Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-07-2021 11:02

General

  • Target

    Users/Administrator/AppData/Local/Google/Chrome/User Data/Default/Cache/f_0000c5.exe

  • Size

    3.6MB

  • MD5

    aa48774579e4468e629e344cbb4a5a12

  • SHA1

    9397efdbc42d509f5f4c51903f125530b81f5fc6

  • SHA256

    033d58611b17fe96939b2092f1d486341206d547545d4bc0bf12c2097436ccdd

  • SHA512

    ba52d727efee5b3da0fc221fca92cda92790e013f222d4a32edc98cb4ddd508822966bde9a65f10834105c29cfcd94363ccb48e840c8c8b7db99678ac1186c92

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 64 IoCs
  • Executes dropped EXE 28 IoCs
  • Sets service image path in registry 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 18 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 47 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 47 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Cache\f_0000c5.exe
    "C:\Users\Admin\AppData\Local\Temp\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Cache\f_0000c5.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\DriverHub\DriverHub.exe
      "C:\Users\Admin\AppData\Local\Temp\DriverHub\DriverHub.exe" --silent "C:\Program Files (x86)\DriverHub" -5
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1064
    • C:\Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe
      "C:\Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe" /q /norestart
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\Temp\{4C9E7384-0367-4617-A52A-417A25C8656A}\.cr\highdpimfcx86.exe
        "C:\Windows\Temp\{4C9E7384-0367-4617-A52A-417A25C8656A}\.cr\highdpimfcx86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188 /q /norestart
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.be\VC_redist.x86.exe
          "C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{A7B1226E-8815-42E4-9F62-916E95E23F95} {D7305F1A-3788-40AF-9FC4-19BDA0476E77} 936
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
    • C:\Users\Admin\AppData\Local\Temp\DriverHub\Avast-downloader.exe
      "C:\Users\Admin\AppData\Local\Temp\DriverHub\Avast-downloader.exe" /silent /WS
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
        "C:\Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe" /silent /WS /cookie:mmm_rsp_ppi_003_462_a /ga_clientid:7cd7213b-2423-40c1-88bd-920ce8adc76f /edat_dir:C:\Windows\Temp\asw.bb9fbc7ad7f6b974
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Windows\Temp\asw.f6489e41c331df00\instup.exe
          "C:\Windows\Temp\asw.f6489e41c331df00\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.f6489e41c331df00 /edition:1 /prod:ais /guid:820dff35-791a-4ea1-8fe7-b4d23bf328a2 /ga_clientid:7cd7213b-2423-40c1-88bd-920ce8adc76f /silent /WS /cookie:mmm_rsp_ppi_003_462_a /ga_clientid:7cd7213b-2423-40c1-88bd-920ce8adc76f /edat_dir:C:\Windows\Temp\asw.bb9fbc7ad7f6b974
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Windows\Temp\asw.f6489e41c331df00\New_15020997\instup.exe
            "C:\Windows\Temp\asw.f6489e41c331df00\New_15020997\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.f6489e41c331df00 /edition:1 /prod:ais /guid:820dff35-791a-4ea1-8fe7-b4d23bf328a2 /ga_clientid:7cd7213b-2423-40c1-88bd-920ce8adc76f /silent /WS /cookie:mmm_rsp_ppi_003_462_a /edat_dir:C:\Windows\Temp\asw.bb9fbc7ad7f6b974 /online_installer
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks for any installed AV software in registry
            • Writes to the Master Boot Record (MBR)
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies registry class
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2228
            • C:\Windows\Temp\asw.f6489e41c331df00\New_15020997\sbr.exe
              "C:\Windows\Temp\asw.f6489e41c331df00\New_15020997\sbr.exe" 2228 "Avast Antivirus setup" "Avast Antivirus is being installed. Do not shut down your computer!"
              6⤵
              • Executes dropped EXE
              PID:2416
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswRdr2.cat
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:2792
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswHwid.cat
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:2824
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswVmm.cat
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:2856
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /catalog:aswRvrt.cat
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:2888
            • C:\Program Files\Avast Software\Avast\AvEmUpdate.exe
              "C:\Program Files\Avast Software\Avast\AvEmUpdate.exe" /installer /reg
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Checks processor information in registry
              PID:2920
            • C:\Program Files\Avast Software\Avast\AvEmUpdate.exe
              "C:\Program Files\Avast Software\Avast\AvEmUpdate.exe" /installer1
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Drops file in Program Files directory
              • Checks processor information in registry
              PID:2952
              • C:\Program Files\Avast Software\Avast\avBugReport.exe
                "C:\Program Files\Avast Software\Avast\avBugReport.exe" --send "dumps|report" --silent --path "C:\ProgramData\Avast Software\Avast" --guid 820dff35-791a-4ea1-8fe7-b4d23bf328a2
                7⤵
                • Executes dropped EXE
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:3004
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /uninstall /netservice:aswNetNd6 /catalog:aswNetNd6.cat
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:3036
            • C:\Program Files\Avast Software\Avast\SetupInf.exe
              "C:\Program Files\Avast Software\Avast\SetupInf.exe" /install /netservice:aswNetNd6 /catalog:aswNetNd6.cat "C:\Program Files\Avast Software\Avast\setup\Inf\aswNetNd6.inf"
              6⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks processor information in registry
              • Modifies system certificate store
              PID:2068
            • C:\Program Files\Avast Software\Avast\x86\RegSvr.exe
              "C:\Program Files\Avast Software\Avast\x86\RegSvr.exe" "C:\Program Files\Avast Software\Avast\x86\aswAMSI.dll"
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              • Modifies Internet Explorer settings
              PID:2244
            • C:\Program Files\Avast Software\Avast\RegSvr.exe
              "C:\Program Files\Avast Software\Avast\RegSvr.exe" "C:\Program Files\Avast Software\Avast\aswAMSI.dll"
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              • Modifies Internet Explorer settings
              PID:300
            • C:\Program Files\Avast Software\Avast\x86\RegSvr.exe
              "C:\Program Files\Avast Software\Avast\x86\RegSvr.exe" "C:\Program Files\Avast Software\Avast\x86\asOutExt.dll"
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              • Modifies registry class
              PID:2316
            • C:\Program Files\Avast Software\Avast\RegSvr.exe
              "C:\Program Files\Avast Software\Avast\RegSvr.exe" "C:\Program Files\Avast Software\Avast\asOutExt.dll"
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:2444
            • C:\Program Files\Avast Software\Avast\AvastNM.exe
              "C:\Program Files\Avast Software\Avast\AvastNM.exe" /install
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              PID:2208
            • C:\Program Files\Common Files\Avast Software\Overseer\overseer.exe
              "C:\Program Files\Common Files\Avast Software\Overseer\overseer.exe" /skip_uptime /skip_remediations
              6⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              PID:2476
            • C:\Program Files\Avast Software\Avast\defs\21071403\engsup.exe
              "C:\Program Files\Avast Software\Avast\defs\21071403\engsup.exe" /prepare_definitions_folder
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Drops file in Program Files directory
              • Checks processor information in registry
              PID:2344
            • C:\Program Files\Avast Software\Avast\wsc_proxy.exe
              "C:\Program Files\Avast Software\Avast\wsc_proxy.exe" /svc /register /ppl_svc
              6⤵
              • Executes dropped EXE
              • Checks for any installed AV software in registry
              • Writes to the Master Boot Record (MBR)
              • Checks processor information in registry
              PID:1388
            • C:\Program Files\Avast Software\Avast\defs\21071403\engsup.exe
              "C:\Program Files\Avast Software\Avast\defs\21071403\engsup.exe" /get_latest_ga_client_id /get_latest_landingpageid_cookie /get_latest_pagedownloadid_cookie
              6⤵
              • Executes dropped EXE
              • Checks processor information in registry
              PID:2592
    • C:\Program Files (x86)\DriverHub\DriverHub.exe
      "C:\Program Files (x86)\DriverHub\DriverHub.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:680
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://www.drvhub.net/products/pro?locale=en&utm_campaign=free
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2612
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:836
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000005B0" "00000000000003D0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:520
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1372
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{71828afc-ec0b-2937-8fe6-cb0c2894cd1d}\aswNetNd6.inf" "9" "6128e1ea7" "000000000000059C" "WinSta0\Default" "00000000000004EC" "208" "C:\Program Files\Avast Software\Avast\setup\Inf"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Security Software Discovery

