Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 10:36

General

  • Target

    40cf825721100990411271d92a5cfe400bb9c147606d32d3f31c00ba1123f3a3.exe

  • Size

    219KB

  • MD5

    f8476f12f15f6cb59af40de54e904a93

  • SHA1

    4256ad25778fc0b7bb7dcfc540e35c212a296bc3

  • SHA256

    40cf825721100990411271d92a5cfe400bb9c147606d32d3f31c00ba1123f3a3

  • SHA512

    516b2f7808cd1cc17ce16b685093c0ab219ac91da23afb8ec6dcb9a7045e488bda1a833f76d03d569a909ca0a335198aa12357af4ef2527b011d9b1826249fdd

  • SSDEEP

    3072:X2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhYK0Kx:X0KgGwHqwOOELha+sm2D2+UhngNeK4f4

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 31 IoCs
  • Checks for any installed AV software in registry 1 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40cf825721100990411271d92a5cfe400bb9c147606d32d3f31c00ba1123f3a3.exe
    "C:\Users\Admin\AppData\Local\Temp\40cf825721100990411271d92a5cfe400bb9c147606d32d3f31c00ba1123f3a3.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\Temp\asw.48514fb5116815bf\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.48514fb5116815bf\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-FAD /ga_clientid:31e6b77b-0cea-45a0-bbbf-f616f29da9e9 /edat_dir:C:\Windows\Temp\asw.48514fb5116815bf
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\Temp\asw.f94f6eff7157cb97\instup.exe
        "C:\Windows\Temp\asw.f94f6eff7157cb97\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.f94f6eff7157cb97 /edition:15 /prod:ais /stub_context:e86608bc-9755-44bf-9c8b-144680b7b9af:9994552 /guid:b2bc1c0f-d38b-40f1-b668-9e18eaa4a320 /ga_clientid:31e6b77b-0cea-45a0-bbbf-f616f29da9e9 /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-FAD /ga_clientid:31e6b77b-0cea-45a0-bbbf-f616f29da9e9 /edat_dir:C:\Windows\Temp\asw.48514fb5116815bf
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\instup.exe
          "C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.f94f6eff7157cb97 /edition:15 /prod:ais /stub_context:e86608bc-9755-44bf-9c8b-144680b7b9af:9994552 /guid:b2bc1c0f-d38b-40f1-b668-9e18eaa4a320 /ga_clientid:31e6b77b-0cea-45a0-bbbf-f616f29da9e9 /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-FAD /edat_dir:C:\Windows\Temp\asw.48514fb5116815bf /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:2408
          • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:2440
          • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2268
          • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2308
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1608

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    27KB

    MD5

    16a70a7991b72a37e5a0c30a5f5da0dc

    SHA1

    3fc3e6531bbee1aeebdd6c2c95013340885408d7

    SHA256

    368bc46f567e6c83243eaafe304f03f474dc97e4bdb1aabbe2fe2630906be43e

    SHA512

    3bbcdf606eb24e8c9e1b041bf4190fc94013bd870c42253aeec2e7a64cd8888fb1df44d4c396c6ed7260385b2a5b955de6e7a0e8b52675a34903fa323953a842

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    4KB

    MD5

    c5aed1cea22a1c19c8b24883fd169908

    SHA1

    c0d6da868bd704eb5da5ef3fdba29f60ed42142f

    SHA256

    c95332fcf15192872ca11163b035c0006d1755eff5788d01c1606c6d51fefd04

    SHA512

    07a03a2216ebceb3f568abc5b467b111270d1da08d7edf0324ab7140a119f530549d1cddfd4f16bfeadddbc1661edb41ff874c5ddc4e68de17770be77be6b63b

