Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 12:00

General

  • Target

    139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe

  • Size

    219KB

  • MD5

    03a56575ca7883f9a60bb8008b7d5350

  • SHA1

    240896a7268b208fe0fcb1d04ae6429e36db7088

  • SHA256

    139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398

  • SHA512

    c124aad0470dda0d32309a4cb097aec07482a8be99dfce5fe6c291508485baa7c538b55a6f8a2822e3e73a9482e6b2610de707ea60a6921bd6ec499c94704afc

  • SSDEEP

    3072:m2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhZK0KJ:m0KgGwHqwOOELha+sm2D2+UhngN7K4t6

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe
    "C:\Users\Admin\AppData\Local\Temp\139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exe
      "C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exe" /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /ga_clientid:01904e77-ebb1-43b3-888d-c551bbeaab6d /edat_dir:C:\Windows\Temp\asw.4875309771f3138c
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exe
        C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\icarus-info.xml /install /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exe
          C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da420
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:1016
        • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus.exe
          C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da420 /er_slave:avg-av-vps_slave_ep_d9c93ef9-aa38-491c-97cd-ff3b509794b2 /slave:avg-av-vps
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:1916
        • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus.exe
          C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da420 /er_slave:avg-av_slave_ep_a3851a44-ba34-4dad-b44c-3cac325243eb /slave:avg-av
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe
            "C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:412
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3496
          • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe
            "C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1552

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Icarus\Logs\icarus.log
    Filesize

    61KB

    MD5

    4519c605c52071ac7ea4cd81f73f7591

    SHA1

    496a4fbf8e8b6ae81217aef847d495fa9f62818a

    SHA256

    84fdade20ccd13e7a7b8be7c72208a10db73bb537d04417edfe9bd26e193d97b

    SHA512

    05aa64a805a2142172918e1662d941d1f04ee0c4d3ede38323e790bf29fe45c4e2b6af1f3097cd7df9c11f5f70362397e7abe182925922fbe1cc963f319aa0b9

  • C:\ProgramData\AVG\Icarus\Logs\icarus.log
    Filesize

    109KB

    MD5

    97dcfc7ed06dda41d62029d97ef0cdf9

    SHA1

    e1fdde04f3eb57c6778214165d514167c69b5340

    SHA256

    5c4a24cf2f51601441174c6d1cc63584bbeb54123ec3b295b2cefd62c0dfb44c

    SHA512

    b18b3ad9c7a7cc0092701310a608fc024aecb99bc4af84bd5b7f3932f69234ea9a3ace91b64dfdb0cac1e7ae8a91e646a2f70e071c842073fbea19eb75bcc1fd

  • C:\ProgramData\AVG\Icarus\Logs\icarus.log
    Filesize

    110KB

    MD5

    b561d078b76210ee52574358024c5ff8

    SHA1

    a129ee29f7e8813ece55b5fe50222610627e5fc6

    SHA256

    982a16527e247ef76df4f7c4a603eeedf81359ec97cbb43cf6e686ea88d08aa8

    SHA512

    6b140fa060d4db37e1f6490f784ad0a43fb41bac32491bd3986515ebaebf64e6f86b3e825777482cd9c344dd6ae9c53f38033dc7af44113e3b7ed7fc566a46f8

  • C:\ProgramData\AVG\Icarus\Logs\report.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\ProgramData\AVG\Icarus\Logs\sfx.log
    Filesize

    13KB

    MD5

    182cd05c2853f7ab5ea9deae12ed3b85

    SHA1

    6d0987ff4767520b7e7f1932981ae72036be818c

    SHA256

    15c30aabfd4704529d87e2c789ba0a3f82155d202983ba1fdb85d36ecde4d0a7

    SHA512

    15e1221ce45fb223ca73fe8d21a57041e83dc53d4d7b46fa64fe828bf33ff36dcd33e176751224aeb1eef561bcfa70e50cc91d5dd98fbc158a64ad526d15c775

