Resubmissions

25-06-2021 19:57

210625-fegc29cpbn 10

20-06-2021 14:16

210620-nvtv6r37hn 10

Analysis

  • max time kernel
    111s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    20-06-2021 14:16

General

  • Target

    pdf-xchange_viewer_XV-78H1.exe

  • Size

    2.3MB

  • MD5

    642fa01134fc21a4faa5595d45e3f554

  • SHA1

    53bc8673fcbb4c2e748684c2462d3f01483d8dfe

  • SHA256

    a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6

  • SHA512

    c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 64 IoCs
  • Executes dropped EXE 24 IoCs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 27 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 18 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 21 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe
    "C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\is-2STQ3.tmp\pdf-xchange_viewer_XV-78H1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2STQ3.tmp\pdf-xchange_viewer_XV-78H1.tmp" /SL5="$30158,1569491,780800,C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod0_extract\saBSI.exe
        "C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1380
      • C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe
        "C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe" /silent /ws
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
          "C:\Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe" /silent /ws /cookie:mmm_irs_ppi_902_451_o /ga_clientid:c4a348a4-08ff-439b-9d8d-c56337502118 /edat_dir:C:\Windows\Temp\asw.b06bd70b72a79144
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Windows\Temp\asw.a634ac994af8f7cf\instup.exe
            "C:\Windows\Temp\asw.a634ac994af8f7cf\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.a634ac994af8f7cf /edition:15 /prod:ais /guid:35255322-5f79-4bd9-9956-38a1f949017e /ga_clientid:c4a348a4-08ff-439b-9d8d-c56337502118 /silent /ws /cookie:mmm_irs_ppi_902_451_o /ga_clientid:c4a348a4-08ff-439b-9d8d-c56337502118 /edat_dir:C:\Windows\Temp\asw.b06bd70b72a79144
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks for any installed AV software in registry
            • Writes to the Master Boot Record (MBR)
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\instup.exe
              "C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.a634ac994af8f7cf /edition:15 /prod:ais /guid:35255322-5f79-4bd9-9956-38a1f949017e /ga_clientid:c4a348a4-08ff-439b-9d8d-c56337502118 /silent /ws /cookie:mmm_irs_ppi_902_451_o /edat_dir:C:\Windows\Temp\asw.b06bd70b72a79144 /online_installer
              6⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Checks processor information in registry
              • Enumerates system info in registry
              • Modifies registry class
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1812
              • C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\sbr.exe
                "C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\sbr.exe" 1812 "AVG Antivirus setup" "AVG Antivirus is being installed. Do not shut down your computer!"
                7⤵
                • Executes dropped EXE
                PID:800
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRdr2.cat
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:2428
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgHwid.cat
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:2460
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgVmm.cat
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                PID:2492
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRvrt.cat
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                PID:2524
              • C:\Program Files\AVG\Antivirus\AvEmUpdate.exe
                "C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer /reg
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Checks processor information in registry
                PID:2560
              • C:\Program Files\AVG\Antivirus\AvEmUpdate.exe
                "C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer1
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Drops file in Program Files directory
                • Checks processor information in registry
                • Suspicious use of WriteProcessMemory
                PID:2592
                • C:\Program Files\AVG\Antivirus\avBugReport.exe
                  "C:\Program Files\AVG\Antivirus\avBugReport.exe" --send "dumps|report" --silent --path "C:\ProgramData\AVG\Antivirus" --guid 35255322-5f79-4bd9-9956-38a1f949017e
                  8⤵
                  • Executes dropped EXE
                  • Checks for any installed AV software in registry
                  • Writes to the Master Boot Record (MBR)
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2652
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /netservice:avgNetNd6 /catalog:avgNetNd6.cat
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                PID:2684
              • C:\Program Files\AVG\Antivirus\SetupInf.exe
                "C:\Program Files\AVG\Antivirus\SetupInf.exe" /install /netservice:avgNetNd6 /catalog:avgNetNd6.cat "C:\Program Files\AVG\Antivirus\setup\Inf\avgNetNd6.inf"
                7⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Checks processor information in registry
                • Modifies system certificate store
                PID:2740
              • C:\Program Files\AVG\Antivirus\x86\RegSvr.exe
                "C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\aswAMSI.dll"
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies Internet Explorer settings
                PID:2216
              • C:\Program Files\AVG\Antivirus\RegSvr.exe
                "C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\aswAMSI.dll"
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies Internet Explorer settings
                • Modifies registry class
                PID:2000
              • C:\Program Files\AVG\Antivirus\x86\RegSvr.exe
                "C:\Program Files\AVG\Antivirus\x86\RegSvr.exe" "C:\Program Files\AVG\Antivirus\x86\asOutExt.dll"
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies registry class
                PID:2260
              • C:\Program Files\AVG\Antivirus\RegSvr.exe
                "C:\Program Files\AVG\Antivirus\RegSvr.exe" "C:\Program Files\AVG\Antivirus\asOutExt.dll"
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies registry class
                PID:1540
              • C:\Program Files\Common Files\AVG\Overseer\overseer.exe
                "C:\Program Files\Common Files\AVG\Overseer\overseer.exe" /skip_uptime /skip_remediations
                7⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                PID:2196
              • C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe
                "C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe" /prepare_definitions_folder
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Drops file in Program Files directory
                • Checks processor information in registry
                PID:2116
              • C:\Program Files\AVG\Antivirus\wsc_proxy.exe
                "C:\Program Files\AVG\Antivirus\wsc_proxy.exe" /svc /register /ppl_svc
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                PID:1836
              • C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe
                "C:\Program Files\AVG\Antivirus\defs\21061905\engsup.exe" /avg /get_latest_ga_client_id /get_latest_landingpageid_cookie /get_latest_pagedownloadid_cookie
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Checks processor information in registry
                PID:2148
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://pdf-xchange_viewer.fi.downloadastro.com/thank_you/?utm_source=ira&utm_medium=offer&utm_campaign=pdf-xchange_viewer
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1800
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5e6ef628-3e63-1167-2ab3-bb58bf8d2959}\avgNetNd6.inf" "9" "6fa1d8cff" "000000000000057C" "WinSta0\Default" "00000000000003D4" "208" "C:\Program Files\AVG\Antivirus\setup\Inf"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:2812
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2848
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000005DC" "00000000000005D8"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:3048

