Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 09:52

General

  • Target

    c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe

  • Size

    219KB

  • MD5

    105d0f2bcd9667e474c60be026298d6a

  • SHA1

    589e7829ed8b371b1787c7952192fe13b257674a

  • SHA256

    c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568

  • SHA512

    2937cffb77a20a075538eeac63132b3fbcc326dcbd24f7ea020814b07eaad77ae9b8597399880a400cf78e0ed223123477b6a55acec0372f93a940c0c006dec6

  • SSDEEP

    3072:42RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhh9K0KT:40KgGwHqwOOELha+sm2D2+UhngNHK46p

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe
    "C:\Users\Admin\AppData\Local\Temp\c4df16d335825ebfeaa2f812681a27032bd7e1e7ccaf0e6cad4cda6f25d40568.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Windows\Temp\asw.eecc863cc3decc7b\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.eecc863cc3decc7b\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_tst_007_402_f /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Windows\Temp\asw.bfabaa787f845146\instup.exe
        "C:\Windows\Temp\asw.bfabaa787f845146\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.bfabaa787f845146 /edition:15 /prod:ais /stub_context:2c64507b-b59f-4dfd-839b-8d41d68a8629:9994552 /guid:84c21b69-27f1-47fc-9d8f-99820cf029ac /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /cookie:mmm_bav_tst_007_402_f /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\instup.exe
          "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.bfabaa787f845146 /edition:15 /prod:ais /stub_context:2c64507b-b59f-4dfd-839b-8d41d68a8629:9994552 /guid:84c21b69-27f1-47fc-9d8f-99820cf029ac /ga_clientid:0d7835ce-cfbc-44fd-a61d-d83a60311cc8 /cookie:mmm_bav_tst_007_402_f /edat_dir:C:\Windows\Temp\asw.eecc863cc3decc7b /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:3436
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:2292
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:452
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3056
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1656
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4680
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3376
          • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4412
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3852,i,7977653611488681184,6839495125838449898,262144 --variations-seed-version --mojo-platform-channel-handle=4040 /prefetch:8
    1⤵
      PID:212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

      Filesize

      26KB

      MD5

      d45fc9c860b24cad904d651f5ea35a3f

      SHA1

      d8233a1c7e773d8cb7994806b0e4c4c986e8ab31

      SHA256

      0098443dc5f5242035e0eaa1e418c70e8832a2f2cd29cbd581da647d5378ab91

      SHA512

      407a64457a9297ac8b28c7ad48b3b7055a59afebe6a9c6580dd5b3bfe8049bfe27f099ead3e6fae3c5519483aa23bc80fb427e9f23914bf54d3469acdc030ed0

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

      Filesize

      1KB

      MD5

      471b11eea34e4bb95854aae00bc898d2

      SHA1

      8c6278a3fbe04ce7bbd05f640447cce3c19225c2

      SHA256

      8380145f8e604813c75ba11cbd919ed18af3b87307949d448d70936d8e332888

      SHA512

      78a3bed138b7a14dc82769cd1f94ae42d4598a85ed8b67057d0cc0e43b1cedd4279e63fdf0495340fc9f372594f359e6cc1afcc91647364c782cdd432675704a

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log

      Filesize

      281B

      MD5

      622db09c358517b5b342c31ed2b65df1

      SHA1

      2c38476954751df44e54bbed724ac2203e3e5df3

      SHA256

      4571cc909151ddb0a590acabd3faa672a0dcd8c49ecc4e1b0ec0f16eea095166

      SHA512

      24335ea4bf1221a6c2d792817aa60707668f4be6a5da47c7c2be744b19ae0f8eafd630f95447c27918d75d8d4a76f54dfadb94e5d88665a83e16cc9baa41f7fb

