Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 05:58

General

  • Target

    64c2dd8d909b54d9f739a60630434b0a1cf93a10299f480e4fdd4c0ed65e9e87.exe

  • Size

    219KB

  • MD5

    6d48176c8b6ec223f55ff04f9d87f6ff

  • SHA1

    0938dd3cc9691b808421eef3746e2d3f06935a50

  • SHA256

    64c2dd8d909b54d9f739a60630434b0a1cf93a10299f480e4fdd4c0ed65e9e87

  • SHA512

    24ec6f277a8d6a41d5419e2005565df5fa2751a6330d2614c5ac43e3f8d29015f82d0b6854633d280880f407141ade88fee00233c8efa585d65617b2649ca9d3

  • SSDEEP

    3072:32RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhh9K0Kj:30KgGwHqwOOELha+sm2D2+UhngNHK4J0

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 32 IoCs
  • Checks for any installed AV software in registry 1 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64c2dd8d909b54d9f739a60630434b0a1cf93a10299f480e4fdd4c0ed65e9e87.exe
    "C:\Users\Admin\AppData\Local\Temp\64c2dd8d909b54d9f739a60630434b0a1cf93a10299f480e4fdd4c0ed65e9e87.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\Temp\asw.35de0cef44c963c9\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.35de0cef44c963c9\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_012_999_e7f_m /ga_clientid:0f3ee91d-50d2-4324-8ca0-c76ee6dc9a67 /edat_dir:C:\Windows\Temp\asw.35de0cef44c963c9
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\Temp\asw.87fbd0f190c81584\instup.exe
        "C:\Windows\Temp\asw.87fbd0f190c81584\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.87fbd0f190c81584 /edition:15 /prod:ais /stub_context:ef8f34a4-ffb2-4063-b93e-2549159a6458:9994552 /guid:bbf955a8-0f28-4084-9005-f63d4016cbae /ga_clientid:0f3ee91d-50d2-4324-8ca0-c76ee6dc9a67 /cookie:mmm_bav_012_999_e7f_m /ga_clientid:0f3ee91d-50d2-4324-8ca0-c76ee6dc9a67 /edat_dir:C:\Windows\Temp\asw.35de0cef44c963c9
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\instup.exe
          "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.87fbd0f190c81584 /edition:15 /prod:ais /stub_context:ef8f34a4-ffb2-4063-b93e-2549159a6458:9994552 /guid:bbf955a8-0f28-4084-9005-f63d4016cbae /ga_clientid:0f3ee91d-50d2-4324-8ca0-c76ee6dc9a67 /cookie:mmm_bav_012_999_e7f_m /edat_dir:C:\Windows\Temp\asw.35de0cef44c963c9 /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:2708
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:2544
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2556
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2044
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2988
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2600
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1648
          • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

    Filesize

    27KB

    MD5

    00ab2194a94a3a3436eaf48e1c78bb05

    SHA1

    662a7a38439a76bf87a8093a50bc698e66d0b4eb

    SHA256

    5517e8f1eaf714ae6312591f3504c92cb0daf6cbffaf786d3371c91dd8fed788

    SHA512

    a26e8ec0d882ede8395261d76f0d1286f8fff75662666069c2b428f536af78dce7006202f3e484547e84622dc126f3826b65f14c8df2385c7b33c26346b6998f

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

    Filesize

    1KB

    MD5

    08eff11071dd7e3a10159e999a954f5c

    SHA1

    85dbc5c417242e8c8f8adf9c9420bfbeb2337a56

    SHA256

    b4d1f9ccfaa0a0b46d60d4190c5631eb704f16eff1044087fc4ddd89b012dfcd

    SHA512

    83fdd3c937b7b55f71706fb8a42c933bae07fe26bcdbfcaddbd7b68bc52ae53056ad9a29728aa20cb7f0ee661a06a7cd610754359b16c5ef4045de7a3ff1a2b2

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log

    Filesize

    142B

    MD5

    54249ae1bf8a9bb34644087137787b4a

    SHA1

    c4e1521b180bd9de4662ee0a0d10f0c650d3cfeb

    SHA256

    a8cd35ccf6875850da6c98ea32102bec0d9df5c65f47139c09b9a7606a75b7ae

    SHA512

    ab8e37ba73619107485cd25fe51ab34b5b26ae84c34f93da464248ab031645da2709d29d20e82ca6e844614f04948f8aa1b8679a9d74421645363f205e7775b5