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    3
    T1060

    Bootkit

    1
    T1067

    Defense Evasion

    Modify Registry

    4
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Security Software Discovery

    1
    T1063

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
      MD5

      6912d21cd7a22e4979c22330baedcac7

      SHA1

      c7035e25c5c31857c490f589f912dc0b616a4065

      SHA256

      c3d1bd9af6f15827fa4464afddbd631e3ddc60b7fb616e41facda3ba15474299

      SHA512

      699e837873a9a5a33135838b691ee676d018849ead59820a2a1f6a10a8eefee52bee3b6294297cf9d766a3d82e5acc9a27d35c60982a7d372d37e88b9a501796

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
      MD5

      0ea4c23ef58f0c6e5573971029f02757

      SHA1

      d11dee4d61fa69106813f540076b1e5b80485f2e

      SHA256

      b60db687488dafcbac137378873b96ba67848f12ee25629570111dc127567cd6

      SHA512

      8942f3db34f1b1d6f347031d59028d3e28c2192e955c71658726bfb23334c81ed6c6ce2bfe9cc72b70af3aec554214ddcef1744fac1009ea44b3613c4420ff82

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
      MD5

      b04c9a925487222d1403c5fe342f2637

      SHA1

      91d25cf537231cf4789befa328d7c3febb5a4c52

      SHA256

      0349ce783353d8a62bea48276384e7b7b221744e7e71df61e66df3da6cb78981

      SHA512

      94236a4e6b701323f6d3e941924699dc1ef3819b20547522f57fb6362f8acc26a3a118cf7be759df9fecbb1114ea1f2ddbd8dc65435b5f911a6cba5aab92b8f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      6045baccf49e1eba0e674945311a06e6