1
T1063

Query Registry

5
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\DriverHub\DriverHub.exe
    MD5

    1cc099253c6baa24932f94b1c1c7e9bb

    SHA1

    f89f6c51ad2e552f8a2f59083fb3fd8f0684cdcf

    SHA256

    dc1cc0b1cae7a412b03ac4d519401b4888bb50f74b45425982a32ad8ad92fa8d

    SHA512

    c559670c8c3e76913e07ff54d5f85c7a3ca39247319807fc86c6a093d254ee1aa8f43777100657dc958985eec6afe2f1577d12d9ad9b26192c59f243332713a8

  • C:\Program Files (x86)\DriverHub\DriverHub.exe
    MD5

    1cc099253c6baa24932f94b1c1c7e9bb

    SHA1

    f89f6c51ad2e552f8a2f59083fb3fd8f0684cdcf

    SHA256

    dc1cc0b1cae7a412b03ac4d519401b4888bb50f74b45425982a32ad8ad92fa8d

    SHA512

    c559670c8c3e76913e07ff54d5f85c7a3ca39247319807fc86c6a093d254ee1aa8f43777100657dc958985eec6afe2f1577d12d9ad9b26192c59f243332713a8

  • C:\Program Files (x86)\DriverHub\Qt5Core.dll
    MD5

    80a95eac18b0d41d393b3f72cf03cce0

    SHA1

    724eb57bcea953e132577ac540aa4ed0851dde17

    SHA256

    2059ae8af9b3adc40e3fbac46edce469a5a3340b1a42c0e2b0f79fcfab838ed2

    SHA512

    b17d526b2ae9e39d4dd3fe452ae9e2460801b542b4e6d396a0cb86b7486d10615d673ac85ca313190ea9626832a736eadbec4017608c9fbcc6966749ea84540a

