Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe
Resource
win10v2004-20240226-en
General
-
Target
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe
-
Size
213KB
-
MD5
4b6cd7d1f8b623b7d4062381ac510af0
-
SHA1
f7f4474c54956cf7a5c96e18d463d2ece3387601
-
SHA256
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54
-
SHA512
39dfbdecca379a7b8b8e8664aec37373001762e3c7835f5e38a03d120bb0153418f0b174376663431b330db34b7c916c7629e4d93d2ece7ecbc05a0962e46cd0
-
SSDEEP
3072:0XmpEjKskbJVtkJZ6izF0ZR+83mKC0Vffe1LU6V17LVVaq/X0XWWPthhoJO0K4XJ:0IEjMxkf6iw+8WKCOff2HVpVFnvK4H1f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exepid process 2708 avg_antivirus_free_setup_x64.exe 1372 2804 instup.exe 1716 instup.exe 1988 aswOfferTool.exe 1308 aswOfferTool.exe 2436 aswOfferTool.exe 1476 aswOfferTool.exe 2500 aswOfferTool.exe -
Loads dropped DLL 30 IoCs
Processes:
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exeavg_antivirus_free_setup_x64.exeinstup.exeinstup.exeaswOfferTool.exeaswOfferTool.exepid process 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2708 avg_antivirus_free_setup_x64.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 2804 instup.exe 1716 instup.exe 2436 aswOfferTool.exe 2500 aswOfferTool.exe -
Checks for any installed AV software in registry 1 TTPs 5 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus instup.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
instup.exe8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exeavg_antivirus_free_setup_x64.exeinstup.exedescription ioc process File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_setup_x64.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avg_antivirus_free_setup_x64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avg_antivirus_free_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel instup.exe -
Modifies registry class 64 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "100" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "13" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "4" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "80" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "72" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "27" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "28" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "50" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "90" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "59" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "74" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: avdump_x86_ais-c62.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: setgui_x64_ais-c62.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "85" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "85" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "19" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "26" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "34" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "83" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "88" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Checking install conditions" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "37" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "14" avg_antivirus_free_setup_x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: part-setup_ais-15020c62.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "69" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "64" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "68" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Replacing files" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "95" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: instup.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "91" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "75" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "38" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "64" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "52" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "14" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "53" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "24" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: sbr.