      SHA1

      379c6234849eecede26fad192c2ee59e0f0221cb

      SHA256

      65830a65cb913bee83258e4ac3e140faf131e7eb084d39f7020c7acc825b0a58

      SHA512

      da32af6a730884e73956e4eb6bff61a1326b3ef8ba0a213b5b4aad6de4fbd471b3550b6ac2110f1d0b2091e33c70d44e498f897376f8e1998b1d2afac789abeb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      4384bf1e67a0c0954ed8309757e59f44

      SHA1

      073e8c1d11044d81e27bad95696d79abfd2c2a71

      SHA256

      963ed737c27eb788093eda79f42cd82a7d419e9631f110dac139946264993f9c

      SHA512

      530a07e48e4e13d3bbc9f5008d349004404bf762b0ac0e23115b121ca5a63b355ac02e017222c6cba1f57522e4772a2ac38a718ff813ea0eea22aa782a01cf08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      3a7fbfdd441bdcf53918b2e6cd4f8ed0

      SHA1

      ae4f71552e3bb50b57f3fdf49b1624660c54f0f7

      SHA256

      08a0f61b0761f6d3c9f41ca05d0f82fde8d1c38200808d87cf6994d7d39fbc98

      SHA512

      88716cb1d0657d98c593140e56c826c6b6e136846bcf4895e857dad12147910aff97b389bc3fe4db6e72bffc0aa3e53835e8dcaa0a01dde335e13ccb41ce1277

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      976ec5716815228405a0006dc0959a3f

      SHA1

      b4e59df6b016b56e4e6315066510876b0d8c876d

      SHA256

      4626b46804e34eb1cb837e64d2fdc006e6c41870bdd5fcb4934582df0fb30cad

      SHA512

      1a33b9b8e774596bc40cb5a6a1f820398877ce98e3d36aa2514444b57f25f81a4bdc4b2708810516f639cc90e1eaa8a6c4a64816eefa6c821ea8df252b8aebb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      2640caf37ee1a8e0109ace7686ec515d

      SHA1

      2ad9805c7918373a6e475a309a16781f6b09849d

      SHA256

      f665e724f1ddc5eeca1981390d021843aad1450da08133b0e754326fac2c4db0

      SHA512

      cb8424a83e57cf3cc8696f5ceec8e0ada3b85ced3c5bbe430dd0ab89bec8e27f376ebbca6124cc44357c37bdf006d16b167d1eba60373d5c059a88f54ffcdc0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      41c172f13fc83d08615a5ae41b1ce9d2

      SHA1

      f7bcb5d854be8e9bd8fc132d9feb4e416ae86fef

      SHA256

      d78de6ddfc638f4f309ba4a247c9cfae72e161165be35c597b08baf689eca5eb

      SHA512

      117d6b3236537de09533768a29e5decdaa6d2c648a23cbf29060d26df01e1726dd0e337f07f6b8feed1fac0e9b2438b95ca2226828d262ff852edb316aa24862

    • C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod0_extract\saBSI.exe
      MD5

      211f842d6081bba42c3e7fdd372e0986

      SHA1

      fa96b4b66bf3f37b3bf6ba322213003dc0198d9e

      SHA256

      d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5

      SHA512

      bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0

    • C:\Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe
      MD5

      89f08d976e1223fd70a7221199a5a40d

      SHA1

      99fdfab6c5aa66430db42cc0ff4a19c3e2fb0561

      SHA256

      ec9a2ab7e550fea665e501cf07aa9ddcb553b68dbfc1b53439a988d87254d891

      SHA512

      706ab34716089c428b6573d7f71463b0e5ab3862e7717c79f206ab9510ac5f09e10c18f8640962ddd72658fae840feda65478487b49ba6edef5958f545986403

