Analysis

  • max time kernel
    120s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 10:36

General

  • Target

    0198c118f05506b08fdbafae35ca0944b3b04984466acead7d46d70945a10f41.exe

  • Size

    219KB

  • MD5

    de5cd3fc7979bc3533ed3ce703fd0edd

  • SHA1

    17be65f489391d38e7648c4f701f5c76887d0ccd

  • SHA256

    0198c118f05506b08fdbafae35ca0944b3b04984466acead7d46d70945a10f41

  • SHA512

    4d38e268d228d7b4e96c79feeeefd6b8ba36cc2ad6d62dffa33341eb7b773e054a754c20fb0a17333c2e464c0a1498485d907b8c37a498c47b87d2241da8f0a0

  • SSDEEP

    3072:V2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhYK0KQ:V0KgGwHqwOOELha+sm2D2+UhngNeK47N

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0198c118f05506b08fdbafae35ca0944b3b04984466acead7d46d70945a10f41.exe
    "C:\Users\Admin\AppData\Local\Temp\0198c118f05506b08fdbafae35ca0944b3b04984466acead7d46d70945a10f41.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\Temp\asw.7feaddcb5111ab1f\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.7feaddcb5111ab1f\avg_antivirus_free_setup_x64.exe" /cookie:mmm_asb_prm_007_410_m:dlid_FREEGSR-FAD /ga_clientid:f233d490-7388-425f-8e2c-fbd677edf2e2 /edat_dir:C:\Windows\Temp\asw.7feaddcb5111ab1f
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Windows\Temp\asw.d65b98219123eac5\instup.exe
        "C:\Windows\Temp\asw.d65b98219123eac5\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.d65b98219123eac5 /edition:15 /prod:ais /stub_context:454d3591-9070-4b48-a7ee-538220200b8e:9994552 /guid:5756eb7c-fcb2-480e-81ee-c1f8dd8187da /ga_clientid:f233d490-7388-425f-8e2c-fbd677edf2e2 /cookie:mmm_asb_prm_007_410_m:dlid_FREEGSR-FAD /ga_clientid:f233d490-7388-425f-8e2c-fbd677edf2e2 /edat_dir:C:\Windows\Temp\asw.7feaddcb5111ab1f
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3708
        • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\instup.exe
          "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.d65b98219123eac5 /edition:15 /prod:ais /stub_context:454d3591-9070-4b48-a7ee-538220200b8e:9994552 /guid:5756eb7c-fcb2-480e-81ee-c1f8dd8187da /ga_clientid:f233d490-7388-425f-8e2c-fbd677edf2e2 /cookie:mmm_asb_prm_007_410_m:dlid_FREEGSR-FAD /edat_dir:C:\Windows\Temp\asw.7feaddcb5111ab1f /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4704
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:2668
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:3520
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3544
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:5100
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:604
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1368
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4572
          • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1696

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    26KB

    MD5

    4c176c7e7ff50562d83e432c3b49bdb9

    SHA1

    6d981e93150bb4c48e29616ad9493ce16393629a

    SHA256

    247fe98c705b93fcb9d0fcf538bf0d8a0a9d143c3a8994f5a3a80123d31d674f

    SHA512

    8fcbc822f272f0565f597fe5f71dab331497a1560b41874bda1eeb20045d3b2efa7b4aabbf543997b04ba6c530469c96d4d3eaa71326a9ec74a248270bffdda8

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    1KB

    MD5

    0d5f644b5f404ca33e7623d74bffdfcc

    SHA1

    2e22886321ae2a623d8ad9f32c346af019d8b677

    SHA256

    17054acc92262da99ebe618874760a6622a2edb49912cafb7489cfe0d97db474

    SHA512

    62c5704e2cc706895154e80141a9e402ee21adf26284092ee0096530670c129fea1f9cbcfe596d07da88725d4e589f39f1b30306b0370be6e426c945f18a99f6

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
    Filesize

    281B

    MD5

    62b844a4e738f358a3f6df6704e3b51b

    SHA1

    a2034658d261d6c137eef3ea96bda0dc064f4fd7

    SHA256

    c2622283a54cb5d120cb39eb5b6dc069e74ccaad3b8c6580f0a78e0df61ebad5

    SHA512

    c23b9ee13b4f5d50993216c2e01785b0bab5c48af8e199eeef8048bb2a549ee8de217dadebe1d6b74eed0fbf561ca3f33fdb88ccdf8adb6a9b74163aebfe3383