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "15" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "71" avg_antivirus_free_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "77" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "41" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "80" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "22" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "95" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "23" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "71" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "33" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "43" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "11" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "92" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "48" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "49" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "8" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "64" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "79" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "4" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "68" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "51" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "39" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "87" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: avbugreport_x64_ais" instup.exe -
Processes:
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exeinstup.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C instup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exepid process 2708 avg_antivirus_free_setup_x64.exe 1716 instup.exe 1716 instup.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
avg_antivirus_free_setup_x64.exeinstup.exeinstup.exeaswOfferTool.exedescription pid process Token: 32 2708 avg_antivirus_free_setup_x64.exe Token: SeDebugPrivilege 2804 instup.exe Token: 32 2804 instup.exe Token: 32 1716 instup.exe Token: SeDebugPrivilege 1716 instup.exe Token: SeDebugPrivilege 1476 aswOfferTool.exe Token: SeImpersonatePrivilege 1476 aswOfferTool.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
instup.exeinstup.exepid process 2804 instup.exe 1716 instup.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exeavg_antivirus_free_setup_x64.exeinstup.exeinstup.exedescription pid process target process PID 2360 wrote to memory of 2708 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe avg_antivirus_free_setup_x64.exe PID 2360 wrote to memory of 2708 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe avg_antivirus_free_setup_x64.exe PID 2360 wrote to memory of 2708 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe avg_antivirus_free_setup_x64.exe PID 2360 wrote to memory of 2708 2360 8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe avg_antivirus_free_setup_x64.exe PID 2708 wrote to memory of 2804 2708 avg_antivirus_free_setup_x64.exe instup.exe PID 2708 wrote to memory of 2804 2708 avg_antivirus_free_setup_x64.exe instup.exe PID 2708 wrote to memory of 2804 2708 avg_antivirus_free_setup_x64.exe instup.exe PID 2804 wrote to memory of 1716 2804 instup.exe instup.exe PID 2804 wrote to memory of 1716 2804 instup.exe instup.exe PID 2804 wrote to memory of 1716 2804 instup.exe instup.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1988 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1308 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 2436 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe PID 1716 wrote to memory of 1476 1716 instup.exe aswOfferTool.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe"C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exe"C:\Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_008_999_a3d_m /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc22⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\instup.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.3b7a22dd5843baa3 /edition:15 /prod:ais /stub_context:947b8548-3bc4-4f03-8a09-774d709728bb:9994552 /guid:bd196328-0826-4a52-8418-14a1f888c63d /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /cookie:mmm_bav_008_999_a3d_m /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc23⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\instup.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.3b7a22dd5843baa3 /edition:15 /prod:ais /stub_context:947b8548-3bc4-4f03-8a09-774d709728bb:9994552 /guid:bd196328-0826-4a52-8418-14a1f888c63d /ga_clientid:fc34235b-fa61-4e08-980c-4ad35db92554 /cookie:mmm_bav_008_999_a3d_m /edat_dir:C:\Windows\Temp\asw.1e05f472db9c2fc2 /online_installer4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated5⤵
- Executes dropped EXE
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" /check_secure_browser5⤵
- Executes dropped EXE
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA6⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.logFilesize
1KB
MD5680136d396fea353007db40d762e286c
SHA17fe1d7b7ecd6a1b42b88f35f8dc8b299242b8dc2
SHA25655df8b63e0622b816546c3df190b10ca7d9d74b362761ba273ea0ac4f5952b27
SHA512cbea8f8636e7e3e50dc88f791b41174a325ccc3f9499db79b167a4504db00f6e5ecda66068ec28f37b9b8cf08d444a37f9c32af813a21723cf2bccd7edcfdcf4
-
C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.logFilesize
27KB
MD52721864dd39022c663ad309113a877b1
