Analysis

  • max time kernel
    154s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 10:49

General

  • Target

    8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe

  • Size

    213KB

  • MD5

    4b6cd7d1f8b623b7d4062381ac510af0

  • SHA1

    f7f4474c54956cf7a5c96e18d463d2ece3387601

  • SHA256

    8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54

  • SHA512

    39dfbdecca379a7b8b8e8664aec37373001762e3c7835f5e38a03d120bb0153418f0b174376663431b330db34b7c916c7629e4d93d2ece7ecbc05a0962e46cd0

  • SSDEEP

    3072:0XmpEjKskbJVtkJZ6izF0ZR+83mKC0Vffe1LU6V17LVVaq/X0XWWPthhoJO0K4XJ:0IEjMxkf6iw+8WKCOff2HVpVFnvK4H1f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe
    "C:\Users\Admin\AppData\Local\Temp\8fde1eef3298d6a21674fd431a86a274b8b6a6e69ab48c544f7c6b81a9d90c54.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\Temp\asw.3dbe7bc8f74d39d9\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.3dbe7bc8f74d39d9\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_008_999_a3d_m /ga_clientid:4968377b-df69-4fd6-b6b4-7459a35e79d6 /edat_dir:C:\Windows\Temp\asw.3dbe7bc8f74d39d9
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Windows\Temp\asw.27b4f6f51ec9ea16\instup.exe
        "C:\Windows\Temp\asw.27b4f6f51ec9ea16\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.27b4f6f51ec9ea16 /edition:15 /prod:ais /stub_context:70cbe4dc-66a0-4a5e-bf01-e63c3228f6b3:9994552 /guid:b8b6d9cd-ac8c-4f97-a570-6f5ca1f1ce69 /ga_clientid:4968377b-df69-4fd6-b6b4-7459a35e79d6 /cookie:mmm_bav_008_999_a3d_m /ga_clientid:4968377b-df69-4fd6-b6b4-7459a35e79d6 /edat_dir:C:\Windows\Temp\asw.3dbe7bc8f74d39d9
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\instup.exe
          "C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.27b4f6f51ec9ea16 /edition:15 /prod:ais /stub_context:70cbe4dc-66a0-4a5e-bf01-e63c3228f6b3:9994552 /guid:b8b6d9cd-ac8c-4f97-a570-6f5ca1f1ce69 /ga_clientid:4968377b-df69-4fd6-b6b4-7459a35e79d6 /cookie:mmm_bav_008_999_a3d_m /edat_dir:C:\Windows\Temp\asw.3dbe7bc8f74d39d9 /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3464
          • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:3980
          • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:4100
          • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2940
          • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3400
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:996
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4352 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1952

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Defense Evasion

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    Software Discovery

    1
    T1518

    Security Software Discovery

    1
    T1518.001

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
      Filesize

      27KB

      MD5

      79b77777e1f6084d1e9b9a32482d7c14

      SHA1

      21a27eafa57b1457774a7339cbf590997bcfe90a

      SHA256

      f4dc50a202bc0021f6618e2c6fd87e46f6983d1676249d0ab3e91f078894fe74

      SHA512

      dffa705d0f6301ff49a3144f9466d01cbf0571e532568983bc996f706ad48ad09adaf819bd3fb31ce740daa85efd1fe53935208cd17e6076eda848be741dfb5b

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
      Filesize

      1KB

      MD5

      daf6081034b95fcb61e1c4480db9b4c7

      SHA1

      e73d72ac418e67f136e762f9abc03b67dd344ec6

      SHA256

      397c9de084062b7e603f8a236feb3ca9d5ca8d637c7b5269ce67f7a135db9873

      SHA512

      3fdb573888c33a65e48b48bb35abe47b3a97b712ebf01db3ecb2432ec40f2c4ccdc97713a71355665f4f4175e7a66f35400b33c10969fe22d942313855923a2f

    • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
      Filesize

      281B

      MD5

      0a0c6c22cc7fd905584af4acdd47201c

      SHA1

      13651976cef102d6e94a49e0450f981ebe5d4da1

      SHA256

      3a97c80fd6734e9c368325c5e7995bd5b8127b4f63a8eb7fa3638a4d03162db0

      SHA512

      d1d314650c01e3badab31e4a8f3d88e281b1b5f17c86c5293e01b82afe22f72e4c41ea8caa1ed50b78123737f31b2d3dabde3a6691e9162184cb98ed01efedc6

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\HTMLayout.dll
      Filesize

      4.0MB

      MD5

      4cc6efda014cc654142c97cd09175e37

      SHA1

      9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

      SHA256

      0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

      SHA512

      064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\Instup.dll
      Filesize

      18.1MB

      MD5

      e9134948a4db2642f9bfaaf157a18bd0

      SHA1

      98249d941c196e9ee01f5d77713f13a12fff87f4

      SHA256

      67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

      SHA512

      629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\Instup.exe
      Filesize

      3.6MB

      MD5

      cb33ee6145c1dfad640103e1bc8b00e9

      SHA1

      e68405536c9501a5f7617636db734a7e7bfdb61c

      SHA256

      068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

      SHA512

      31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\asw9f6454aa4f934278.tmp
      Filesize