    • C:\Users\Admin\AppData\Local\Temp\is-2STQ3.tmp\pdf-xchange_viewer_XV-78H1.tmp
      MD5

      47fe613751fef2c83fda48877d90300f

      SHA1

      d950ebcbf8621baef45f21198ccc72c59a524e53

      SHA256

      e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1

      SHA512

      c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92

    • C:\Windows\Temp\asw.a634ac994af8f7cf\Instup.dll
      MD5

      216bb4e2fc1d507b9b46ce21f2efee53

      SHA1

      48e278d32b66645e3a37e1cb081dc03939e47ef1

      SHA256

      69ba641702643e6943931b3db606084192b721783b3b28bd5a1667de408a36e2

      SHA512

      c935c988e9f089dbf790798bd80359e4b2ed63faa51247b9c10e24eecb71fd145a5e6f71d3cb42c5438408f97ec4ba15d1ed9828ded712675afc189d044877ea

    • C:\Windows\Temp\asw.a634ac994af8f7cf\Instup.exe
      MD5

      ab23eb9907d31e5e2392783cae33ceb8

      SHA1

      3942e6e3600bbdff4e9967500fb97fb53bee8450

      SHA256

      58c7cddc279c22c4b1368e3664d857e553c8089d13ba4dfaa436d98b1ba3ef3a

      SHA512

      109ad00eef48e7849b72bc0675a9e814db51d8c4a6121a2d31daadd71fd3823f7e85cfbf485dea6bf9604028b9440dd76280174af007af6ffb326459fd4b646b

    • C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\Instup.dll
      MD5

      917a284494cbe4a4ec85e1ec768339c9

      SHA1

      47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

      SHA256

      57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

      SHA512

      90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

    • C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\instup.exe
      MD5

      c545527e69a46359a4a45f58794a0fe5

      SHA1

      e233e5837bfe5d1429300fb33f12f5b54689781b

      SHA256

      8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

      SHA512

      754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

    • C:\Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\sbr.exe
      MD5

      e38cc92cd980a55d811316ac62883e14

      SHA1

      fa83737abe11ee825c3da6843cc4d8e3b459729a

      SHA256

      be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

      SHA512

      1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

    • C:\Windows\Temp\asw.a634ac994af8f7cf\avbugreport_x64_ais-c62.vpx
      MD5

      bbb61ad0f20d3fe17a5227c13f09e82d

      SHA1

      01700413fc5470aa0ba29aa1a962d7a719a92a82

      SHA256

      39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

      SHA512

      c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

    • C:\Windows\Temp\asw.a634ac994af8f7cf\avdump_x64_ais-c62.vpx
      MD5

      43dc9e69f1e9db4059cf49a5e825cfda

      SHA1

      519298f8a681b41d2d70db2670cc7543f1ee6da4

      SHA256

      98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

      SHA512

      d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

    • C:\Windows\Temp\asw.a634ac994af8f7cf\avdump_x86_ais-c62.vpx
      MD5

      f75d663065c0ccd7e63bf2accdafed7a

      SHA1

      daa2d2415cb3d0f27fb4591889d01583c45e5ffd

      SHA256

      0d25e74cf179f4fa2febb01cb647b6ca0e6fa3c6499ed7eee3f1557775e1b6c8

      SHA512

      783a35d57236ec1b5f4d730cf15f201a26356953eeec848beb5125351f3976908495ab6128117f4dae72986480675f880e9268b7ff72b00a1bdcd78042c2ad90

    • C:\Windows\Temp\asw.a634ac994af8f7cf\config.def
      MD5

      e1ea1719f8f2e29069cf083c7117ddc0

      SHA1

      1805968ccf8beddaad362e1294b46c4fe09522c6

      SHA256

      768dd530090ece9403c03b8a94e94be3edc4080f10b5999b06d78a7c3b286943

      SHA512

      cc82bfbf295cf293bd74a2d2ad75c6af6faeabe241d9a2a1900baa011ca55f0dc2e11279cc8e48e67a460bd86d42eec1fcdddbbbf7bfaa80bd823132a877a0ee