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
    Filesize

    142B

    MD5

    43dc0a75f15631002e7681dc0bcd509a

    SHA1

    6b2ebf3da9ea8512278fefeec8af1b6b194deaee

    SHA256

    fe462c9332fd0edf855cf7922bb24243c447bbb3e0ecf878a02582ff76d7bfbd

    SHA512

    0266c4ddb668b48cabdb9f26c739d5154fc7f7e2502125602a553617a7502fe023e31de731a18c42ba82b8581e893edaa7c7981ee5577b2ba4b8e2cf983e052e

  • C:\Windows\Temp\asw.48514fb5116815bf\ecoo.edat
    Filesize

    38B

    MD5

    c0e6ac32b47be25e62b9bd064753c46d

    SHA1

    65e72807e24b0160de9b2f2a6de8c14c49c1288e

    SHA256

    e76de2be67ab93a30ffdfa38aae543abc7d3af502a92d05610b0b44bccba94a4

    SHA512

    edb0aed2dff6f0f6681382d3f5631cc340f90ffa31927b761bcd00c3cb01c6c0733f357753d9f3c2cfd596516c67766cb6fae14a4620ad8f613984ce97eee93c

  • C:\Windows\Temp\asw.f94f6eff7157cb97\HTMLayout.dll
    Filesize

    4.0MB

    MD5

    4cc6efda014cc654142c97cd09175e37

    SHA1

    9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

    SHA256

    0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

    SHA512

    064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

  • C:\Windows\Temp\asw.f94f6eff7157cb97\Instup.dll
    Filesize

    18.1MB

    MD5

    e9134948a4db2642f9bfaaf157a18bd0

    SHA1

    98249d941c196e9ee01f5d77713f13a12fff87f4

    SHA256

    67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

    SHA512

    629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

  • C:\Windows\Temp\asw.f94f6eff7157cb97\Instup.exe
    Filesize

    3.6MB

    MD5

    cb33ee6145c1dfad640103e1bc8b00e9

    SHA1

    e68405536c9501a5f7617636db734a7e7bfdb61c

    SHA256

    068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

    SHA512

    31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\asw75699bb951213873.tmp
    Filesize

    3.8MB

    MD5

    0b830444a6ef848fb85bfbb173bb6076

    SHA1

    27964cc1673ddb68ca3da8018f0e13e9a141605e

    SHA256

    63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

    SHA512

    31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\asw8c1c0ed70c4c54aa.tmp
    Filesize

    831KB

    MD5

    ce4d45d0b684f591d5a83fdbd99bd306

    SHA1

    e89637b905c37033950afadaca2161bd5b09fb5e

    SHA256

    907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7

    SHA512

    af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswa64e1ed9fa28af04.tmp
    Filesize

    19.1MB

    MD5

    917a284494cbe4a4ec85e1ec768339c9

    SHA1

    47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

    SHA256

    57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

    SHA512

    90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswe1f9ee6880e3a1ee.tmp
    Filesize

    907KB

    MD5

    43dc9e69f1e9db4059cf49a5e825cfda

    SHA1

    519298f8a681b41d2d70db2670cc7543f1ee6da4

    SHA256

    98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

    SHA512

    d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswee47910e6a2337f8.tmp
    Filesize

    4.5MB

    MD5

    bbb61ad0f20d3fe17a5227c13f09e82d

    SHA1

    01700413fc5470aa0ba29aa1a962d7a719a92a82

    SHA256

    39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

    SHA512

    c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

  • C:\Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\aswf405d5c2c9647a18.tmp
    Filesize

    3.1MB

    MD5

    c545527e69a46359a4a45f58794a0fe5

    SHA1

    e233e5837bfe5d1429300fb33f12f5b54689781b

    SHA256

    8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

    SHA512

    754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

  • C:\Windows\Temp\asw.f94f6eff7157cb97\aswda642f5ccd46e9f0.ini
    Filesize

    592B

    MD5

    bd57f8b1b6c18b11205dae41b9824715

    SHA1

    9dac65eeeb6716f5b52cbf8d14c1aa0bd5fe8a0f

    SHA256

    4f5e4864d663ba814973628e92345c44e5d8c81fa065781bf814025a62080e98

    SHA512

    def206025abbc4ed6f0a5b8febb48f800253f4fe702c4d6ec620cdccc0ab0e337637087d50dbad7eab5a9108d01ee06e12e82c055b2d108e287f0faac7af6f68