      19KB

      MD5

      ebd5c38aa827d9777dcde81e2a037b6f

      SHA1

      740eee39569863c6baa780e7d82c848c92abe0c1

      SHA256

      7fd358eddcef6756f315fec2bfad52286402f7194104fcfd3dcec7d588597025

      SHA512

      fc22fff31b6e84297af9769b84142960e45bf9d8b71e9039e3829be9c671fc173dd47c88c25807f3e7bca0b87f842de500f5227e21ed312bfae2e89d0b65ff0d

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\New_18050d08\gcapi.dll
      Filesize

      867KB

      MD5

      3ead47f44293e18d66fb32259904197a

      SHA1

      e61e88bd81c05d4678aeb2d62c75dee35a25d16b

      SHA256

      e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

      SHA512

      927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\aswf2c3ef99078824e6.ini
      Filesize

      579B

      MD5

      224edb3a3eb1168c0361d00ba2607325

      SHA1

      db362e5b650adc967a68a8fb3a7ae1f4d86a49ba

      SHA256

      766ef8ae49828d48be5ef8e3766b8a18d7007ebdc81af387c5494f12ab647922

      SHA512

      afe3118ef39ff7c77370e6c7ab3b876b3ac75a05f68fda5df1501e16d1002be1ee5b18009d21b76d9c88ff42cb52c2c21451715252eef58679dd360f39063ccc

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\avbugreport_x64_ais-d08.vpx
      Filesize

      4.7MB

      MD5

      ebc2e21a31af7ba94c3a70db0caf23ad

      SHA1

      36a25c19c6becbcf8e1c959458867f59cab774a3

      SHA256

      b1819bf1551be44e0f293f6b6ead1841aacb63ca3a9d90f1a31c9cb52f648c6e

      SHA512

      e777fd82cf1d782e73dc8796c57ecb9be4ed09256af456190ae0e414de651226c3eb616ae4ec1c245e55934843dd85485e0594c0125e013c47b48d89fff5f739

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\avdump_x64_ais-d08.vpx
      Filesize

      3.3MB

      MD5

      c339cfe0485edefebae496b088d41221

      SHA1

      684e4fa30a601ef645293cc5a8b008bbc03b9483

      SHA256

      55ebd9dc7c26877a51e11722d3ea17f1afdf39a30aeda07ef6804659c34e54c4

      SHA512

      c78b4735ed9184219f95a461e97a47d95b60f353ded28d692a72f9c3db2ead081b700731c8b673e8a1ca969519281d8e73cef449d5bb6bcfd282fcd2261f4a5d

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\config.def
      Filesize

      18KB

      MD5

      b86dd14aadb9e34d004ad39a4693ced0

      SHA1

      1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

      SHA256

      b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

      SHA512

      03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\config.def
      Filesize

      18KB

      MD5

      184622feb380b6f79038acd6e7784068

      SHA1

      3a7bf1ac6fd9e5e75432611b33c4a2fd1abd509d

      SHA256

      2ad35455993e3ac3974998b6bcf773ca04ff9af3a278cc703ee6e39e66b7e19a

      SHA512

      ebdd3417a4828716b20e043627dee700f12924d9bfe041fc018676c3396e833d9257139739ae6aafc8fdb113cdb9e29e60cea169761d3a941428dc93ce67426d

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\config.def
      Filesize

      24KB

      MD5

      bfb24971af6534340d55f0362bf247d0

      SHA1

      d2c7bd4ded798eb9fe55fd25078de43459f151df

      SHA256

      e06e1e1e69bab740de1347bc9a91dc4fff6bf93bc03e2649682e094f91026826

      SHA512

      82d51dd27a70897fef56edf7390f1f2fa8b574271dd203b7ac2cf63dee4cada9386b199e0eb790f4d12f1319b03d75938364ffc25dcc5359c695cf616c49ec66

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\config.ini
      Filesize

      676B

      MD5

      21a054ccb67310ad17f62f0f119a5c1f

      SHA1

      1c1e29e1936ca4af02a0e4c65c72fabbd8c90442

      SHA256

      d93c799844168fd0f579d5405a86ea4cf7cd074c84e0c8f73e3ce9add1c03e81

      SHA512

      ba2269e537c4e5fd26800639c827dc829d0ca8a28973077d86e740f32e6ec413fe3c2f8b7d84dc29861299ea3a98e9cbb7c29dbb958860422c387dd6755d9cb5

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\offertool_x64_ais-d08.vpx
      Filesize

      2.3MB

      MD5

      993a67fbd5162510a2b0f3fba05bad33

      SHA1

      3c76258240a04c05341e611f55bef10341e34ff3

      SHA256

      0b7c3caa31928131ce0e1ca570aa72e20a98dda13e4ca0c59f31cc677d8e8c6e

      SHA512

      44a335d3db00fa9148066a5f2d2a9f5250d7df2315d132ab2798b02e2d21b700525a00be91d960e1564a6ffc0ee95347f0df9ffc27a10cf807d5a926ab5154a3