    • C:\Windows\Temp\asw.a634ac994af8f7cf\config.def
      MD5

      7b51b9fed26ce3d69132fe07af438061

      SHA1

      5aec334b8502a9851bdcd7c5a0a8279de3aaeace

      SHA256

      8c8ee1f4ba33bd60b51b4743c494d20b96409e9bfe9fd91694ee7ab545e27e2a

      SHA512

      51699db8507177d36804b2c2b4ac3356f19b80f29b5914750a1517bf45ae7a694a5fc5d59bfa8f0c8c78304b052278116316ca22e286340a4d018392524cbde8

    • C:\Windows\Temp\asw.a634ac994af8f7cf\config.ini
      MD5

      6192ab52dfab5de5ae1c3c7040377b61

      SHA1

      e0ad96cb9138bc310ed40c0c3d420199593deab3

      SHA256

      00b365c5e23ff29929561200d1a986a99b9c05fdc683b352699d6fb3ff57d582

      SHA512

      0f234a026d4e91b7b6028c23ae382631164947567187f740b8c716476d78b2434de4deb165ad13e2954cf2dec42b78c1388d96c081dfd5a26f44db7e1d60bd89

    • C:\Windows\Temp\asw.a634ac994af8f7cf\instcont_x64_ais-c62.vpx
      MD5

      c545527e69a46359a4a45f58794a0fe5

      SHA1

      e233e5837bfe5d1429300fb33f12f5b54689781b

      SHA256

      8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

      SHA512

      754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

    • C:\Windows\Temp\asw.a634ac994af8f7cf\part-setup_ais-15020c62.vpx
      MD5

      d5b798d8816b252e7d718195dfeb8a8c

      SHA1

      860c5807fd491aeeb12d661d8cf2ecca4ca1639b

      SHA256

      75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

      SHA512

      16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

    • C:\Windows\Temp\asw.a634ac994af8f7cf\prod-pgm.vpx
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Windows\Temp\asw.a634ac994af8f7cf\prod-pgm.vpx
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Windows\Temp\asw.a634ac994af8f7cf\prod-vps.vpx
      MD5

      0c35f70c22274a9e931475faa204fb60

      SHA1

      afb8025afec61f4c3efb0fba4c9b8a1963d9404c

      SHA256

      cedcfac00b6ac84d4781fc97b9aec0c79a772ee0783b277766c1fca485dd0843

      SHA512

      da5f2863e57d510898f5f125d957eee8b760937d2dfb1af74522737c5489c3a90ae925933f15af418df7776d6bacd2596b2bfc19c68ed57822170641ba6a722b

    • C:\Windows\Temp\asw.a634ac994af8f7cf\servers.def
      MD5

      0175a33cf53ca37657134fe439235d06

      SHA1

      24e7a9a7732b43e311b7f9dbfa69f625127e2457

      SHA256

      4477b78f7de173fed513cabf775a1d55ae4525db0dda01ea93fe6eec2c8ec5b2

      SHA512

      a54602725d77e2e6f76115355a96265ee433cf5cf52e53021c1f90db477661258c3ac7c022d018b96718a8229d5664ef4e44f8cda2b6b99d4bebc3bad17657d1

    • C:\Windows\Temp\asw.a634ac994af8f7cf\servers.def
      MD5

      0175a33cf53ca37657134fe439235d06

      SHA1

      24e7a9a7732b43e311b7f9dbfa69f625127e2457

      SHA256

      4477b78f7de173fed513cabf775a1d55ae4525db0dda01ea93fe6eec2c8ec5b2

      SHA512

      a54602725d77e2e6f76115355a96265ee433cf5cf52e53021c1f90db477661258c3ac7c022d018b96718a8229d5664ef4e44f8cda2b6b99d4bebc3bad17657d1