  • C:\Windows\Temp\asw.f94f6eff7157cb97\config.def
    Filesize

    23KB

    MD5

    28b3283d33aa898a5c1b48381168772c

    SHA1

    7ddb0c094d2861ff28eaace457f062a11b62bf8d

    SHA256

    1e4a6ba68dd2f77855e6c0f25d1640c63580f7c2a68ab38e8d0712b0561610ef

    SHA512

    c4e93a6871aa0ebea08a4beeafb849d17caa05990d882614c04064e13b2d0bddde8ca365227a2349793dadf169fed825fe7a1481efbe292ec7529fc133816316

  • C:\Windows\Temp\asw.f94f6eff7157cb97\config.def
    Filesize

    18KB

    MD5

    b86dd14aadb9e34d004ad39a4693ced0

    SHA1

    1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

    SHA256

    b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

    SHA512

    03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

  • C:\Windows\Temp\asw.f94f6eff7157cb97\config.def
    Filesize

    18KB

    MD5

    3eab3dd89406efbf92abfaa54b6dceca

    SHA1

    9e38902ff3f6aa21f5f24fb663389a1eff3e2a40

    SHA256

    4cb673aad691a3b7713b9e51f548433cfb083b9af2ba0333afff7b930f4a8fae

    SHA512

    173f1926e256ffd3eca12caa4a057fd6cc1aab96fdc026f5999ef59dce12f3cb90b001f69db78e800d1f64dc6a83313d6a097b97b56d1082dc93f9753e09db90

  • C:\Windows\Temp\asw.f94f6eff7157cb97\config.ini
    Filesize

    689B

    MD5

    ef732ca658f467061e2c3b0f5c806aed

    SHA1

    a9d584e78199c0b2a2f0acc3192fa35f8c7ab16b

    SHA256

    9c286bf16542f48daeb6a312d09f32cc5ea2d2402413e4ca827799728ada9f51

    SHA512

    f517c9d158f3ce78a314d8df0bd123ca06808d92b9b900b3d700dcb5b72260a3684970f690caa1cdef382359f2d25be8838ca19971349d34da842ce830a6c94c

  • C:\Windows\Temp\asw.f94f6eff7157cb97\part-jrog2-79.vpx
    Filesize

    211B

    MD5

    aa442786f758e5ad442aea88d6cf6124

    SHA1

    6c464722d20d261a155e2c5f6105cd8a4f0e5c21

    SHA256

    ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

    SHA512

    add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

  • C:\Windows\Temp\asw.f94f6eff7157cb97\part-prg_ais-15020c62.vpx
    Filesize

    175KB

    MD5

    29b9bfd25fabf42939e3a6877f9b3ece

    SHA1

    c30d865bc2d680311c68eb0bed0e356845f700f9

    SHA256

    ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475

    SHA512

    a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e

  • C:\Windows\Temp\asw.f94f6eff7157cb97\part-setup_ais-15020c62.vpx
    Filesize

    5KB

    MD5

    d5b798d8816b252e7d718195dfeb8a8c

    SHA1

    860c5807fd491aeeb12d661d8cf2ecca4ca1639b

    SHA256

    75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

    SHA512

    16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

  • C:\Windows\Temp\asw.f94f6eff7157cb97\part-vps_windows-24061199.vpx
    Filesize

