Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 10:49

General

  • Target

    8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe

  • Size

    213KB

  • MD5

    4b6cd7d1f8b623b7d4062381ac510af0

  • SHA1

    f7f4474c54956cf7a5c96e18d463d2ece3387601

  • SHA256

    8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54

  • SHA512

    39dfbdecca379a7b8b8e8664aec37373001762e3c7835f5e38a03d120bb0153418f0b174376663431b330db34b7c916c7629e4d93d2ece7ecbc05a0962e46cd0

  • SSDEEP

    3072:0XmpEjKskbJVtkJZ6izF0ZR+83mKC0Vffe1LU6V17LVVaq/X0XWWPthhoJO0K4XJ:0IEjMxkf6iw+8WKCOff2HVpVFnvK4H1f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 30 IoCs
  • Checks for any installed AV software in registry 1 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe
    "C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_008_999_a3d_m /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\Temp\asw.3b7a22dd5843baa3\instup.exe
        "C:\Windows\Temp\asw.3b7a22dd5843baa3\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.3b7a22dd5843baa3 /edition:15 /prod:ais /stub_context:947b8548-3bc4-4f03-8a09-774d709728bb:9994552 /guid:bd196328-0826-4a52-8418-14a1f888c63d /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /cookie:mmm_bav_008_999_a3d_m /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\instup.exe
          "C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.3b7a22dd5843baa3 /edition:15 /prod:ais /stub_context:947b8548-3bc4-4f03-8a09-774d709728bb:9994552 /guid:bd196328-0826-4a52-8418-14a1f888c63d /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /cookie:mmm_bav_008_999_a3d_m /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc2 /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:1988
          • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:1308
          • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2436
          • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1476
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2500

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    1KB

    MD5

    680136d396fea353007db40d762e286c

    SHA1

    7fe1d7b7ecd6a1b42b88f35f8dc8b299242b8dc2

    SHA256

    55df8b63e0622b816546c3df190b10ca7d9d74b362761ba273ea0ac4f5952b27

    SHA512

    cbea8f8636e7e3e50dc88f791b41174a325ccc3f9499db79b167a4504db00f6e5ecda66068ec28f37b9b8cf08d444a37f9c32af813a21723cf2bccd7edcfdcf4

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    27KB

    MD5

    2721864dd39022c663ad309113a877b1

    SHA1

    18f4ba172603ca9ab9adc8677768e1499536bd2a

    SHA256

    a61ef7e9eca2923e3f93be90890ae5eb4a344aadb15904bfa6ed2e690155bf12

    SHA512

    73b2c1f3fe318c0d210a0ae5961f1166e4f88a85f47f76865c2f8f8f2fc0f49cea8555e4ed088235a90c23356caae592869f5d86a8470e4bb231af40f2e000cb

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
    Filesize

    142B

    MD5

    54bd69da4e442116bc6329fe6a2650d8

    SHA1

    c925d125abc731d3651498dc7f7330662fabc423

    SHA256

    55df8ef45c04066f8a029982da2f47bf69d47c470f30a73b1612909b6be90ad0

    SHA512

    2e2b65a51c04144387e0accef646bbbf00b3473e15e358c7f440f1b577e19b805306534b7fff64a0f77c5c779e02eccd9b809a64f5fafdab6dbe0995bdcf6a0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    23e5d60ba1f71c1a0ed6aaa1a6bf3a70

    SHA1

    386814345168c20a260b067e776b789602241804

    SHA256

    57e83a333a6443064ff80501fb212201ac0ccfed723db2369d9d364963fffdbc

    SHA512

    592205d77eed787f0e127932e76553bdfe7bc2526954fab37e9b076affbcaba495872b0c3e35977caf859f2ae6951de0688f826e0caf228d6711bbe8a3941a08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    67cfb67fa27b6238e80aa24c0705e3f8

    SHA1

    0c89328ddb1bca557265864ebb103131218c1bb8

    SHA256

    ba2a5623db74324ed90b6cd18ef3e20e831a9f38c20161b717e785abf20015f7

    SHA512

    441e7e5719607cae68611967822454a8d6d454dfbfccc9e53f1ac15b7cc3c1a9cdf03f113a1cbb8594d984cd3171aa72427a054de5e6a40105cfc2c4ecf7dcd8

  • C:\Users\Admin\AppData\Local\Temp\Tar2D0C.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Temp\asw.1e05f472db9c2fc2\ecoo.edat
    Filesize