  • C:\Windows\Temp\asw.7feaddcb5111ab1f\avg_antivirus_free_setup_x64.exe
    Filesize

    9.5MB

    MD5

    72c1cad77d7a37f6eed6606b00b22738

    SHA1

    1883d039f42ead5318de8f5f37b61bad4b61fa72

    SHA256

    47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

    SHA512

    87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

  • C:\Windows\Temp\asw.7feaddcb5111ab1f\ecoo.edat
    Filesize

    38B

    MD5

    7baff0346242651e35a819faa1b8ecf7

    SHA1

    73ac74faae9e92ace5e5c55384b5dad5c101e42c

    SHA256

    01588c10a8f20af255f5d4c6199973371888096e84a659ff21ce337cb82b1df0

    SHA512

    f89ee1e795efea005062e266313b4a8e7a31bb185cf3bae67af35592bda37bb8873e0fea4e539b618f430d0687d790bbc6277fc511ae23e7a88dcd25f39e1249

  • C:\Windows\Temp\asw.d65b98219123eac5\HTMLayout.dll
    Filesize

    4.0MB

    MD5

    4cc6efda014cc654142c97cd09175e37

    SHA1

    9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

    SHA256

    0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

    SHA512

    064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

  • C:\Windows\Temp\asw.d65b98219123eac5\Instup.dll
    Filesize

    18.1MB

    MD5

    e9134948a4db2642f9bfaaf157a18bd0

    SHA1

    98249d941c196e9ee01f5d77713f13a12fff87f4

    SHA256

    67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

    SHA512

    629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

  • C:\Windows\Temp\asw.d65b98219123eac5\Instup.exe
    Filesize

    3.6MB

    MD5

    cb33ee6145c1dfad640103e1bc8b00e9

    SHA1

    e68405536c9501a5f7617636db734a7e7bfdb61c

    SHA256

    068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

    SHA512

    31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

  • C:\Windows\Temp\asw.d65b98219123eac5\New_18050d08\gcapi.dll
    Filesize

    867KB

    MD5

    3ead47f44293e18d66fb32259904197a

    SHA1

    e61e88bd81c05d4678aeb2d62c75dee35a25d16b

    SHA256

    e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

    SHA512

    927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

  • C:\Windows\Temp\asw.d65b98219123eac5\asw0f977a48745d6431.ini
    Filesize

    579B

    MD5

    1d18dda18469601cceaf8cfa17dc0995

    SHA1

    7a1fb3c4f8a94a478e09353a801b54dd2ab2991c

    SHA256

    cf2062a08b4094d77db8b48538711aa74c5c1b6445ee35a81b5aade2d787b17a

    SHA512

    d938dbab54c2f06f128c400707b8d9c6369859057de117b9383be03c233f897e726c8f1b6ce489449d6924d8003c0afdb4a12626d51c4aeb79e9fdecf8afeafa

  • C:\Windows\Temp\asw.d65b98219123eac5\aswfae42d78df235628.ini
    Filesize

    1KB

    MD5

    7b0c84b1dd6e83f387ba730164a01b2f

    SHA1

    224762edcbb09650a439677c67580eebb56f74ce

    SHA256

    a02ecd9d03d54d23f56605f5ccee89ed6ba12110a60c3ab021d951bfd9f13bac

    SHA512

    959dedcb43bff209506eb97e91e319af5ba655821eaebb8eb1e21b7f761ca3151e6081e2eba8df72e35da28f7d30c1edacc5f734063a39e93f05f5077d914080

  • C:\Windows\Temp\asw.d65b98219123eac5\avbugreport_x64_ais-d08.vpx
    Filesize

    4.7MB

    MD5

    ebc2e21a31af7ba94c3a70db0caf23ad

    SHA1

    36a25c19c6becbcf8e1c959458867f59cab774a3

    SHA256

    b1819bf1551be44e0f293f6b6ead1841aacb63ca3a9d90f1a31c9cb52f648c6e

    SHA512

    e777fd82cf1d782e73dc8796c57ecb9be4ed09256af456190ae0e414de651226c3eb616ae4ec1c245e55934843dd85485e0594c0125e013c47b48d89fff5f739

