBD4E000-memory.dmpFilesize
184KB
-
memory/5924-5473-0x00000209FDA70000-0x00000209FDAAC000-memory.dmpFilesize
240KB
-
memory/5924-5472-0x00000209FDA10000-0x00000209FDA22000-memory.dmpFilesize
72KB
-
memory/6412-5511-0x000001E96DA60000-0x000001E96DDC6000-memory.dmpFilesize
3.4MB
-
memory/6412-5514-0x000001E954F30000-0x000001E954F52000-memory.dmpFilesize
136KB
-
memory/6412-5513-0x000001E954EE0000-0x000001E954EFA000-memory.dmpFilesize
104KB
-
memory/6412-5512-0x000001E96D870000-0x000001E96D9EC000-memory.dmpFilesize
1.5MB
-
memory/7176-5551-0x0000023F7D5F0000-0x0000023F7D622000-memory.dmpFilesize
200KB
-
memory/7176-5761-0x0000023F7E780000-0x0000023F7E7E6000-memory.dmpFilesize
408KB
-
memory/7176-5768-0x0000023F7E7F0000-0x0000023F7E832000-memory.dmpFilesize
264KB
-
memory/7176-5570-0x0000023F7D5B0000-0x0000023F7D5DE000-memory.dmpFilesize
184KB
-
memory/7176-5769-0x0000023F7FC30000-0x0000023F7FEB0000-memory.dmpFilesize
2.5MB
-
memory/7176-5550-0x0000023F7DC20000-0x0000023F7DC98000-memory.dmpFilesize
480KB
-
memory/7176-5548-0x0000023F7D640000-0x0000023F7D6C8000-memory.dmpFilesize
544KB
-
memory/7176-5549-0x0000023F7D420000-0x0000023F7D44A000-memory.dmpFilesize
168KB
-
memory/7176-5547-0x0000023F7D460000-0x0000023F7D498000-memory.dmpFilesize
224KB
-
memory/7176-5864-0x0000023F7E680000-0x0000023F7E6B2000-memory.dmpFilesize
200KB
-
memory/7176-5675-0x0000023F7D700000-0x0000023F7D724000-memory.dmpFilesize
144KB
-
memory/7176-5676-0x0000023F7DCA0000-0x0000023F7DCC6000-memory.dmpFilesize
152KB
-
memory/7176-5678-0x0000023F7DFE0000-0x0000023F7E288000-memory.dmpFilesize
2.7MB
-
memory/7176-5867-0x0000023F64CE0000-0x0000023F64CE8000-memory.dmpFilesize
32KB
-
memory/7176-5704-0x0000023F64C40000-0x0000023F64C70000-memory.dmpFilesize
192KB
-
memory/7176-5705-0x0000023F7DDD0000-0x0000023F7DE2E000-memory.dmpFilesize
376KB
-
memory/7176-5706-0x0000023F7E290000-0x0000023F7E5F9000-memory.dmpFilesize
3.4MB
-
memory/7176-5707-0x0000023F7DD70000-0x0000023F7DDBF000-memory.dmpFilesize
316KB
-
memory/7176-5868-0x0000023F7E840000-0x0000023F7E866000-memory.dmpFilesize
152KB
-
memory/7176-5709-0x0000023F7E890000-0x0000023F7EB16000-memory.dmpFilesize
2.5MB
-
memory/7176-5710-0x0000023F7DEA0000-0x0000023F7DF06000-memory.dmpFilesize
408KB
-
memory/7176-5870-0x0000023F7EB20000-0x0000023F7EB48000-memory.dmpFilesize
160KB
-
memory/7176-5751-0x0000023F7DF50000-0x0000023F7DF8A000-memory.dmpFilesize
232KB
-
memory/7176-5752-0x0000023F7DCD0000-0x0000023F7DCF6000-memory.dmpFilesize
152KB
-
memory/7176-5758-0x0000023F7E600000-0x0000023F7E634000-memory.dmpFilesize
208KB
-
memory/7176-5757-0x0000023F7E6C0000-0x0000023F7E772000-memory.dmpFilesize
712KB
-
memory/7176-5759-0x0000023F7DF10000-0x0000023F7DF3A000-memory.dmpFilesize
168KB
-
memory/7176-5871-0x0000023F7FA20000-0x0000023F7FA52000-memory.dmpFilesize
200KB
-
memory/7176-5673-0x0000023F7D6D0000-0x0000023F7D6F8000-memory.dmpFilesize
160KB
-
memory/7176-5762-0x0000023F7FF60000-0x0000023F80504000-memory.dmpFilesize
5.6MB
-
memory/7176-5875-0x0000023F7FA60000-0x0000023F7FA8C000-memory.dmpFilesize
176KB
-
memory/7176-5876-0x0000023F7FB00000-0x0000023F7FB68000-memory.dmpFilesize
416KB
-
memory/7176-5877-0x0000023F7FEB0000-0x0000023F7FF30000-memory.dmpFilesize
512KB
-
memory/7176-5878-0x0000023F80510000-0x0000023F80586000-memory.dmpFilesize
472KB
-
memory/7176-6039-0x0000023F80600000-0x0000023F80628000-memory.dmpFilesize
160KB
-
memory/7176-5941-0x0000023F805D0000-0x0000023F805F8000-memory.dmpFilesize
160KB
-
memory/7176-5938-0x0000023F80630000-0x0000023F80684000-memory.dmpFilesize
336KB
-
memory/7176-5927-0x0000023F808D0000-0x0000023F809D0000-memory.dmpFilesize
1024KB
-
memory/7176-5903-0x0000023F7FF30000-0x0000023F7FF5A000-memory.dmpFilesize
168KB
-
memory/7176-5892-0x0000023F80750000-0x0000023F808C6000-memory.dmpFilesize
1.5MB
-
memory/7176-5891-0x0000023F7FAC0000-0x0000023F7FAEC000-memory.dmpFilesize
176KB
-
memory/7176-5884-0x0000023F80590000-0x0000023F805C4000-memory.dmpFilesize
208KB
-
memory/7176-5883-0x0000023F7FA90000-0x0000023F7FABA000-memory.dmpFilesize
168KB
-
memory/7176-5882-0x0000023F7FBC0000-0x0000023F7FC14000-memory.dmpFilesize
336KB
-
memory/8116-5677-0x000001D2AD140000-0x000001D2AD16A000-memory.dmpFilesize
168KB
-
memory/8116-5674-0x000001D2C77C0000-0x000001D2C7980000-memory.dmpFilesize
1.8MB
-
memory/8116-5672-0x000001D2AD140000-0x000001D2AD16A000-memory.dmpFilesize
168KB
-
memory/8128-5767-0x000001CDC9E20000-0x000001CDC9E2A000-memory.dmpFilesize
40KB
-
memory/8128-5765-0x000001CDC98D0000-0x000001CDC98DA000-memory.dmpFilesize
40KB
-
memory/8128-5764-0x000001CDC98F0000-0x000001CDC9906000-memory.dmpFilesize
88KB
-
memory/8128-5763-0x000001CDC9830000-0x000001CDC988E000-memory.dmpFilesize
376KB
-
memory/8128-5760-0x000001CDC9AC0000-0x000001CDC9DB0000-memory.dmpFilesize
2.9MB
-
memory/8128-5711-0x000001CDC95D0000-0x000001CDC9682000-memory.dmpFilesize
712KB
-
memory/8128-5708-0x000001CDB0AF0000-0x000001CDB0B1E000-memory.dmpFilesize
184KB
-
memory/8128-5766-0x000001CDC9E10000-0x000001CDC9E18000-memory.dmpFilesize
32KB