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\part-jrog2-79.vpx
      Filesize

      211B

      MD5

      aa442786f758e5ad442aea88d6cf6124

      SHA1

      6c464722d20d261a155e2c5f6105cd8a4f0e5c21

      SHA256

      ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

      SHA512

      add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\part-prg_ais-18050d08.vpx
      Filesize

      73KB

      MD5

      d264bf74d7ffcbad341d9fcefa4893bb

      SHA1

      c7e9a0972524fa573825865c46eb6728d3e219e0

      SHA256

      4b01a68078d7e1af1c0197baddbbb1ef4d3cbf13f71e8b9df766f88b4e6d8025

      SHA512

      afbfdf6fdeb5dc427340de691726e79cb5bcc41bd488c557c684efe3f26d83a17f1118cc50bd64541a9a839d3dd4329a72a9423e65d3e9cdcfbd14003f1e0dc3

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\part-setup_ais-18050d08.vpx
      Filesize

      4KB

      MD5

      0344288a18997069003d84c226a168f9

      SHA1

      0fe47920601834e620737ad321fbb24d38c7ee94

      SHA256

      675bd92f752a51bd7d9797895252b3130095a06d7d5db8f221ab6251735ead8d

      SHA512

      b1680ef42d7e2e56fbb124c91da27f15e6c946450c7d03d95b937c3cde80dbc2260e11926578075df255058c2307058429fd2f7307fc0a105c775a9b8aa82429

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\part-vps_windows-24061199.vpx
      Filesize

      7KB

      MD5

      91760dd268918f34d5035b70231c6662

      SHA1

      c244a869726ab00bc674ea81970ddc739f240426

      SHA256

      60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

      SHA512

      30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\prod-pgm.vpx
      Filesize

      572B

      MD5

      6d08ac0131cac7a2f9f2ea5d9d0b0cc6

      SHA1

      25983c1419089c6a7570963dda2d06e022b3b36d

      SHA256

      846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

      SHA512

      753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\prod-vps.vpx
      Filesize

      343B

      MD5

      b516373c4f4f0bd98bbbcd71b4022e4d

      SHA1

      fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

      SHA256

      52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

      SHA512

      b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\prod-vps.vpx
      Filesize

      340B

      MD5

      a6aa5195417c52019dac2ea520161d70

      SHA1

      3867f26e50214fbef5698dcea3840ba6c35ab23b

      SHA256

      b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

      SHA512

      6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\servers.def
      Filesize

      27KB

      MD5

      2b62fb1ecd174c7e951f2b8af502c1c0

      SHA1

      90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

      SHA256

      1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

      SHA512

      0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\servers.def.vpx
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\servers.def.vpx
      Filesize

      1KB

      MD5

      ca027a5ef5f6d21d7e42855fa4db4120

      SHA1

      eee669fe1c3cabd5f96c65ac992e4851f8eca9da

      SHA256

      e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

      SHA512

      8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\setup.def
      Filesize

      38KB

      MD5

      49474897d267894daa13e9dcb168793d

      SHA1

      10331de148bb89ecc6e1af25bd3b0a862dd2b4eb

      SHA256

      0b9aedce74468150c054d27649dad8f98109e537a581649be6668a13cd29e6a7

      SHA512

      687dfcfdff27d8be7fa2b7a277a6bd269bf719ca12bf5e7f38643582785032cb8b0e11c04180736dfa56c2b10a12e10c10e50427ceacf6d6332125ebf65eb9da

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\uat64.dll
      Filesize

      29KB

      MD5

      c53dc6d8050e08d12939b95e2f5c53dc

      SHA1

      01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

      SHA256

      5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

      SHA512

      75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

    • C:\Windows\Temp\asw.27b4f6f51ec9ea16\uat64.vpx
      Filesize

      16KB

      MD5

      bd33707a5e0b6cc434fbaa32e69cb30a

      SHA1

      34ddc8fbda6acef9e07de571d4c00e65e3c09958

      SHA256

      bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

      SHA512

      02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

    • C:\Windows\Temp\asw.3dbe7bc8f74d39d9\avg_antivirus_free_setup_x64.exe
      Filesize

      9.5MB

      MD5

      72c1cad77d7a37f6eed6606b00b22738

      SHA1

      1883d039f42ead5318de8f5f37b61bad4b61fa72

      SHA256

      47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

      SHA512

      87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

    • C:\Windows\Temp\asw.3dbe7bc8f74d39d9\ecoo.edat
      Filesize

      21B

      MD5

      9e9fd0acc3b9c02effd90773c17e186a

      SHA1

      51c51677e335176cc78e0de556bc127a9da1d72f

      SHA256

      0a9e9728a7bef88ead70a1bc562ca9ba32bba1988a34da0b64bfb3d9b1e59d49

      SHA512

      7e1e600e929572ff9209a9c6a8ea8d7fa2239cfd99c509b4670c9915b6d013cbff5671a8250ce29db58fb63336e91b1bbfb3af6dee0d8a5588d807b3b651f6e2

    • memory/3464-315-0x0000029EB50C0000-0x0000029EB54B9000-memory.dmp
      Filesize

      4.0MB