  • C:\Program Files (x86)\DriverHub\Qt5Gui.dll
    MD5

    df758556c1235d3a7e0cfac2e060a465

    SHA1

    91fa26c8641cc13acb7030179ad286c73dbe2c02

    SHA256

    a383bc6b268d1e1b344414ddbdd400843649c61ad45c6018ca81ec0ef535b0dd

    SHA512

    9d14cb74388fcd49e28ff35e399c4c244440bd9ab31ae68459a6a613da7c42c1172e0f4c13f11dc30602759a6b8c815a80dcbab3d9d75f15f18cda4f62849467

  • C:\Program Files (x86)\DriverHub\Qt5Network.dll
    MD5

    4ccc16253f60fc8c06475bf936c8d168

    SHA1

    143aef75820abba5bcf80eba477079ccd7e14a1b

    SHA256

    df013042c338346b30d2e33a9895a6de8d6a6ee785406996b4a523957ab10a2e

    SHA512

    c5f881711c183e87ab069430634f9bd98851324fbe27563472d4dd59b05096e5cd3134d178d79083b8c98943e509fdc5c14696d60b9470be233b1fbfe4c6a4b1

  • C:\Program Files (x86)\DriverHub\Qt5Qml.dll
    MD5

    d3939d46d3756542c4eab1df9207a776

    SHA1

    51a3ee6299a765a29dec03c45058d8499bda0685

    SHA256

    caae45fcf9538b4d5994491a322aacc9854bdedf054b681cd21d8ee38d143673

    SHA512

    b33e904536859ca78d7667a9c0888bbb41467405cf4dd66ee6910f65b33828439aa904d2aa35fe23cf11d330e056104869af20791150a82587cadd638cdf3ff0

  • C:\Program Files (x86)\DriverHub\Qt5Quick.dll
    MD5

    07be85d99d1abe75bd0221c1ce03c4bb

    SHA1

    bcb35e6937499afd08805d5e634ea222b0a0e86c

    SHA256

    544d0ac18788f8d72615c5e084034066f9966d3050c300b38a667fcb8f0e7e34

    SHA512

    d5aac5e1a95d20e9e9b74c8dc1a6465b62601ed5b95d979b3540ac7e1ac388458dbf00d82933c810e03780655623ba084a5f0a13988b82af98c871081260939f

  • C:\Program Files (x86)\DriverHub\QtQuick.2\qmldir
    MD5

    fcedccc4408c301dc6b1fe45721353ac

    SHA1

    1f8e8e590505274d317573ca074aecdb70b3c596

    SHA256

    7e844000c1f61db37173ee953012981d533c950e7fb772c2672ca74dcfdb914b

    SHA512

    4c4fdc7ebaa3da4de15832859d92a7aab19ef7e7b5ed9c7858642c0bfd4145be2962ecd2fc12b150a5f81797e8e47197a076a46afe936eb29e4d2f41f78077d6

  • C:\Program Files (x86)\DriverHub\QtQuick.2\qtquick2plugin.dll
    MD5

    e064dfd82f6d37163fde01c18906a956

    SHA1

    d65141402d9a792d5d14a1421f88f10410f5f0af

    SHA256

    16b2909d64f493d870b84c64e05353b54f645bf11944e04b7205ad026c3e2f63

    SHA512

    5f35b20e5c5131034d9507b67f9c094793a551195d21f1e22a4f0cc5f42eee353d8982ef4de994b4f22be751e539362b6513b81570a77b035baf07ad06b61c47

  • C:\Program Files (x86)\DriverHub\libcurl.dll
    MD5

    e5064adfbc48e3fb81f09e7b8e78d49d

    SHA1

    887fd08cb3c2989a9d88adc9717d3ec00ab97462

    SHA256

    4bfcaee356cf1b99d3dbc03d42018fcfc29271c6a72b373343d24c45a7569489

    SHA512

    0adb6675ad6de574c4cdba3e48cbb37901e6e8ef37a92b481d441a6dafe2726bb9432b7db7612040ff30ec490d8ebdc0eb8bdd1ad58b9bb53eab905934679a93

  • C:\Program Files (x86)\DriverHub\platforms\qwindows.dll
    MD5

    1e6793d71eb9deb7ad943aabbbb17240

    SHA1

    0132e7d887c4f6f4c41d5e685644fd8c700d87fe

    SHA256

    6b9e0cc5f72b8fddd16ae0ef7a14e64bc0eafcdb4d5f74b2c12194241d66407d

    SHA512

    e681370cda413c90ace86d48f7c769ca1121e55688eddb6c46750f362498f30aa7fd5a7e1fe4facd2bc8a2598f0bb37847b634c05963eafba6f0a8048b777d89

  • C:\ProgramData\Avast Software\Persistent Data\Avast\Logs\Setup.log
    MD5

    8ac87b17abe20ad2e4c363c1927459fc

    SHA1

    2b7d39ad178bbc10808c471062eb914bc5065e98

    SHA256

    2be1a03886cef5e171edb7bc12a8521646bc609e3b7f0a34690d8930f8223ee2

    SHA512

    b1f9ecad5e2613593bb92f631880d1a0e4ab6ce1cfd7d17791daba4c538f4582cb9bbd56b9a088bb083a54c2a17e8e744e9e61a815117926b637f87d22f0211f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    2902de11e30dcc620b184e3bb0f0c1cb