    • C:\Windows\Temp\asw.a634ac994af8f7cf\servers.def.vpx
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Windows\Temp\asw.a634ac994af8f7cf\setup.def
      MD5

      3fc9d055795a4c01893e5661f300c513

      SHA1

      29c64165afecea436a2dcb57dd5b54163a002df4

      SHA256

      425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0

      SHA512

      e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902

    • C:\Windows\Temp\asw.a634ac994af8f7cf\uat64.vpx
      MD5

      93055fa12dd18f79c481b860842949de

      SHA1

      733fbc9091da1acb7bf8073c86b87b77f56ac3a1

      SHA256

      28e190b2ef135ef3be2439d41e857f23dc564759c1e70a661579d2b9db39d5a9

      SHA512

      60d44d403c8dba99d060a934f6edc50a8ed810debd637ac1e21955bcf0018583a651cd340359b0156ad62498a34fc971724e2ceec385516feec66aef8965dc20

    • C:\Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • C:\Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • C:\Windows\Temp\asw.b06bd70b72a79144\ecoo.edat
      MD5

      3f44a3c655ac2a5c3ab32849ecb95672

      SHA1

      93211445dcf90bb3200abe3902c2a10fe2baa8e4

      SHA256

      51516a61a1e25124173def4ef68a6b8babedc28ca143f9eee3e729ebdc1ef31f

      SHA512

      d3f95262cf3e910dd707dfeef8d2e9db44db76b2a13092d238d0145c822d87a529ca58ccbb24995dfcf6dad1ffc8ced6d50948bb550760cd03049598c6943bc0

    • \Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\botva2.dll
      MD5

      67965a5957a61867d661f05ae1f4773e

      SHA1

      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

      SHA256

      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

      SHA512

      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

    • \Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod0_extract\saBSI.exe
      MD5

      211f842d6081bba42c3e7fdd372e0986

      SHA1

      fa96b4b66bf3f37b3bf6ba322213003dc0198d9e

      SHA256

      d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5

      SHA512

      bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0

    • \Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod0_extract\saBSI.exe
      MD5

      211f842d6081bba42c3e7fdd372e0986

      SHA1

      fa96b4b66bf3f37b3bf6ba322213003dc0198d9e

      SHA256

      d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5

      SHA512

      bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0

    • \Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\prod1_extract\cookie_mmm_irs_ppi_902_451_o.exe
      MD5

      89f08d976e1223fd70a7221199a5a40d

      SHA1

      99fdfab6c5aa66430db42cc0ff4a19c3e2fb0561

      SHA256

      ec9a2ab7e550fea665e501cf07aa9ddcb553b68dbfc1b53439a988d87254d891

      SHA512

      706ab34716089c428b6573d7f71463b0e5ab3862e7717c79f206ab9510ac5f09e10c18f8640962ddd72658fae840feda65478487b49ba6edef5958f545986403

    • \Users\Admin\AppData\Local\Temp\is-0PNCK.tmp\zbShieldUtils.dll
      MD5

      8b03d5f13240d4395654ac0074a95728

      SHA1

      89d0f5039379fdda7719fa8b5ab3a46a92e3a064

      SHA256

      f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6

      SHA512

      bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3

    • \Users\Admin\AppData\Local\Temp\is-2STQ3.tmp\pdf-xchange_viewer_XV-78H1.tmp
      MD5

      47fe613751fef2c83fda48877d90300f

      SHA1

      d950ebcbf8621baef45f21198ccc72c59a524e53

      SHA256

      e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1

      SHA512

      c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92

    • \Windows\Temp\asw.a634ac994af8f7cf\Instup.dll
      MD5

      216bb4e2fc1d507b9b46ce21f2efee53

      SHA1

      48e278d32b66645e3a37e1cb081dc03939e47ef1

      SHA256

      69ba641702643e6943931b3db606084192b721783b3b28bd5a1667de408a36e2

      SHA512

      c935c988e9f089dbf790798bd80359e4b2ed63faa51247b9c10e24eecb71fd145a5e6f71d3cb42c5438408f97ec4ba15d1ed9828ded712675afc189d044877ea