  • C:\Windows\Temp\asw.d65b98219123eac5\avdump_x64_ais-d08.vpx
    Filesize

    3.3MB

    MD5

    c339cfe0485edefebae496b088d41221

    SHA1

    684e4fa30a601ef645293cc5a8b008bbc03b9483

    SHA256

    55ebd9dc7c26877a51e11722d3ea17f1afdf39a30aeda07ef6804659c34e54c4

    SHA512

    c78b4735ed9184219f95a461e97a47d95b60f353ded28d692a72f9c3db2ead081b700731c8b673e8a1ca969519281d8e73cef449d5bb6bcfd282fcd2261f4a5d

  • C:\Windows\Temp\asw.d65b98219123eac5\config.def
    Filesize

    18KB

    MD5

    57668a27b39c5dc639f3b91dc76229e6

    SHA1

    20306491d8a54b40976667edbc688db23f644259

    SHA256

    e30036d31d2a1737db17c4a684a62059cc0aefedc6ebe662e00b0d9c0d94eb2e

    SHA512

    fc0b4049b92566a6401aade7e6a604850823d0ffb6fc54053e7f67a23122dfdc550af706917b09913a51c2db19d725ed93d96e8cd8ec570c2cca9248ea48efe2

  • C:\Windows\Temp\asw.d65b98219123eac5\config.def
    Filesize

    24KB

    MD5

    c3686d574e4ba1c08c17d99ae83a9b9e

    SHA1

    8ad070392d8c3b93e70340d971391af802d2c3ce

    SHA256

    f576452ca5016be2c89616c40bfb7ffa467138465ee17c393a87f2f905ce0ef4

    SHA512

    09b369b5a0ef54a3c142c725eb659d371ec08c6bcb4a4ded9f22c7e075ff7f5633f3f9002b40347f4b8de96acade5adff760e46f408314b204a6258233d3a06e

  • C:\Windows\Temp\asw.d65b98219123eac5\config.def
    Filesize

    18KB

    MD5

    b86dd14aadb9e34d004ad39a4693ced0

    SHA1

    1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

    SHA256

    b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

    SHA512

    03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

  • C:\Windows\Temp\asw.d65b98219123eac5\config.ini
    Filesize

    676B

    MD5

    57f91d0c794431c4521245d3b7aaadea

    SHA1

    90f37bb738630437ced558af0a9e0a8c095978ee

    SHA256

    c819124bd7e8942c6cbea95b2d9d116487665c28cf5f83cf3afa0136d8430af5

    SHA512

    eec44a78ebbce6823ccc2dfddc6d5e941c570bfe135f57f0415ded42f69f40d5ef93dc0ef1958b9f612f13f4a5c526aea61f367cbe8982fd074e5de7a2b3b592

  • C:\Windows\Temp\asw.d65b98219123eac5\offertool_x64_ais-d08.vpx
    Filesize

    2.3MB

    MD5

    993a67fbd5162510a2b0f3fba05bad33

    SHA1

    3c76258240a04c05341e611f55bef10341e34ff3

    SHA256

    0b7c3caa31928131ce0e1ca570aa72e20a98dda13e4ca0c59f31cc677d8e8c6e

    SHA512

    44a335d3db00fa9148066a5f2d2a9f5250d7df2315d132ab2798b02e2d21b700525a00be91d960e1564a6ffc0ee95347f0df9ffc27a10cf807d5a926ab5154a3

  • C:\Windows\Temp\asw.d65b98219123eac5\part-jrog2-79.vpx
    Filesize

    211B

    MD5

    aa442786f758e5ad442aea88d6cf6124

    SHA1

    6c464722d20d261a155e2c5f6105cd8a4f0e5c21

    SHA256

    ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

    SHA512

    add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

  • C:\Windows\Temp\asw.d65b98219123eac5\part-prg_ais-18050d08.vpx
    Filesize

    73KB

    MD5

    d264bf74d7ffcbad341d9fcefa4893bb

    SHA1

    c7e9a0972524fa573825865c46eb6728d3e219e0

    SHA256

    4b01a68078d7e1af1c0197baddbbb1ef4d3cbf13f71e8b9df766f88b4e6d8025

    SHA512

    afbfdf6fdeb5dc427340de691726e79cb5bcc41bd488c557c684efe3f26d83a17f1118cc50bd64541a9a839d3dd4329a72a9423e65d3e9cdcfbd14003f1e0dc3