    • C:\Windows\Temp\asw.bfabaa787f845146\HTMLayout.dll

      Filesize

      4.0MB

      MD5

      4cc6efda014cc654142c97cd09175e37

      SHA1

      9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

      SHA256

      0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

      SHA512

      064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

    • C:\Windows\Temp\asw.bfabaa787f845146\Instup.dll

      Filesize

      18.1MB

      MD5

      e9134948a4db2642f9bfaaf157a18bd0

      SHA1

      98249d941c196e9ee01f5d77713f13a12fff87f4

      SHA256

      67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

      SHA512

      629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

    • C:\Windows\Temp\asw.bfabaa787f845146\Instup.exe

      Filesize

      3.6MB

      MD5

      cb33ee6145c1dfad640103e1bc8b00e9

      SHA1

      e68405536c9501a5f7617636db734a7e7bfdb61c

      SHA256

      068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

      SHA512

      31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

    • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\asw7bf102b3a7467094.tmp

      Filesize

      19KB

      MD5

      ebd5c38aa827d9777dcde81e2a037b6f

      SHA1

      740eee39569863c6baa780e7d82c848c92abe0c1

      SHA256

      7fd358eddcef6756f315fec2bfad52286402f7194104fcfd3dcec7d588597025

      SHA512

      fc22fff31b6e84297af9769b84142960e45bf9d8b71e9039e3829be9c671fc173dd47c88c25807f3e7bca0b87f842de500f5227e21ed312bfae2e89d0b65ff0d

    • C:\Windows\Temp\asw.bfabaa787f845146\New_18050d08\gcapi.dll

      Filesize

      867KB

      MD5

      3ead47f44293e18d66fb32259904197a

      SHA1

      e61e88bd81c05d4678aeb2d62c75dee35a25d16b

      SHA256

      e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

      SHA512

      927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

    • C:\Windows\Temp\asw.bfabaa787f845146\aswaf95038bd6ce18a5.ini

      Filesize

      1KB

      MD5

      2f4301ac41da3c8c865bcf0a2686246d

      SHA1

      fe799dedf9d99c05e79e54539ca8c0e853f4cf91

      SHA256

      584591ed817da7b6addff5b70ab11508288eab29c06e48f7d61d7fd861e5594b

      SHA512

      8717af385c54f98d6ca9f8a054d6eed0a99608dbbf943d1d24007ee3ebc589e563d69e799e0c11e822e7328501739dd52752b0902c4982229387ba45df50d3cb

    • C:\Windows\Temp\asw.bfabaa787f845146\avbugreport_x64_ais-d08.vpx

      Filesize

      4.7MB

      MD5

      ebc2e21a31af7ba94c3a70db0caf23ad

      SHA1

      36a25c19c6becbcf8e1c959458867f59cab774a3

      SHA256

      b1819bf1551be44e0f293f6b6ead1841aacb63ca3a9d90f1a31c9cb52f648c6e

      SHA512

      e777fd82cf1d782e73dc8796c57ecb9be4ed09256af456190ae0e414de651226c3eb616ae4ec1c245e55934843dd85485e0594c0125e013c47b48d89fff5f739

    • C:\Windows\Temp\asw.bfabaa787f845146\avdump_x64_ais-d08.vpx

      Filesize

      3.3MB

      MD5

      c339cfe0485edefebae496b088d41221

      SHA1

      684e4fa30a601ef645293cc5a8b008bbc03b9483

      SHA256

      55ebd9dc7c26877a51e11722d3ea17f1afdf39a30aeda07ef6804659c34e54c4

      SHA512

      c78b4735ed9184219f95a461e97a47d95b60f353ded28d692a72f9c3db2ead081b700731c8b673e8a1ca969519281d8e73cef449d5bb6bcfd282fcd2261f4a5d

    • C:\Windows\Temp\asw.bfabaa787f845146\config.def

      Filesize

      18KB

      MD5

      b86dd14aadb9e34d004ad39a4693ced0

      SHA1

      1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

      SHA256

      b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

      SHA512

      03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

    • C:\Windows\Temp\asw.bfabaa787f845146\config.def

      Filesize

      18KB

      MD5

      0b575a6d40715ef6b6437f3d651365ec

      SHA1

      22c0e7f738cadb4e9287ce8b0ff75dd6781fc0a0

      SHA256

      4b442e9da01b6ba0e1f53afedbdbc6aea667cb1fde4b47f5a4cb871102ee2423

      SHA512

      bab5777b2a14edcc927d9a2feeaae3f76d4d670ab1ef4685cfe1f1432c3f058dcaf0c4b1b3c697c1e20698087d80eb549cf92ede68638cd2bf48b53a73a26782