    • \Windows\Temp\asw.a634ac994af8f7cf\Instup.exe
      MD5

      ab23eb9907d31e5e2392783cae33ceb8

      SHA1

      3942e6e3600bbdff4e9967500fb97fb53bee8450

      SHA256

      58c7cddc279c22c4b1368e3664d857e553c8089d13ba4dfaa436d98b1ba3ef3a

      SHA512

      109ad00eef48e7849b72bc0675a9e814db51d8c4a6121a2d31daadd71fd3823f7e85cfbf485dea6bf9604028b9440dd76280174af007af6ffb326459fd4b646b

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw32e4e667f5fd9dc1.tmp
      MD5

      c545527e69a46359a4a45f58794a0fe5

      SHA1

      e233e5837bfe5d1429300fb33f12f5b54689781b

      SHA256

      8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

      SHA512

      754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw32e4e667f5fd9dc1.tmp
      MD5

      c545527e69a46359a4a45f58794a0fe5

      SHA1

      e233e5837bfe5d1429300fb33f12f5b54689781b

      SHA256

      8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

      SHA512

      754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw503bf3a223b5bf81.tmp
      MD5

      917a284494cbe4a4ec85e1ec768339c9

      SHA1

      47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

      SHA256

      57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

      SHA512

      90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw503bf3a223b5bf81.tmp
      MD5

      917a284494cbe4a4ec85e1ec768339c9

      SHA1

      47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

      SHA256

      57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

      SHA512

      90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw72037f6c788b10e3.tmp
      MD5

      43dc9e69f1e9db4059cf49a5e825cfda

      SHA1

      519298f8a681b41d2d70db2670cc7543f1ee6da4

      SHA256

      98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

      SHA512

      d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\asw72037f6c788b10e3.tmp
      MD5

      43dc9e69f1e9db4059cf49a5e825cfda

      SHA1

      519298f8a681b41d2d70db2670cc7543f1ee6da4

      SHA256

      98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

      SHA512

      d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswa7c6d4c78796ab2c.tmp
      MD5

      e38cc92cd980a55d811316ac62883e14

      SHA1

      fa83737abe11ee825c3da6843cc4d8e3b459729a

      SHA256

      be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

      SHA512

      1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswa7c6d4c78796ab2c.tmp
      MD5

      e38cc92cd980a55d811316ac62883e14

      SHA1

      fa83737abe11ee825c3da6843cc4d8e3b459729a

      SHA256

      be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

      SHA512

      1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswbf2a9e2eac18cedf.tmp
      MD5

      bbb61ad0f20d3fe17a5227c13f09e82d

      SHA1

      01700413fc5470aa0ba29aa1a962d7a719a92a82

      SHA256

      39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

      SHA512

      c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswbf2a9e2eac18cedf.tmp
      MD5

      bbb61ad0f20d3fe17a5227c13f09e82d

      SHA1

      01700413fc5470aa0ba29aa1a962d7a719a92a82

      SHA256

      39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

      SHA512

      c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswe84017ce597aabc5.tmp
      MD5

      0b830444a6ef848fb85bfbb173bb6076

      SHA1

      27964cc1673ddb68ca3da8018f0e13e9a141605e

      SHA256

      63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

      SHA512

      31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

    • \Windows\Temp\asw.a634ac994af8f7cf\New_15020c62\aswe84017ce597aabc5.tmp
      MD5