  • C:\Users\Admin\AppData\Local\Temp\Cab17D6.tmp

    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Windows\Temp\asw.35de0cef44c963c9\ecoo.edat

    Filesize

    21B

    MD5

    1d4e0e4e8171ed13c494adeeed3d3fae

    SHA1

    ad94ef4db6aa20944ef55447e02c2d5f986e948f

    SHA256

    7bcbed4ca467576f306ac3021d90b39ad43776bd0a9cf77bcde53e48581ad7fd

    SHA512

    4d7da02f009e7819ed60553fb89a915e36fd3e04c93336501e2c68d1e5a468ff22ef74f690b708dca46419611f16e321a4b8a7245d757bfbfe87ff79db8dd490

  • C:\Windows\Temp\asw.87fbd0f190c81584\HTMLayout.dll

    Filesize

    4.0MB

    MD5

    4cc6efda014cc654142c97cd09175e37

    SHA1

    9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

    SHA256

    0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

    SHA512

    064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

  • C:\Windows\Temp\asw.87fbd0f190c81584\Instup.exe

    Filesize

    3.6MB

    MD5

    cb33ee6145c1dfad640103e1bc8b00e9

    SHA1

    e68405536c9501a5f7617636db734a7e7bfdb61c

    SHA256

    068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

    SHA512

    31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\asw075bca4af7f8102f.tmp

    Filesize

    3.1MB

    MD5

    c545527e69a46359a4a45f58794a0fe5

    SHA1

    e233e5837bfe5d1429300fb33f12f5b54689781b

    SHA256

    8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

    SHA512

    754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\asw302f344f0ac18648.tmp

    Filesize

    19.1MB

    MD5

    917a284494cbe4a4ec85e1ec768339c9

    SHA1

    47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

    SHA256

    57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

    SHA512

    90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\asw6be2095c4865e8e6.tmp

    Filesize

    831KB

    MD5

    ce4d45d0b684f591d5a83fdbd99bd306

    SHA1

    e89637b905c37033950afadaca2161bd5b09fb5e

    SHA256

    907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7

    SHA512

    af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\asw6c817e2725320973.tmp

    Filesize

    4.5MB

    MD5

    bbb61ad0f20d3fe17a5227c13f09e82d

    SHA1

    01700413fc5470aa0ba29aa1a962d7a719a92a82

    SHA256

    39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

    SHA512

    c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\asw813ef6cab5ea7d7b.tmp

    Filesize

    15KB

    MD5

    e38cc92cd980a55d811316ac62883e14

    SHA1

    fa83737abe11ee825c3da6843cc4d8e3b459729a

    SHA256

    be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

    SHA512

    1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswb2501c4e91d2aceb.tmp

    Filesize

    907KB

    MD5

    43dc9e69f1e9db4059cf49a5e825cfda

    SHA1

    519298f8a681b41d2d70db2670cc7543f1ee6da4

    SHA256

    98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

    SHA512

    d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

  • C:\Windows\Temp\asw.87fbd0f190c81584\New_15020c62\aswd0ae302b30a7e837.tmp

    Filesize

    3.8MB

    MD5

    0b830444a6ef848fb85bfbb173bb6076

    SHA1

    27964cc1673ddb68ca3da8018f0e13e9a141605e

    SHA256

    63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

    SHA512

    31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

  • C:\Windows\Temp\asw.87fbd0f190c81584\aswf0ff84f0b4cae8b3.ini

    Filesize

    572B

    MD5

    5c5f9b65a6e160ccfe8f9dd74bd474fc

    SHA1

    82ab9f6c56a36877b79ef7ca6878c90a06006d25

    SHA256

    cb55b5d2e933e9642e59c8fb15311dda76689b300e31760f1ec8281506ab3d84

    SHA512

    7f5acc55da715bb325bb66f35c10f8baae59494a3f4f3f1a3a8845ef969c0ad0806b7a24484c6eb764d51f0d3983b8572063bac73ce3b05a83ea869d9b1081a2