    SHA1

    5d11d14a2558801a2688dc2d6dfad39ac294f222

    SHA256

    e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

    SHA512

    efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1a2f0c97e4ea195363e9c0a4504b1ecc

    SHA1

    ff12eea3a98a4832011a6f7bb5dd86941d998330

    SHA256

    a8afc66de2f98d113da1dcd89946787451f54050cdf452f00f15461a3c7d94d4

    SHA512

    95f3e8355152e0a1934da37ebeb8ae44d6f0bbbc62c02eacace8360e22a2c2c8ca28b0ea119695f2cd5080418a9330e0c2c7487e74083890f0d3b2daef412ba5

  • C:\Users\Admin\AppData\Local\Temp\DriverHub\Avast-downloader.exe
    MD5

    dec4a7357538dc67fb64b6d72b4a5cc2

    SHA1

    c0ad4db8228873b863019fc36a8c79b61525d9e1

    SHA256

    e0222ade7919ad88c685100b64a0e839ce9d87e2003a628f4b9843fda2c94b8b

    SHA512

    b50f7763e50939be41ca2647f28b8f15b5c646e42552e75e6f5ad0dd6373c1e8bb53bb6f72c68f5040259f85175a4cf9d68134912e0f4941bd861743870b2dd7

  • C:\Users\Admin\AppData\Local\Temp\DriverHub\DriverHub.exe
    MD5

    c0d569fb36781dc938d48c51743cffd3

    SHA1

    1fcb3c805205b409e9f0e7245d555693431993c7

    SHA256

    aed087d1c472fad71497122b3fd145b9a31652ed1a847613a1f0f9cb09d3f6f6

    SHA512

    7e9a185b77c67dc534a65a7a80f71fada9cd8eb71d47eddd54928d0e9055e8d356ee1cd7481138264627621c22a9adf92a5507b771becbc469fb0f8679f0f6e5

  • C:\Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe
    MD5

    ca778a97f31d6ab131f1e0bb58a466fb

    SHA1

    5b8637acc24f11e9bf83c77aacc8d529ea62d173

    SHA256

    91c21c93a88dd82e8ae429534dacbc7a4885198361eae18d82920c714e328cf9

    SHA512

    e2de89cb69803339f765bc1b29a7d6b24effd079f8296463ae6be0a0fdc99d2df2bc742c77b1e22ec320366ada672c022605c26ce21f7a59ba9246df8be9e27d

  • C:\Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe
    MD5

    ca778a97f31d6ab131f1e0bb58a466fb

    SHA1

    5b8637acc24f11e9bf83c77aacc8d529ea62d173

    SHA256

    91c21c93a88dd82e8ae429534dacbc7a4885198361eae18d82920c714e328cf9

    SHA512

    e2de89cb69803339f765bc1b29a7d6b24effd079f8296463ae6be0a0fdc99d2df2bc742c77b1e22ec320366ada672c022605c26ce21f7a59ba9246df8be9e27d

  • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20210715105946_000_vcRuntimeMinimum_x86.log
    MD5

    145b35e048f1509615b4313dd15a1bb2

    SHA1

    2e40ad12af87a29c667cc79ab489ad4c5eee1484

    SHA256

    d11c0bb234115ab8e7ab46ca00ed626725bbfed877cbe9e34e0a663559b3c138

    SHA512

    6373efc087022d42e7d676125e96501ec4ed429ba4a572df251ec0584054957060b73c95e7fe9fb071f0614d21c9e0cd30728baefcd9a2a745478ebe4998ecee

  • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20210715105946_001_vcRuntimeAdditional_x86.log
    MD5

    cb9f9791f7c95f5c62be427db1813a18

    SHA1

    0f2a9e5747e21d60d6ec62155448771520139436

    SHA256

    bb0356f2a4d1fa26af6956c7fa07050f8cd9fb965c8c792dc1dd2a168acf48c0

    SHA512

    b046688f8e5426f328d06e9b6150a4eb5c86a82bf00e0218cd7e9ef2b68ad340b1b97524ce516c3e4ffdef79de882db4a83fbdcb0c303f87501933772bd08278

  • C:\Windows\SysWOW64\MSVCP140.dll
    MD5

    04224b38d06ee732b998318d3508300c

    SHA1

    d2cf697342b33203ef80b545573627e0b16a6a9e

    SHA256

    df7920f190d05f677367058e03a63c9b59e47a7395ab513cf9d0dcee1ec486f3

    SHA512

    e915d73def8cda745048a5da2db5713f2d9b7a2cac237e37ee82946b58a0e898a70f0ccdb1481bec24c3671a94ed5bc65851dc2957c594e9f2ba8f1996ed73e4

  • C:\Windows\SysWOW64\MSVCP140_1.dll
    MD5

    d6d10681231978e04c449e8c3a42dbf7

    SHA1

    93e8d19d7ad7e79b8627da0421d3aea0c077ec2d

    SHA256

    b5124c320f78f377da3c89078f66a99c76fc115a2bf85455666f2107caf24dcf

    SHA512

    344968c315c2621158187a5f858084a40f485910cafe044f7ee8a1349fb17423c7d8ed0d3de9573f6c0f7f4155be0c1546c141ecb032ee29a81aebddf14652d1