      0b830444a6ef848fb85bfbb173bb6076

      SHA1

      27964cc1673ddb68ca3da8018f0e13e9a141605e

      SHA256

      63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

      SHA512

      31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

    • \Windows\Temp\asw.a634ac994af8f7cf\uat_1812.dll
      MD5

      b79713c07c4dfe9054a53d29bda1dcd9

      SHA1

      c6d37b94b9482aadc2aff1647443d33c6016f82a

      SHA256

      1419e3c1aa1e519572e88a2c3bb42320c3c07e8011ff51de2ed5677373b88d5a

      SHA512

      3569f00fafafb4206ae0437f86b6fba3d0f80cba446499dac1fc37b2b5a5e91e19a5c454cd61c38fd09b9ec3c597572fdac728584941e305dfa4f87a305af774

    • \Windows\Temp\asw.a634ac994af8f7cf\uat_752.dll
      MD5

      b79713c07c4dfe9054a53d29bda1dcd9

      SHA1

      c6d37b94b9482aadc2aff1647443d33c6016f82a

      SHA256

      1419e3c1aa1e519572e88a2c3bb42320c3c07e8011ff51de2ed5677373b88d5a

      SHA512

      3569f00fafafb4206ae0437f86b6fba3d0f80cba446499dac1fc37b2b5a5e91e19a5c454cd61c38fd09b9ec3c597572fdac728584941e305dfa4f87a305af774

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • \Windows\Temp\asw.b06bd70b72a79144\avg_antivirus_free_setup_x64.exe
      MD5

      0785826db7d016ac70a1fafb1535eb2f

      SHA1

      49d29d46e91312cb74954481994d934541bf1865

      SHA256

      f28e432109161b813db924047944e5cab9425f9039ed366575764645195b20d6

      SHA512

      867ad7e5d6497c7646bc547faa22392f9f7923aa51629d94749ce1486c6acd2368f92f92996c68b506cb9f7878582191fd34918fd250ed59719ed27608e15754

    • memory/524-64-0x0000000000000000-mapping.dmp
    • memory/524-67-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/752-96-0x000007FEFC1D1000-0x000007FEFC1D3000-memory.dmp
      Filesize

      8KB

    • memory/752-92-0x0000000000000000-mapping.dmp
    • memory/800-133-0x0000000000000000-mapping.dmp
    • memory/1380-73-0x0000000000000000-mapping.dmp
    • memory/1540-157-0x0000000000000000-mapping.dmp
    • memory/1620-83-0x0000000000000000-mapping.dmp
    • memory/1672-135-0x0000000000000000-mapping.dmp
    • memory/1736-77-0x0000000000000000-mapping.dmp
    • memory/1800-136-0x0000000000000000-mapping.dmp
    • memory/1812-120-0x0000000000000000-mapping.dmp
    • memory/1836-160-0x0000000000000000-mapping.dmp
    • memory/1972-61-0x0000000000400000-0x00000000004CC000-memory.dmp
      Filesize

      816KB

    • memory/1972-60-0x0000000075DA1000-0x0000000075DA3000-memory.dmp
      Filesize

      8KB

    • memory/2000-154-0x0000000000000000-mapping.dmp
    • memory/2116-159-0x0000000000000000-mapping.dmp
    • memory/2148-161-0x0000000000000000-mapping.dmp
    • memory/2196-158-0x0000000000000000-mapping.dmp
    • memory/2216-152-0x0000000000000000-mapping.dmp
    • memory/2260-155-0x0000000000000000-mapping.dmp
    • memory/2428-143-0x0000000000000000-mapping.dmp
    • memory/2460-144-0x0000000000000000-mapping.dmp
    • memory/2492-145-0x0000000000000000-mapping.dmp
    • memory/2524-146-0x0000000000000000-mapping.dmp
    • memory/2560-147-0x0000000000000000-mapping.dmp
    • memory/2592-148-0x0000000000000000-mapping.dmp
    • memory/2652-149-0x0000000000000000-mapping.dmp
    • memory/2684-150-0x0000000000000000-mapping.dmp
    • memory/2740-151-0x0000000000000000-mapping.dmp