    • C:\Windows\Temp\asw.bfabaa787f845146\config.def

      Filesize

      24KB

      MD5

      209f5135ae4c7e8ff1f1948876c5ee32

      SHA1

      8c009e6864e653320b8cc62e65d890788d9a7fd7

      SHA256

      ee62e0b16dc86b89f4c4801c531124190b2853c3333983289ef1d9b8ffd41eb3

      SHA512

      01551c424195fb3cb1dbb014096c1b9c042ee196f90dfdb5d26a7130578978f161d7b84c71d73f1daa4fb6554d9802570c4bf8953d29d5f88eb9e486766e98ea

    • C:\Windows\Temp\asw.bfabaa787f845146\config.ini

      Filesize

      696B

      MD5

      49e06bf9341fd92a249159483627845d

      SHA1

      d23b7e1f861cedca0b1212935b5328fee3cabafb

      SHA256

      feceb79022e6100df56347a6c86b1aab254bbe156f9dfc2002c013bf7b7e8ae8

      SHA512

      99c7c4430fbec3d82b1c22d2a413d2d1a905ccdad4c03bb85a760b66e0d8f7ddba82db2f8463f100fc661a1a4dddc7a37ac08b77b5f9a4592315244fcb978df9

    • C:\Windows\Temp\asw.bfabaa787f845146\offertool_x64_ais-d08.vpx

      Filesize

      2.3MB

      MD5

      993a67fbd5162510a2b0f3fba05bad33

      SHA1

      3c76258240a04c05341e611f55bef10341e34ff3

      SHA256

      0b7c3caa31928131ce0e1ca570aa72e20a98dda13e4ca0c59f31cc677d8e8c6e

      SHA512

      44a335d3db00fa9148066a5f2d2a9f5250d7df2315d132ab2798b02e2d21b700525a00be91d960e1564a6ffc0ee95347f0df9ffc27a10cf807d5a926ab5154a3

    • C:\Windows\Temp\asw.bfabaa787f845146\part-jrog2-79.vpx

      Filesize

      211B

      MD5

      aa442786f758e5ad442aea88d6cf6124

      SHA1

      6c464722d20d261a155e2c5f6105cd8a4f0e5c21

      SHA256

      ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

      SHA512

      add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

    • C:\Windows\Temp\asw.bfabaa787f845146\part-prg_ais-18050d08.vpx

      Filesize

      73KB

      MD5

      d264bf74d7ffcbad341d9fcefa4893bb

      SHA1

      c7e9a0972524fa573825865c46eb6728d3e219e0

      SHA256

      4b01a68078d7e1af1c0197baddbbb1ef4d3cbf13f71e8b9df766f88b4e6d8025

      SHA512

      afbfdf6fdeb5dc427340de691726e79cb5bcc41bd488c557c684efe3f26d83a17f1118cc50bd64541a9a839d3dd4329a72a9423e65d3e9cdcfbd14003f1e0dc3

    • C:\Windows\Temp\asw.bfabaa787f845146\part-setup_ais-18050d08.vpx

      Filesize

      4KB

      MD5

      0344288a18997069003d84c226a168f9

      SHA1

      0fe47920601834e620737ad321fbb24d38c7ee94

      SHA256

      675bd92f752a51bd7d9797895252b3130095a06d7d5db8f221ab6251735ead8d

      SHA512

      b1680ef42d7e2e56fbb124c91da27f15e6c946450c7d03d95b937c3cde80dbc2260e11926578075df255058c2307058429fd2f7307fc0a105c775a9b8aa82429