  • C:\Windows\SysWOW64\VCRUNTIME140.dll
    MD5

    9e2d8462f10b8972bf8a14c4457b24e2

    SHA1

    3b3099ecd21728b3cba24826bb948c213bd14761

    SHA256

    827f03554e5eaccb970bb9e53136a8d96be5fd2748572eee1a1f7616f36d9abe

    SHA512

    c7572e293fb3a7ef402f876b162d48e529d47dc282850b406e05fdf6cee011cf28be224e79ce82054324a6c043c27610fad108992ff0e80e18d5b2dd38ebdb61

  • C:\Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • C:\Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • C:\Windows\Temp\asw.bb9fbc7ad7f6b974\ecoo.edat
    MD5

    ef5d211f72eaa1f423ae036ad22904bb

    SHA1

    03507c4a6febdb3d11481e5f82cd9bc297a36eb5

    SHA256

    a18ce368798f5738d12fea0a4378d7748881767f39b7bf9d91fca61251b6228d

    SHA512

    39eee415b593ce3168a3569f3870b580cb31d1eab6355319615e317050619f0ae7a62a9736b879ac29a563e79f1d74b8b9ba959c142ef4e5653b1cf7f9c1afda

  • C:\Windows\Temp\asw.f6489e41c331df00\Instup.dll
    MD5

    812cc16a310075bedebf77821cae2ce2

    SHA1

    c133649625794c68d96d3a4ceb4eada87d173c59

    SHA256

    351616a4b8bc2089686b39b2b11bbd917736bde19216beddb4a7fa3492e8775c

    SHA512

    6256875e5bd3347f642f8a530473bf1c2a177f4bfdacb8d41a65b5c56da27a2ad1fa1d3d47a788eac8b2f2a390d968b8c4f92013fc4943d89a18e122af16f6ac

  • C:\Windows\Temp\asw.f6489e41c331df00\Instup.exe
    MD5

    d1af49d19005a4767847b4231843097d

    SHA1

    1a78a948d00e0d3925397147636b76645e9dd7d3

    SHA256

    f738c48051553d0d118af6a01314b9ba3c73f535340e6b568a636d98bbb7eba7

    SHA512

    23ffb50f724406635f77c36e6780bdb27a9f8a18961f71b340a7b19554222826515b7280943d1a0efc8020413b1ac9b061831d51348f09b927d569c35fc3331d

  • C:\Windows\Temp\asw.f6489e41c331df00\config.def
    MD5

    92338a7f3151c9840feba40f011c6de2

    SHA1

    67eb0973f39129535d0a875ffe7d6712fa4dcb7a

    SHA256

    daacfd7589691ac49fe00ba7be8a28f434788612e68269958dcd63066e44dd06

    SHA512

    bbb4144fb705404d2dcade4b3f8923e97959ff3673b39648ddfef5dbb882cf1ba3bed9c203ed4c542d8e488a806a359e28cf90a79b74bdda7dcc8b946398cf7c

  • C:\Windows\Temp\asw.f6489e41c331df00\servers.def
    MD5

    56d5f04ae1c2c4289d21a223166dffa8

    SHA1

    668ceecf07409f68e1cc2d04dbb6a5f9ea2f5b6b

    SHA256

    5c5a5167b54233e0223526b4220b245a7cd006978d8e928cd1df877754f22aa7

    SHA512

    98b9fd5d50f3287079a97323f4ee23b478b30d015f1f042620f2d5bfa7520813e2a549183250fcacc612e463973cf20f3723310a0669a4b555a994e0981e8e2f

  • C:\Windows\Temp\{4C9E7384-0367-4617-A52A-417A25C8656A}\.cr\highdpimfcx86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • C:\Windows\Temp\{4C9E7384-0367-4617-A52A-417A25C8656A}\.cr\highdpimfcx86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.be\VC_redist.x86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.be\VC_redist.x86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\cab54A5CABBE7274D8A22EB58060AAB7623
    MD5

    bc1d1b83a946ae7a1470dffe0a2de61e

    SHA1

    40566282555fce73db465d1c4616f34e229008ad

    SHA256

    75925d447f7b1bf625fcec1db83af283be9d048fc45f3c7806066f116ab8c64e

    SHA512

    a54fa1465b5921a031b451303c8198df175f80f02b8ea983bf7d77b86066127f13fac8b62c72b2eb5420f7b3e2487dbd735b24aa326db1f5f30128d6affa99ba

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\cabB3E1576D1FEFBB979E13B1A5379E0B16
    MD5

    baf306e23e90c77f853728b9c8503b60

    SHA1

    ac894c4b49f051bd50cf5419d6420539837aece4

    SHA256

    667c79fad83ea5c3c6fc70b02b160782ae87a2c5ed01ccd657a1044f2a33424b

    SHA512

    217c0e97aa92c40f34b75ccfe1ab411ed06c0409049d03f203d49cdac7424f1226be95d4aa7bcd052b84faf64cdbc9f9e4142ccfa24b61780594eca1116a1a0a

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\vcRuntimeAdditional_x86
    MD5