    21B

    MD5

    9e9fd0acc3b9c02effd90773c17e186a

    SHA1

    51c51677e335176cc78e0de556bc127a9da1d72f

    SHA256

    0a9e9728a7bef88ead70a1bc562ca9ba32bba1988a34da0b64bfb3d9b1e59d49

    SHA512

    7e1e600e929572ff9209a9c6a8ea8d7fa2239cfd99c509b4670c9915b6d013cbff5671a8250ce29db58fb63336e91b1bbfb3af6dee0d8a5588d807b3b651f6e2

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\HTMLayout.dll
    Filesize

    4.0MB

    MD5

    4cc6efda014cc654142c97cd09175e37

    SHA1

    9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

    SHA256

    0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

    SHA512

    064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\Instup.dll
    Filesize

    18.1MB

    MD5

    e9134948a4db2642f9bfaaf157a18bd0

    SHA1

    98249d941c196e9ee01f5d77713f13a12fff87f4

    SHA256

    67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

    SHA512

    629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\Instup.exe
    Filesize

    3.6MB

    MD5

    cb33ee6145c1dfad640103e1bc8b00e9

    SHA1

    e68405536c9501a5f7617636db734a7e7bfdb61c

    SHA256

    068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

    SHA512

    31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw1e97403a3190f8fd.tmp
    Filesize

    907KB

    MD5

    43dc9e69f1e9db4059cf49a5e825cfda

    SHA1

    519298f8a681b41d2d70db2670cc7543f1ee6da4

    SHA256

    98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

    SHA512

    d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw24c71cf3244c3853.tmp
    Filesize

    3.8MB

    MD5

    0b830444a6ef848fb85bfbb173bb6076

    SHA1

    27964cc1673ddb68ca3da8018f0e13e9a141605e

    SHA256

    63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

    SHA512

    31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw3fc71f0d082401cc.tmp
    Filesize

    15KB

    MD5

    e38cc92cd980a55d811316ac62883e14

    SHA1

    fa83737abe11ee825c3da6843cc4d8e3b459729a

    SHA256

    be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

    SHA512

    1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw999ad513420fc65f.tmp
    Filesize

    3.1MB

    MD5

    c545527e69a46359a4a45f58794a0fe5

    SHA1

    e233e5837bfe5d1429300fb33f12f5b54689781b

    SHA256

    8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

    SHA512

    754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswa143601e6ef4a994.tmp
    Filesize

    4.5MB

    MD5

    bbb61ad0f20d3fe17a5227c13f09e82d

    SHA1

    01700413fc5470aa0ba29aa1a962d7a719a92a82

    SHA256

    39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

    SHA512

    c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswd56dd784bee78be3.tmp
    Filesize

    19.1MB

    MD5

    917a284494cbe4a4ec85e1ec768339c9

    SHA1

    47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

    SHA256

    57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

    SHA512

    90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswe6ff16d837a4af69.tmp
    Filesize

    831KB

    MD5

    ce4d45d0b684f591d5a83fdbd99bd306

    SHA1

    e89637b905c37033950afadaca2161bd5b09fb5e

    SHA256

    907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7

    SHA512

    af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\config.def
    Filesize

    18KB

    MD5

    1f176486131d1f922129c3c8f5142595

    SHA1

    f89ab25d06c895bdd62de23856a7ff1f109ad0dd

    SHA256

    421e5a406f20b5b4109bdfd520748dd5febf3e25847838d9ae21529cde182e9b

    SHA512

    c70b02abda87b18e4d5413f1fda9ea2dc46f30542a0333058958296d7b0de916ae0ecbfd5f47d01bdfce4993f6eb4d0b63e30d8e1cfc3fe67f8f2cb2bb3e5eff

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\config.def
    Filesize

    23KB

    MD5

    d37f3e7a184ce2af6634db25fa35b567

    SHA1

    7eaf01729078ab7312aedc6aba771d66a9877448

    SHA256

    84b4c85165488c472c5300471a368d01049cd1ae43b1adc5ec643fd17b6b2a33

    SHA512

    402e3ced0a61d3a48aba3e7d7aeea32eae4cfa74c1b338b13dfd1ef28e21f72a1c33296930b76c70c2fd594345893506da0141dd0c77a43c7d04e84f83296730

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\config.def
    Filesize

    18KB

    MD5

    b86dd14aadb9e34d004ad39a4693ced0

    SHA1

    1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

    SHA256

    b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

    SHA512

    03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\config.ini
    Filesize

    669B

    MD5

    a593b0abb6a7ce9f2ae3b04a7d5814e8

    SHA1

    0c8f11e31b907b3ca428fe24cb48ce0674a7e7ba

    SHA256

    bd50b6d9ac7f90340f74968e05a994c6559843ce12680c831e2f4a5692e8354a

    SHA512

    325473040cb34af0c3e678f153dfac24cb46944ba90705e9b1516476235d91770150b5ddc30865bd87b3e0e552f9faba65b85569a20f2dcee40410cc8414a2e2