  • C:\Windows\Temp\asw.87fbd0f190c81584\config.def

    Filesize

    18KB

    MD5

    b86dd14aadb9e34d004ad39a4693ced0

    SHA1

    1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

    SHA256

    b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

    SHA512

    03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

  • C:\Windows\Temp\asw.87fbd0f190c81584\config.def

    Filesize

    18KB

    MD5

    caeff8024ae6f50dd0d02096e9976f4a

    SHA1

    b386d1646e50a531dd03421e9086882da2c79cbf

    SHA256

    98a1a56bfa249de130fcdfb5abb0fe261c67bee27fa151071803caf421389132

    SHA512

    49fadd9a13c69b2aef06a3b7a34f2a6e8cca7e7949aa0f0b38243943481a8a05ca2a241d95e86f88a3b9fcdd3f5a3a5803ecdce7261ff83a0dad56efb9820d4d

  • C:\Windows\Temp\asw.87fbd0f190c81584\config.def

    Filesize

    23KB

    MD5

    c226eddc510b1b2eed79dd974adf294e

    SHA1

    ecba541bc42e3971055f7aa99ce48a8b46e60a93

    SHA256

    44bf37876fc08caa7c5dc850dfc1d4fda940a607aa4c36cea435e7ecb2e5c535

    SHA512

    9b5d786f0881565bfa2332b7cb79d90f918e3e54d9c7265ab7e86b3692f831cc058eb99d6005ab4475c710204551ff0f6e10774885b744e42059ed9fecce127b

  • C:\Windows\Temp\asw.87fbd0f190c81584\config.ini

    Filesize

    669B

    MD5

    974cffddfdaa00ecac772281e469eb90

    SHA1

    0cc826e704f0b1dea4f015c5f8debe05b54874e4

    SHA256

    9ba73094fa3660130de21209562e56d72f0c4709b96c99b03f0eb1e907c105a1

    SHA512

    1e1dede0c92f0e5492f56d44c579ff71159139e26cfc0d19675253da9161da36355ba3ac7e035bdcd7e702238a5ac5e403b758ed2f37ea4665f76b825fae3c9d

  • C:\Windows\Temp\asw.87fbd0f190c81584\part-jrog2-78.vpx

    Filesize

    211B

    MD5

    a1b8228fcdaa47b486cade7ff1159833

    SHA1

    6f090d73a081c0d854db42b9f6719ce5ecefdf91

    SHA256

    d7356e185708ab40b1bbe0f7691a97b5f2cfa3edf2e00f2aa5cab18ae3e63787

    SHA512

    bb3e590504444bf9020a74ab9a7641dfe2ac15158af3f556a04666823f0dab75ac7c0f280f555d8ff8f3c5208fde6ddc801f3db5a4785d211b7d0fcdaedc3251

  • C:\Windows\Temp\asw.87fbd0f190c81584\part-prg_ais-15020c62.vpx

    Filesize

    175KB

    MD5

    29b9bfd25fabf42939e3a6877f9b3ece

    SHA1

    c30d865bc2d680311c68eb0bed0e356845f700f9

    SHA256

    ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475

    SHA512

    a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e

  • C:\Windows\Temp\asw.87fbd0f190c81584\part-setup_ais-15020c62.vpx

    Filesize

    5KB

    MD5

    d5b798d8816b252e7d718195dfeb8a8c

    SHA1

    860c5807fd491aeeb12d661d8cf2ecca4ca1639b

    SHA256

    75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

    SHA512

    16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

  • C:\Windows\Temp\asw.87fbd0f190c81584\part-vps_windows-24061003.vpx

    Filesize

    7KB

    MD5

    769c8f235059d9a43ff880d268de20bd

    SHA1

    417804808fdc83a469d260ca3378bcc461b665ff

    SHA256

    544d75f184c7ccef191ba7526985f461e5b19493cd9f61ed73c422e449eed51e

    SHA512

    1908c17c6566c5b592683d34670940bf9dafd7815bfc49ee530fe2db21114fdb90f109c5096a43aafee6cfd7b520ffd0c60c5a9e1ba501890e858fa7e356f0ae