    4c79a99971e9c6b401b004e8fe0ac07a

    SHA1

    6b5c540dbe53ec97f13022720af1d9d86ef44116

    SHA256

    9b664e41d0b80112ecfbee6d508390003d3d4dfe1c2537b03b2f53dcfa38a421

    SHA512

    6e86863691fdbaa2401fcd09b44a73b8d678d9dd98a576ff283f896a812650274e976aa73eac46818590365e72ba3af02dbdc2454fb9e3b6c7682c2ceb2bba1d

  • C:\Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\vcRuntimeMinimum_x86
    MD5

    067a3e4d1684efd6076664d92b6256c1

    SHA1

    d11c4e80a7181dfeac39a0a1fe7877217a3c7dfe

    SHA256

    18dcd9d2d3643aa029eaeb98fb3705f11bf9c0efa9cb8d91a5c7f8bc8c024e36

    SHA512

    cb654029586441f59f462d5e845b017c5761e6c05a60e0f04f8b91a0569485a4a86142dd01a4f6f0a0643715c46e0d9c9096c664ce879a7fd5aa1685d4b718e0

  • \Program Files (x86)\DriverHub\DriverHub.exe
    MD5

    1cc099253c6baa24932f94b1c1c7e9bb

    SHA1

    f89f6c51ad2e552f8a2f59083fb3fd8f0684cdcf

    SHA256

    dc1cc0b1cae7a412b03ac4d519401b4888bb50f74b45425982a32ad8ad92fa8d

    SHA512

    c559670c8c3e76913e07ff54d5f85c7a3ca39247319807fc86c6a093d254ee1aa8f43777100657dc958985eec6afe2f1577d12d9ad9b26192c59f243332713a8

  • \Program Files (x86)\DriverHub\DriverHub.exe
    MD5

    1cc099253c6baa24932f94b1c1c7e9bb

    SHA1

    f89f6c51ad2e552f8a2f59083fb3fd8f0684cdcf

    SHA256

    dc1cc0b1cae7a412b03ac4d519401b4888bb50f74b45425982a32ad8ad92fa8d

    SHA512

    c559670c8c3e76913e07ff54d5f85c7a3ca39247319807fc86c6a093d254ee1aa8f43777100657dc958985eec6afe2f1577d12d9ad9b26192c59f243332713a8

  • \Program Files (x86)\DriverHub\Qt5Core.dll
    MD5

    80a95eac18b0d41d393b3f72cf03cce0

    SHA1

    724eb57bcea953e132577ac540aa4ed0851dde17

    SHA256

    2059ae8af9b3adc40e3fbac46edce469a5a3340b1a42c0e2b0f79fcfab838ed2

    SHA512

    b17d526b2ae9e39d4dd3fe452ae9e2460801b542b4e6d396a0cb86b7486d10615d673ac85ca313190ea9626832a736eadbec4017608c9fbcc6966749ea84540a

  • \Program Files (x86)\DriverHub\Qt5Gui.dll
    MD5

    df758556c1235d3a7e0cfac2e060a465

    SHA1

    91fa26c8641cc13acb7030179ad286c73dbe2c02

    SHA256

    a383bc6b268d1e1b344414ddbdd400843649c61ad45c6018ca81ec0ef535b0dd

    SHA512

    9d14cb74388fcd49e28ff35e399c4c244440bd9ab31ae68459a6a613da7c42c1172e0f4c13f11dc30602759a6b8c815a80dcbab3d9d75f15f18cda4f62849467

  • \Program Files (x86)\DriverHub\Qt5Network.dll
    MD5

    4ccc16253f60fc8c06475bf936c8d168

    SHA1

    143aef75820abba5bcf80eba477079ccd7e14a1b

    SHA256

    df013042c338346b30d2e33a9895a6de8d6a6ee785406996b4a523957ab10a2e

    SHA512

    c5f881711c183e87ab069430634f9bd98851324fbe27563472d4dd59b05096e5cd3134d178d79083b8c98943e509fdc5c14696d60b9470be233b1fbfe4c6a4b1

  • \Program Files (x86)\DriverHub\Qt5Qml.dll
    MD5

    d3939d46d3756542c4eab1df9207a776

    SHA1

    51a3ee6299a765a29dec03c45058d8499bda0685

    SHA256

    caae45fcf9538b4d5994491a322aacc9854bdedf054b681cd21d8ee38d143673

    SHA512

    b33e904536859ca78d7667a9c0888bbb41467405cf4dd66ee6910f65b33828439aa904d2aa35fe23cf11d330e056104869af20791150a82587cadd638cdf3ff0

  • \Program Files (x86)\DriverHub\QtQuick.2\qtquick2plugin.dll
    MD5

    e064dfd82f6d37163fde01c18906a956

    SHA1

    d65141402d9a792d5d14a1421f88f10410f5f0af

    SHA256

    16b2909d64f493d870b84c64e05353b54f645bf11944e04b7205ad026c3e2f63

    SHA512

    5f35b20e5c5131034d9507b67f9c094793a551195d21f1e22a4f0cc5f42eee353d8982ef4de994b4f22be751e539362b6513b81570a77b035baf07ad06b61c47