SHA118f4ba172603ca9ab9adc8677768e1499536bd2a
SHA256a61ef7e9eca2923e3f93be90890ae5eb4a344aadb15904bfa6ed2e690155bf12
SHA51273b2c1f3fe318c0d210a0ae5961f1166e4f88a85f47f76865c2f8f8f2fc0f49cea8555e4ed088235a90c23356caae592869f5d86a8470e4bb231af40f2e000cb
-
C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.logFilesize
142B
MD554bd69da4e442116bc6329fe6a2650d8
SHA1c925d125abc731d3651498dc7f7330662fabc423
SHA25655df8ef45c04066f8a029982da2f47bf69d47c470f30a73b1612909b6be90ad0
SHA5122e2b65a51c04144387e0accef646bbbf00b3473e15e358c7f440f1b577e19b805306534b7fff64a0f77c5c779e02eccd9b809a64f5fafdab6dbe0995bdcf6a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD523e5d60ba1f71c1a0ed6aaa1a6bf3a70
SHA1386814345168c20a260b067e776b789602241804
SHA25657e83a333a6443064ff80501fb212201ac0ccfed723db2369d9d364963fffdbc
SHA512592205d77eed787f0e127932e76553bdfe7bc2526954fab37e9b076affbcaba495872b0c3e35977caf859f2ae6951de0688f826e0caf228d6711bbe8a3941a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD567cfb67fa27b6238e80aa24c0705e3f8
SHA10c89328ddb1bca557265864ebb103131218c1bb8
SHA256ba2a5623db74324ed90b6cd18ef3e20e831a9f38c20161b717e785abf20015f7
SHA512441e7e5719607cae68611967822454a8d6d454dfbfccc9e53f1ac15b7cc3c1a9cdf03f113a1cbb8594d984cd3171aa72427a054de5e6a40105cfc2c4ecf7dcd8
-
C:\Users\Admin\AppData\Local\Temp\Tar2D0C.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Windows\Temp\asw.1e05f472db9c2fc2\ecoo.edatFilesize
21B
MD59e9fd0acc3b9c02effd90773c17e186a
SHA151c51677e335176cc78e0de556bc127a9da1d72f
SHA2560a9e9728a7bef88ead70a1bc562ca9ba32bba1988a34da0b64bfb3d9b1e59d49
SHA5127e1e600e929572ff9209a9c6a8ea8d7fa2239cfd99c509b4670c9915b6d013cbff5671a8250ce29db58fb63336e91b1bbfb3af6dee0d8a5588d807b3b651f6e2
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\HTMLayout.dllFilesize
4.0MB
MD54cc6efda014cc654142c97cd09175e37
SHA19ff80f73eb8aa9563ee04f3857fedbb4167a9a2a
SHA2560ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2
SHA512064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\Instup.dllFilesize
18.1MB
MD5e9134948a4db2642f9bfaaf157a18bd0
SHA198249d941c196e9ee01f5d77713f13a12fff87f4
SHA25667721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a
SHA512629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\Instup.exeFilesize
3.6MB
MD5cb33ee6145c1dfad640103e1bc8b00e9
SHA1e68405536c9501a5f7617636db734a7e7bfdb61c
SHA256068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac
SHA51231608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw1e97403a3190f8fd.tmpFilesize
907KB
MD543dc9e69f1e9db4059cf49a5e825cfda
SHA1519298f8a681b41d2d70db2670cc7543f1ee6da4
SHA25698efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d
SHA512d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw24c71cf3244c3853.tmpFilesize
3.8MB
MD50b830444a6ef848fb85bfbb173bb6076
SHA127964cc1673ddb68ca3da8018f0e13e9a141605e
SHA25663f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f
SHA51231655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw3fc71f0d082401cc.tmpFilesize
15KB
MD5e38cc92cd980a55d811316ac62883e14
SHA1fa83737abe11ee825c3da6843cc4d8e3b459729a
SHA256be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87
SHA5121422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\asw999ad513420fc65f.tmpFilesize
3.1MB
MD5c545527e69a46359a4a45f58794a0fe5
SHA1e233e5837bfe5d1429300fb33f12f5b54689781b
SHA2568d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9
SHA512754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswa143601e6ef4a994.tmpFilesize
4.5MB
MD5bbb61ad0f20d3fe17a5227c13f09e82d
SHA101700413fc5470aa0ba29aa1a962d7a719a92a82
SHA25639154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e
SHA512c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswd56dd784bee78be3.tmpFilesize
19.1MB
MD5917a284494cbe4a4ec85e1ec768339c9
SHA147ccc0a04ecc7c3c1ff79bf42d424cfda356137c
SHA25657cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772
SHA51290849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\aswe6ff16d837a4af69.tmpFilesize
831KB
MD5ce4d45d0b684f591d5a83fdbd99bd306
SHA1e89637b905c37033950afadaca2161bd5b09fb5e
SHA256907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7
SHA512af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\config.defFilesize
18KB
MD51f176486131d1f922129c3c8f5142595
SHA1f89ab25d06c895bdd62de23856a7ff1f109ad0dd
SHA256421e5a406f20b5b4109bdfd520748dd5febf3e25847838d9ae21529cde182e9b
SHA512c70b02abda87b18e4d5413f1fda9ea2dc46f30542a0333058958296d7b0de916ae0ecbfd5f47d01bdfce4993f6eb4d0b63e30d8e1cfc3fe67f8f2cb2bb3e5eff
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\config.defFilesize
23KB
MD5d37f3e7a184ce2af6634db25fa35b567
SHA17eaf01729078ab7312aedc6aba771d66a9877448
SHA25684b4c85165488c472c5300471a368d01049cd1ae43b1adc5ec643fd17b6b2a33