  • C:\Windows\Temp\asw.d65b98219123eac5\part-setup_ais-18050d08.vpx
    Filesize

    4KB

    MD5

    0344288a18997069003d84c226a168f9

    SHA1

    0fe47920601834e620737ad321fbb24d38c7ee94

    SHA256

    675bd92f752a51bd7d9797895252b3130095a06d7d5db8f221ab6251735ead8d

    SHA512

    b1680ef42d7e2e56fbb124c91da27f15e6c946450c7d03d95b937c3cde80dbc2260e11926578075df255058c2307058429fd2f7307fc0a105c775a9b8aa82429

  • C:\Windows\Temp\asw.d65b98219123eac5\part-vps_windows-24061199.vpx
    Filesize

    7KB

    MD5

    91760dd268918f34d5035b70231c6662

    SHA1

    c244a869726ab00bc674ea81970ddc739f240426

    SHA256

    60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

    SHA512

    30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

  • C:\Windows\Temp\asw.d65b98219123eac5\prod-pgm.vpx
    Filesize

    572B

    MD5

    6d08ac0131cac7a2f9f2ea5d9d0b0cc6

    SHA1

    25983c1419089c6a7570963dda2d06e022b3b36d

    SHA256

    846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

    SHA512

    753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

  • C:\Windows\Temp\asw.d65b98219123eac5\prod-vps.vpx
    Filesize

    343B

    MD5

    b516373c4f4f0bd98bbbcd71b4022e4d

    SHA1

    fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

    SHA256

    52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

    SHA512

    b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

  • C:\Windows\Temp\asw.d65b98219123eac5\prod-vps.vpx
    Filesize

    340B

    MD5

    a6aa5195417c52019dac2ea520161d70

    SHA1

    3867f26e50214fbef5698dcea3840ba6c35ab23b

    SHA256

    b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

    SHA512

    6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

  • C:\Windows\Temp\asw.d65b98219123eac5\sbr_x64_ais-d08.vpx
    Filesize

    19KB

    MD5

    ebd5c38aa827d9777dcde81e2a037b6f

    SHA1

    740eee39569863c6baa780e7d82c848c92abe0c1

    SHA256

    7fd358eddcef6756f315fec2bfad52286402f7194104fcfd3dcec7d588597025

    SHA512

    fc22fff31b6e84297af9769b84142960e45bf9d8b71e9039e3829be9c671fc173dd47c88c25807f3e7bca0b87f842de500f5227e21ed312bfae2e89d0b65ff0d

  • C:\Windows\Temp\asw.d65b98219123eac5\servers.def
    Filesize

    27KB

    MD5

    2b62fb1ecd174c7e951f2b8af502c1c0

    SHA1

    90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

    SHA256

    1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

    SHA512

    0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

  • C:\Windows\Temp\asw.d65b98219123eac5\servers.def.vpx
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Windows\Temp\asw.d65b98219123eac5\servers.def.vpx
    Filesize

    1KB

    MD5

    ca027a5ef5f6d21d7e42855fa4db4120

    SHA1

    eee669fe1c3cabd5f96c65ac992e4851f8eca9da

    SHA256

    e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

    SHA512

    8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

  • C:\Windows\Temp\asw.d65b98219123eac5\setup.def
    Filesize

    38KB

    MD5

    49474897d267894daa13e9dcb168793d

    SHA1

    10331de148bb89ecc6e1af25bd3b0a862dd2b4eb

    SHA256

    0b9aedce74468150c054d27649dad8f98109e537a581649be6668a13cd29e6a7

    SHA512

    687dfcfdff27d8be7fa2b7a277a6bd269bf719ca12bf5e7f38643582785032cb8b0e11c04180736dfa56c2b10a12e10c10e50427ceacf6d6332125ebf65eb9da

  • C:\Windows\Temp\asw.d65b98219123eac5\uat64.dll
    Filesize

    29KB

    MD5

    c53dc6d8050e08d12939b95e2f5c53dc

    SHA1

    01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

    SHA256

    5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

    SHA512

    75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

  • C:\Windows\Temp\asw.d65b98219123eac5\uat64.vpx
    Filesize

    16KB

    MD5

    bd33707a5e0b6cc434fbaa32e69cb30a

    SHA1

    34ddc8fbda6acef9e07de571d4c00e65e3c09958

    SHA256

    bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

    SHA512

    02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de