  • \Program Files (x86)\DriverHub\libcurl.dll
    MD5

    e5064adfbc48e3fb81f09e7b8e78d49d

    SHA1

    887fd08cb3c2989a9d88adc9717d3ec00ab97462

    SHA256

    4bfcaee356cf1b99d3dbc03d42018fcfc29271c6a72b373343d24c45a7569489

    SHA512

    0adb6675ad6de574c4cdba3e48cbb37901e6e8ef37a92b481d441a6dafe2726bb9432b7db7612040ff30ec490d8ebdc0eb8bdd1ad58b9bb53eab905934679a93

  • \Program Files (x86)\DriverHub\platforms\qwindows.dll
    MD5

    1e6793d71eb9deb7ad943aabbbb17240

    SHA1

    0132e7d887c4f6f4c41d5e685644fd8c700d87fe

    SHA256

    6b9e0cc5f72b8fddd16ae0ef7a14e64bc0eafcdb4d5f74b2c12194241d66407d

    SHA512

    e681370cda413c90ace86d48f7c769ca1121e55688eddb6c46750f362498f30aa7fd5a7e1fe4facd2bc8a2598f0bb37847b634c05963eafba6f0a8048b777d89

  • \Users\Admin\AppData\Local\Temp\DriverHub\Avast-downloader.exe
    MD5

    dec4a7357538dc67fb64b6d72b4a5cc2

    SHA1

    c0ad4db8228873b863019fc36a8c79b61525d9e1

    SHA256

    e0222ade7919ad88c685100b64a0e839ce9d87e2003a628f4b9843fda2c94b8b

    SHA512

    b50f7763e50939be41ca2647f28b8f15b5c646e42552e75e6f5ad0dd6373c1e8bb53bb6f72c68f5040259f85175a4cf9d68134912e0f4941bd861743870b2dd7

  • \Users\Admin\AppData\Local\Temp\DriverHub\DriverHub.exe
    MD5

    c0d569fb36781dc938d48c51743cffd3

    SHA1

    1fcb3c805205b409e9f0e7245d555693431993c7

    SHA256

    aed087d1c472fad71497122b3fd145b9a31652ed1a847613a1f0f9cb09d3f6f6

    SHA512

    7e9a185b77c67dc534a65a7a80f71fada9cd8eb71d47eddd54928d0e9055e8d356ee1cd7481138264627621c22a9adf92a5507b771becbc469fb0f8679f0f6e5

  • \Users\Admin\AppData\Local\Temp\DriverHub\highdpimfcx86.exe
    MD5

    ca778a97f31d6ab131f1e0bb58a466fb

    SHA1

    5b8637acc24f11e9bf83c77aacc8d529ea62d173

    SHA256

    91c21c93a88dd82e8ae429534dacbc7a4885198361eae18d82920c714e328cf9

    SHA512

    e2de89cb69803339f765bc1b29a7d6b24effd079f8296463ae6be0a0fdc99d2df2bc742c77b1e22ec320366ada672c022605c26ce21f7a59ba9246df8be9e27d

  • \Windows\SysWOW64\msvcp140.dll
    MD5

    04224b38d06ee732b998318d3508300c

    SHA1

    d2cf697342b33203ef80b545573627e0b16a6a9e

    SHA256

    df7920f190d05f677367058e03a63c9b59e47a7395ab513cf9d0dcee1ec486f3

    SHA512

    e915d73def8cda745048a5da2db5713f2d9b7a2cac237e37ee82946b58a0e898a70f0ccdb1481bec24c3671a94ed5bc65851dc2957c594e9f2ba8f1996ed73e4

  • \Windows\SysWOW64\msvcp140_1.dll
    MD5

    d6d10681231978e04c449e8c3a42dbf7

    SHA1

    93e8d19d7ad7e79b8627da0421d3aea0c077ec2d

    SHA256

    b5124c320f78f377da3c89078f66a99c76fc115a2bf85455666f2107caf24dcf

    SHA512

    344968c315c2621158187a5f858084a40f485910cafe044f7ee8a1349fb17423c7d8ed0d3de9573f6c0f7f4155be0c1546c141ecb032ee29a81aebddf14652d1

  • \Windows\SysWOW64\vcruntime140.dll
    MD5

    9e2d8462f10b8972bf8a14c4457b24e2

    SHA1

    3b3099ecd21728b3cba24826bb948c213bd14761

    SHA256

    827f03554e5eaccb970bb9e53136a8d96be5fd2748572eee1a1f7616f36d9abe

    SHA512

    c7572e293fb3a7ef402f876b162d48e529d47dc282850b406e05fdf6cee011cf28be224e79ce82054324a6c043c27610fad108992ff0e80e18d5b2dd38ebdb61

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.bb9fbc7ad7f6b974\avast_free_antivirus_setup_online_x64.exe
    MD5

    8d29f15bf97bc116cc59b7b6c0538768

    SHA1

    ec9576f4592e6e4973e2011e85cb9c253d8a089c

    SHA256

    ca8dd4180c36f7fb03a6e0ed26f3f5309f5525f07f8657aba3c3bb8957c0012c

    SHA512

    5f16c58da011d86dd12ee015dbe047f50c62815b346ef026a12575fd9e3d6d19477e470808f8af98d93a38cb0e4cbbc29aa47f22d43149dd0d4e5ecdbe589a98