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\part-jrog2-79.vpx
    Filesize

    211B

    MD5

    aa442786f758e5ad442aea88d6cf6124

    SHA1

    6c464722d20d261a155e2c5f6105cd8a4f0e5c21

    SHA256

    ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

    SHA512

    add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\part-prg_ais-15020c62.vpx
    Filesize

    175KB

    MD5

    29b9bfd25fabf42939e3a6877f9b3ece

    SHA1

    c30d865bc2d680311c68eb0bed0e356845f700f9

    SHA256

    ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475

    SHA512

    a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\part-setup_ais-15020c62.vpx
    Filesize

    5KB

    MD5

    d5b798d8816b252e7d718195dfeb8a8c

    SHA1

    860c5807fd491aeeb12d661d8cf2ecca4ca1639b

    SHA256

    75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

    SHA512

    16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\part-vps_windows-24061199.vpx
    Filesize

    7KB

    MD5

    91760dd268918f34d5035b70231c6662

    SHA1

    c244a869726ab00bc674ea81970ddc739f240426

    SHA256

    60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

    SHA512

    30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-pgm.vpx
    Filesize

    572B

    MD5

    6d08ac0131cac7a2f9f2ea5d9d0b0cc6

    SHA1

    25983c1419089c6a7570963dda2d06e022b3b36d

    SHA256

    846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

    SHA512

    753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-vps.vpx
    Filesize

    343B

    MD5

    b516373c4f4f0bd98bbbcd71b4022e4d

    SHA1

    fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

    SHA256

    52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

    SHA512

    b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-vps.vpx
    Filesize

    340B

    MD5

    a6aa5195417c52019dac2ea520161d70

    SHA1

    3867f26e50214fbef5698dcea3840ba6c35ab23b

    SHA256

    b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

    SHA512

    6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.def
    Filesize

    27KB

    MD5

    2b62fb1ecd174c7e951f2b8af502c1c0

    SHA1

    90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

    SHA256

    1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

    SHA512

    0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.def.vpx
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.def.vpx
    Filesize

    1KB

    MD5

    ca027a5ef5f6d21d7e42855fa4db4120

    SHA1

    eee669fe1c3cabd5f96c65ac992e4851f8eca9da

    SHA256

    e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

    SHA512

    8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\setup.def
    Filesize

    37KB

    MD5

    3fc9d055795a4c01893e5661f300c513

    SHA1

    29c64165afecea436a2dcb57dd5b54163a002df4

    SHA256

    425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0

    SHA512

    e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902

  • C:\Windows\Temp\asw.3b7a22dd5843baa3\uat64.vpx
    Filesize

    16KB

    MD5

    bd33707a5e0b6cc434fbaa32e69cb30a

    SHA1

    34ddc8fbda6acef9e07de571d4c00e65e3c09958

    SHA256

    bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

    SHA512

    02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

  • \Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exe
    Filesize

    9.5MB

    MD5

    72c1cad77d7a37f6eed6606b00b22738

    SHA1

    1883d039f42ead5318de8f5f37b61bad4b61fa72

    SHA256

    47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

    SHA512

    87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

  • \Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\gcapi_17181893972436.dll
    Filesize

    348KB

    MD5

    2973af8515effd0a3bfc7a43b03b3fcc

    SHA1

    4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

    SHA256

    d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

    SHA512

    b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

  • \Windows\Temp\asw.3b7a22dd5843baa3\uat64.dll
    Filesize

    29KB

    MD5

    c53dc6d8050e08d12939b95e2f5c53dc

    SHA1

    01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

    SHA256

    5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

    SHA512

    75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

  • memory/1716-376-0x000007FEF3530000-0x000007FEF390A000-memory.dmp
    Filesize

    3.9MB

  • memory/1716-375-0x000007FEF3910000-0x000007FEF4C36000-memory.dmp
    Filesize

    19.1MB

  • memory/1716-387-0x000007FEF3910000-0x000007FEF4C36000-memory.dmp
    Filesize

    19.1MB

  • memory/1716-389-0x000007FEF3910000-0x000007FEF4C36000-memory.dmp
    Filesize

    19.1MB

  • memory/1716-394-0x000007FEF3530000-0x000007FEF390A000-memory.dmp
    Filesize

    3.9MB