SHA512402e3ced0a61d3a48aba3e7d7aeea32eae4cfa74c1b338b13dfd1ef28e21f72a1c33296930b76c70c2fd594345893506da0141dd0c77a43c7d04e84f83296730
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\config.defFilesize
18KB
MD5b86dd14aadb9e34d004ad39a4693ced0
SHA11cb7775cee3e4106b2ddba89a0ccdc9dd547c521
SHA256b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878
SHA51203cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\config.iniFilesize
669B
MD5a593b0abb6a7ce9f2ae3b04a7d5814e8
SHA10c8f11e31b907b3ca428fe24cb48ce0674a7e7ba
SHA256bd50b6d9ac7f90340f74968e05a994c6559843ce12680c831e2f4a5692e8354a
SHA512325473040cb34af0c3e678f153dfac24cb46944ba90705e9b1516476235d91770150b5ddc30865bd87b3e0e552f9faba65b85569a20f2dcee40410cc8414a2e2
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\part-jrog2-79.vpxFilesize
211B
MD5aa442786f758e5ad442aea88d6cf6124
SHA16c464722d20d261a155e2c5f6105cd8a4f0e5c21
SHA256ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b
SHA512add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\part-prg_ais-15020c62.vpxFilesize
175KB
MD529b9bfd25fabf42939e3a6877f9b3ece
SHA1c30d865bc2d680311c68eb0bed0e356845f700f9
SHA256ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475
SHA512a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\part-setup_ais-15020c62.vpxFilesize
5KB
MD5d5b798d8816b252e7d718195dfeb8a8c
SHA1860c5807fd491aeeb12d661d8cf2ecca4ca1639b
SHA25675176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499
SHA51216cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\part-vps_windows-24061199.vpxFilesize
7KB
MD591760dd268918f34d5035b70231c6662
SHA1c244a869726ab00bc674ea81970ddc739f240426
SHA25660cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a
SHA51230f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-pgm.vpxFilesize
572B
MD56d08ac0131cac7a2f9f2ea5d9d0b0cc6
SHA125983c1419089c6a7570963dda2d06e022b3b36d
SHA256846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f
SHA512753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-vps.vpxFilesize
343B
MD5b516373c4f4f0bd98bbbcd71b4022e4d
SHA1fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062
SHA25652e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099
SHA512b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\prod-vps.vpxFilesize
340B
MD5a6aa5195417c52019dac2ea520161d70
SHA13867f26e50214fbef5698dcea3840ba6c35ab23b
SHA256b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92
SHA5126986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.defFilesize
27KB
MD52b62fb1ecd174c7e951f2b8af502c1c0
SHA190744a9355dd5b74d2ecc7ee34fccbeca1c18f1b
SHA2561fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67
SHA5120f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.def.vpxMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\servers.def.vpxFilesize
1KB
MD5ca027a5ef5f6d21d7e42855fa4db4120
SHA1eee669fe1c3cabd5f96c65ac992e4851f8eca9da
SHA256e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d
SHA5128dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\setup.defFilesize
37KB
MD53fc9d055795a4c01893e5661f300c513
SHA129c64165afecea436a2dcb57dd5b54163a002df4
SHA256425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0
SHA512e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902
-
C:\Windows\Temp\asw.3b7a22dd5843baa3\uat64.vpxFilesize
16KB
MD5bd33707a5e0b6cc434fbaa32e69cb30a
SHA134ddc8fbda6acef9e07de571d4c00e65e3c09958
SHA256bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036
SHA51202b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de
-
\Windows\Temp\asw.1e05f472db9c2fc2\avg_antivirus_free_setup_x64.exeFilesize
9.5MB
MD572c1cad77d7a37f6eed6606b00b22738
SHA11883d039f42ead5318de8f5f37b61bad4b61fa72
SHA25647cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3
SHA51287104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209
-
\Windows\Temp\asw.3b7a22dd5843baa3\New_15020c62\gcapi_17181893972436.dllFilesize
348KB
MD52973af8515effd0a3bfc7a43b03b3fcc
SHA14209cded0caac7c5cb07bcb29f1ee0dc5ac211ee
SHA256d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0
SHA512b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e
-
\Windows\Temp\asw.3b7a22dd5843baa3\uat64.dllFilesize
29KB
MD5c53dc6d8050e08d12939b95e2f5c53dc
SHA101f3fd1a4c730cad939d243e6bb8f9fe8f1e0138
SHA2565a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece
SHA51275ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a
-
memory/1716-376-0x000007FEF3530000-0x000007FEF390A000-memory.dmpFilesize
3.9MB
-
memory/1716-375-0x000007FEF3910000-0x000007FEF4C36000-memory.dmpFilesize
19.1MB
-
memory/1716-387-0x000007FEF3910000-0x000007FEF4C36000-memory.dmpFilesize
19.1MB
-
memory/1716-389-0x000007FEF3910000-0x000007FEF4C36000-memory.dmpFilesize
19.1MB
-
memory/1716-394-0x000007FEF3530000-0x000007FEF390A000-memory.dmpFilesize
3.9MB