  • \Windows\Temp\asw.f6489e41c331df00\Instup.dll
    MD5

    812cc16a310075bedebf77821cae2ce2

    SHA1

    c133649625794c68d96d3a4ceb4eada87d173c59

    SHA256

    351616a4b8bc2089686b39b2b11bbd917736bde19216beddb4a7fa3492e8775c

    SHA512

    6256875e5bd3347f642f8a530473bf1c2a177f4bfdacb8d41a65b5c56da27a2ad1fa1d3d47a788eac8b2f2a390d968b8c4f92013fc4943d89a18e122af16f6ac

  • \Windows\Temp\asw.f6489e41c331df00\Instup.exe
    MD5

    d1af49d19005a4767847b4231843097d

    SHA1

    1a78a948d00e0d3925397147636b76645e9dd7d3

    SHA256

    f738c48051553d0d118af6a01314b9ba3c73f535340e6b568a636d98bbb7eba7

    SHA512

    23ffb50f724406635f77c36e6780bdb27a9f8a18961f71b340a7b19554222826515b7280943d1a0efc8020413b1ac9b061831d51348f09b927d569c35fc3331d

  • \Windows\Temp\{4C9E7384-0367-4617-A52A-417A25C8656A}\.cr\highdpimfcx86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • \Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.ba\wixstdba.dll
    MD5

    eab9caf4277829abdf6223ec1efa0edd

    SHA1

    74862ecf349a9bedd32699f2a7a4e00b4727543d

    SHA256

    a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

    SHA512

    45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

  • \Windows\Temp\{942EC014-7656-4C12-973F-F3A504AC6640}\.be\VC_redist.x86.exe
    MD5

    d34111f1c804b76b2545bbe88cda9d85

    SHA1

    1b6d4b7beb22c27a809194d6029cefec3aa605a2

    SHA256

    6d357caa2726d154394b4fcd3cebf36e60f3058e23b9938de602ee537bcc4905

    SHA512

    2ca8fcab1c6bddef6db00c8e15bf4a1531288ae5c9f822e5856417c87fc4e8211296f47bb48318798367cb9144f519ebdb1e9b48aea9f44cac8ee47b12b9d8e7

  • memory/300-167-0x0000000000000000-mapping.dmp
  • memory/560-132-0x0000000000000000-mapping.dmp
  • memory/680-147-0x0000000007CE0000-0x0000000007CE1000-memory.dmp
    Filesize

    4KB

  • memory/680-150-0x0000000008100000-0x0000000008101000-memory.dmp
    Filesize

    4KB

  • memory/680-116-0x00000000033C0000-0x0000000003800000-memory.dmp
    Filesize

    4.2MB

  • memory/680-120-0x0000000000200000-0x0000000000210000-memory.dmp
    Filesize

    64KB

  • memory/680-95-0x0000000000000000-mapping.dmp
  • memory/680-118-0x0000000003800000-0x0000000003A00000-memory.dmp
    Filesize

    2.0MB

  • memory/936-71-0x0000000000000000-mapping.dmp
  • memory/936-76-0x0000000071971000-0x0000000071973000-memory.dmp
    Filesize

    8KB

  • memory/1064-62-0x0000000000000000-mapping.dmp
  • memory/1096-60-0x00000000768B1000-0x00000000768B3000-memory.dmp
    Filesize

    8KB

  • memory/1156-90-0x0000000000000000-mapping.dmp
  • memory/1372-86-0x000007FEFC221000-0x000007FEFC223000-memory.dmp
    Filesize

    8KB

  • memory/1388-174-0x0000000000000000-mapping.dmp
  • memory/1472-66-0x0000000000000000-mapping.dmp
  • memory/1688-78-0x0000000000000000-mapping.dmp
  • memory/1704-123-0x0000000000000000-mapping.dmp
  • memory/2068-164-0x0000000000000000-mapping.dmp
  • memory/2208-171-0x0000000000000000-mapping.dmp
  • memory/2228-148-0x0000000000000000-mapping.dmp
  • memory/2244-165-0x0000000000000000-mapping.dmp
  • memory/2316-168-0x0000000000000000-mapping.dmp
  • memory/2344-173-0x0000000000000000-mapping.dmp
  • memory/2416-151-0x0000000000000000-mapping.dmp
  • memory/2444-170-0x0000000000000000-mapping.dmp
  • memory/2476-172-0x0000000000000000-mapping.dmp
  • memory/2500-153-0x0000000000000000-mapping.dmp
  • memory/2592-175-0x0000000000000000-mapping.dmp
  • memory/2612-154-0x0000000000000000-mapping.dmp
  • memory/2792-156-0x0000000000000000-mapping.dmp
  • memory/2824-157-0x0000000000000000-mapping.dmp
  • memory/2856-158-0x0000000000000000-mapping.dmp
  • memory/2888-159-0x0000000000000000-mapping.dmp
  • memory/2920-160-0x0000000000000000-mapping.dmp
  • memory/2952-161-0x0000000000000000-mapping.dmp
  • memory/3004-162-0x0000000000000000-mapping.dmp
  • memory/3036-163-0x0000000000000000-mapping.dmp