  • C:\Windows\Temp\asw.87fbd0f190c81584\prod-pgm.vpx

    Filesize

    572B

    MD5

    6d08ac0131cac7a2f9f2ea5d9d0b0cc6

    SHA1

    25983c1419089c6a7570963dda2d06e022b3b36d

    SHA256

    846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

    SHA512

    753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

  • C:\Windows\Temp\asw.87fbd0f190c81584\prod-vps.vpx

    Filesize

    343B

    MD5

    b516373c4f4f0bd98bbbcd71b4022e4d

    SHA1

    fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

    SHA256

    52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

    SHA512

    b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

  • C:\Windows\Temp\asw.87fbd0f190c81584\prod-vps.vpx

    Filesize

    341B

    MD5

    fdb487ce4bbd3fb4300630d4b3633977

    SHA1

    d3f105078f5f490641f7062ea12b22cee848f624

    SHA256

    ad8c1dbb522554e094112fceb4fd627d393638672559d9fbcd624d9efb13242b

    SHA512

    a9555d6a730c75a328c30200738ced9a4f9a7fdc30097f716ee4115d5ea9b4f4a12696419626e8b0e73d7c194488ac04e09a543ff72804f61d5721d4246af754

  • C:\Windows\Temp\asw.87fbd0f190c81584\servers.def

    Filesize

    27KB

    MD5

    2b62fb1ecd174c7e951f2b8af502c1c0

    SHA1

    90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

    SHA256

    1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

    SHA512

    0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

  • C:\Windows\Temp\asw.87fbd0f190c81584\servers.def.vpx

    Filesize

    1KB

    MD5

    ca027a5ef5f6d21d7e42855fa4db4120

    SHA1

    eee669fe1c3cabd5f96c65ac992e4851f8eca9da

    SHA256

    e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

    SHA512

    8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

  • C:\Windows\Temp\asw.87fbd0f190c81584\setup.def

    Filesize

    37KB

    MD5

    3fc9d055795a4c01893e5661f300c513

    SHA1

    29c64165afecea436a2dcb57dd5b54163a002df4

    SHA256

    425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0

    SHA512

    e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902

  • C:\Windows\Temp\asw.87fbd0f190c81584\uat64.vpx

    Filesize

    16KB

    MD5

    bd33707a5e0b6cc434fbaa32e69cb30a

    SHA1

    34ddc8fbda6acef9e07de571d4c00e65e3c09958

    SHA256

    bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

    SHA512

    02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

  • \Windows\Temp\asw.35de0cef44c963c9\avg_antivirus_free_setup_x64.exe

    Filesize

    9.5MB

    MD5

    72c1cad77d7a37f6eed6606b00b22738

    SHA1

    1883d039f42ead5318de8f5f37b61bad4b61fa72

    SHA256

    47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

    SHA512

    87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

  • \Windows\Temp\asw.87fbd0f190c81584\Instup.dll

    Filesize

    18.1MB

    MD5

    e9134948a4db2642f9bfaaf157a18bd0

    SHA1

    98249d941c196e9ee01f5d77713f13a12fff87f4

    SHA256

    67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

    SHA512

    629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

  • \Windows\Temp\asw.87fbd0f190c81584\New_15020c62\gcapi_17181719492556.dll

    Filesize

    348KB

    MD5

    2973af8515effd0a3bfc7a43b03b3fcc

    SHA1

    4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

    SHA256

    d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

    SHA512

    b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

  • \Windows\Temp\asw.87fbd0f190c81584\uat64.dll

    Filesize

    29KB

    MD5

    c53dc6d8050e08d12939b95e2f5c53dc

    SHA1

    01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

    SHA256

    5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

    SHA512

    75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

  • memory/3052-355-0x000007FEF3020000-0x000007FEF33FA000-memory.dmp

    Filesize

    3.9MB

  • memory/3052-354-0x000007FEF3400000-0x000007FEF4726000-memory.dmp

    Filesize

    19.1MB

  • memory/3052-356-0x000007FEF3400000-0x000007FEF4726000-memory.dmp

    Filesize

    19.1MB

  • memory/3052-366-0x000007FEF3400000-0x000007FEF4726000-memory.dmp

    Filesize

    19.1MB

  • memory/3052-368-0x000007FEF3400000-0x000007FEF4726000-memory.dmp

    Filesize

    19.1MB