    7KB

    MD5

    91760dd268918f34d5035b70231c6662

    SHA1

    c244a869726ab00bc674ea81970ddc739f240426

    SHA256

    60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

    SHA512

    30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

  • C:\Windows\Temp\asw.f94f6eff7157cb97\prod-pgm.vpx
    Filesize

    572B

    MD5

    6d08ac0131cac7a2f9f2ea5d9d0b0cc6

    SHA1

    25983c1419089c6a7570963dda2d06e022b3b36d

    SHA256

    846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

    SHA512

    753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

  • C:\Windows\Temp\asw.f94f6eff7157cb97\prod-vps.vpx
    Filesize

    343B

    MD5

    b516373c4f4f0bd98bbbcd71b4022e4d

    SHA1

    fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

    SHA256

    52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

    SHA512

    b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

  • C:\Windows\Temp\asw.f94f6eff7157cb97\prod-vps.vpx
    Filesize

    340B

    MD5

    a6aa5195417c52019dac2ea520161d70

    SHA1

    3867f26e50214fbef5698dcea3840ba6c35ab23b

    SHA256

    b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

    SHA512

    6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

  • C:\Windows\Temp\asw.f94f6eff7157cb97\servers.def
    Filesize

    27KB

    MD5

    2b62fb1ecd174c7e951f2b8af502c1c0

    SHA1

    90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

    SHA256

    1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

    SHA512

    0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

  • C:\Windows\Temp\asw.f94f6eff7157cb97\servers.def.vpx
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Windows\Temp\asw.f94f6eff7157cb97\servers.def.vpx
    Filesize

    1KB

    MD5

    ca027a5ef5f6d21d7e42855fa4db4120

    SHA1

    eee669fe1c3cabd5f96c65ac992e4851f8eca9da

    SHA256

    e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

    SHA512

    8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

  • C:\Windows\Temp\asw.f94f6eff7157cb97\setup.def
    Filesize

    37KB

    MD5

    3fc9d055795a4c01893e5661f300c513

    SHA1

    29c64165afecea436a2dcb57dd5b54163a002df4

    SHA256

    425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0

    SHA512

    e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902

  • C:\Windows\Temp\asw.f94f6eff7157cb97\uat64.vpx
    Filesize

    16KB

    MD5

    bd33707a5e0b6cc434fbaa32e69cb30a

    SHA1

    34ddc8fbda6acef9e07de571d4c00e65e3c09958

    SHA256

    bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

    SHA512

    02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

  • \Windows\Temp\asw.48514fb5116815bf\avg_antivirus_free_setup_x64.exe
    Filesize

    9.5MB

    MD5

    72c1cad77d7a37f6eed6606b00b22738

    SHA1

    1883d039f42ead5318de8f5f37b61bad4b61fa72

    SHA256

    47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

    SHA512

    87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

  • \Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\asw0bbabdcbbbeeb310.tmp
    Filesize

    15KB

    MD5

    e38cc92cd980a55d811316ac62883e14

    SHA1

    fa83737abe11ee825c3da6843cc4d8e3b459729a

    SHA256

    be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

    SHA512

    1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

  • \Windows\Temp\asw.f94f6eff7157cb97\New_15020c62\gcapi_17181886282268.dll
    Filesize

    348KB

    MD5

    2973af8515effd0a3bfc7a43b03b3fcc

    SHA1

    4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

    SHA256

    d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

    SHA512

    b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

  • \Windows\Temp\asw.f94f6eff7157cb97\uat64.dll
    Filesize

    29KB

    MD5

    c53dc6d8050e08d12939b95e2f5c53dc

    SHA1

    01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

    SHA256

    5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

    SHA512

    75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

  • memory/2052-325-0x000007FEF3040000-0x000007FEF341A000-memory.dmp
    Filesize

    3.9MB

  • memory/2052-324-0x000007FEF3420000-0x000007FEF4746000-memory.dmp
    Filesize

    19.1MB

  • memory/2052-326-0x000007FEF3420000-0x000007FEF4746000-memory.dmp
    Filesize

    19.1MB

  • memory/2052-336-0x000007FEF3420000-0x000007FEF4746000-memory.dmp
    Filesize

    19.1MB

  • memory/2052-338-0x000007FEF3420000-0x000007FEF4746000-memory.dmp
    Filesize

    19.1MB