    • C:\Windows\Temp\asw.bfabaa787f845146\part-vps_windows-24061199.vpx

      Filesize

      7KB

      MD5

      91760dd268918f34d5035b70231c6662

      SHA1

      c244a869726ab00bc674ea81970ddc739f240426

      SHA256

      60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

      SHA512

      30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

    • C:\Windows\Temp\asw.bfabaa787f845146\prod-pgm.vpx

      Filesize

      572B

      MD5

      6d08ac0131cac7a2f9f2ea5d9d0b0cc6

      SHA1

      25983c1419089c6a7570963dda2d06e022b3b36d

      SHA256

      846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

      SHA512

      753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

    • C:\Windows\Temp\asw.bfabaa787f845146\prod-vps.vpx

      Filesize

      343B

      MD5

      b516373c4f4f0bd98bbbcd71b4022e4d

      SHA1

      fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

      SHA256

      52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

      SHA512

      b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

    • C:\Windows\Temp\asw.bfabaa787f845146\prod-vps.vpx

      Filesize

      340B

      MD5

      a6aa5195417c52019dac2ea520161d70

      SHA1

      3867f26e50214fbef5698dcea3840ba6c35ab23b

      SHA256

      b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

      SHA512

      6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

    • C:\Windows\Temp\asw.bfabaa787f845146\servers.def

      Filesize

      27KB

      MD5

      2b62fb1ecd174c7e951f2b8af502c1c0

      SHA1

      90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

      SHA256

      1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

      SHA512

      0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

    • C:\Windows\Temp\asw.bfabaa787f845146\servers.def.vpx

      Filesize

      1KB

      MD5

      ca027a5ef5f6d21d7e42855fa4db4120

      SHA1

      eee669fe1c3cabd5f96c65ac992e4851f8eca9da

      SHA256

      e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

      SHA512

      8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

    • C:\Windows\Temp\asw.bfabaa787f845146\setup.def

      Filesize

      38KB

      MD5

      49474897d267894daa13e9dcb168793d

      SHA1

      10331de148bb89ecc6e1af25bd3b0a862dd2b4eb

      SHA256

      0b9aedce74468150c054d27649dad8f98109e537a581649be6668a13cd29e6a7

      SHA512

      687dfcfdff27d8be7fa2b7a277a6bd269bf719ca12bf5e7f38643582785032cb8b0e11c04180736dfa56c2b10a12e10c10e50427ceacf6d6332125ebf65eb9da

    • C:\Windows\Temp\asw.bfabaa787f845146\uat64.dll

      Filesize

      29KB

      MD5

      c53dc6d8050e08d12939b95e2f5c53dc

      SHA1

      01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

      SHA256

      5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

      SHA512

      75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

    • C:\Windows\Temp\asw.bfabaa787f845146\uat64.vpx

      Filesize

      16KB

      MD5

      bd33707a5e0b6cc434fbaa32e69cb30a

      SHA1

      34ddc8fbda6acef9e07de571d4c00e65e3c09958

      SHA256

      bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

      SHA512

      02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

    • C:\Windows\Temp\asw.eecc863cc3decc7b\avg_antivirus_free_setup_x64.exe

      Filesize

      9.5MB

      MD5

      72c1cad77d7a37f6eed6606b00b22738

      SHA1

      1883d039f42ead5318de8f5f37b61bad4b61fa72

      SHA256

      47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

      SHA512

      87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

    • C:\Windows\Temp\asw.eecc863cc3decc7b\ecoo.edat

      Filesize

      21B

      MD5

      b7a649f519bca7f8e5186aaea02b48c9

      SHA1

      9a1e5074bbea1693659a70c85ef8f66e20a97422

      SHA256

      d9defeae2cfb91b2871eaf62bcdc2b0e2390de6ba02343407dd658e37f75f543

      SHA512

      dc033fc80e06b5013f85f5bda1927421f6635d85bc85d2ae7a5694b69e4bb14e50d9320a7963bfabf113f9e0e58cd6fd1442dc3530335ea3908383e36e2dd506