  • C:\ProgramData\AVG\Icarus\Logs\sui.log
    Filesize

    15KB

    MD5

    bc130d43259119f8251e1730a7f6e948

    SHA1

    9d35860b30fa4e2a8a87b0a5e196830dbf8310be

    SHA256

    abf82f96236764402abf6ee60eab8b3770b9c8bff23a863f2dfc50658df57cba

    SHA512

    e4adf515678e517aaadb948f353bb3c33cb1590016bdc668ecfd8f8f84b5f72f0d6dded04da3f30803df896fc56477f15efdc1483909992f48bb104bfccf3255

  • C:\ProgramData\AVG\Icarus\Logs\sui.log
    Filesize

    16KB

    MD5

    794e8bcaaf46747e5bd2a600d5e12ec2

    SHA1

    90eee76b71cdf70db4a6a86fe08296d672ef4bac

    SHA256

    331665b1c897d2574043cfb65c3dd9c3b40d212f9b4f5d3efa85e3e9cc6bfc41

    SHA512

    db4b80c29a0f186099f15a52d2b0b0a5a560c89495d62cb208957f6ef8b960f0e18d523abd5dc014b50c9c1e1e1e15b00c53d14212899c796e8606311752cf26

  • C:\ProgramData\AVG\Icarus\settings\proxy.ini
    Filesize

    278B

    MD5

    b8853a8e6228549b5d3ad97752d173d4

    SHA1

    cd471a5d57e0946c19a694a6be8a3959cef30341

    SHA256

    8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9

    SHA512

    cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

  • C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3
    Filesize

    64B

    MD5

    168f03c5c241049561d93853fa2304dc

    SHA1

    ee086aa5bc60436a75015003cb2dd27ae57620ff

    SHA256

    374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e

    SHA512

    169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

  • C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0
    Filesize

    72B

    MD5

    3f2af8673964469793e82fde02345d1f

    SHA1

    18437263403c433448df1e12a8081257ff2925b9

    SHA256

    db4ebd456a95bf34880c1bea31560d05095faace705af02ecae446eb3b214bcc

    SHA512

    9c396f5dcb6e464d621384fda9acd952673d49390f6e3d2924bc693f3d4aa5f656bf845642d8b39f2146ea086b33949626dc356ec9fbe95b38bd48d7843383c3

  • C:\Users\Public\Documents\gcapi.dll
    Filesize

    867KB

    MD5

    3ead47f44293e18d66fb32259904197a

    SHA1

    e61e88bd81c05d4678aeb2d62c75dee35a25d16b

    SHA256

    e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

    SHA512

    927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\bug_report.exe
    Filesize

    4.8MB

    MD5

    51d5604dd0a85f5fa6586980e64d0785

    SHA1

    cfc31d787dbf01e039971365a9c7a1b6affa1132

    SHA256

    0bc7930fe347a5a4a0ad244f60122a4635baf0695ca30c9ac8df923f540013e6

    SHA512

    247490f99e7f8343c00223c1cb2a596ed12584f76c0c3fff24d14859651dacc11ef5ecaa5785af063ee62965b6c8bc535e12d1b78fa43c2bb3f8b133b5af0bda

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\config.def
    Filesize

    583B

    MD5

    88b8bbca6adfb658e9f64786290b1508

    SHA1

    a7e19f0be671882e7c0de8d546482d20045139de

    SHA256

    a98977649c4c1e25f732e3023515cac1cf5d54df88d58c170dde6f895bc695fc

    SHA512

    b7329cac2951e04645771d207dc0c095fe81dfa17bd3df185f4da1e1cc4f726750a48921fd97345b6777638e212624d4f0d3824d39f363d9421bbbffd44f3968

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\dump_process.exe
    Filesize

    3.4MB

    MD5

    21d84898683d48daa44ed5a2f0f3591b

    SHA1

    d1a3d3755d2facb545e69578459f64bb7ddc736b

    SHA256

    c109510846192f6f93efb0955a784c302b07858c98a8548e861209b353a31e71

    SHA512

    5bb4a5e0039059f32ef77aa4d45a7661801f539fe341fd1ed667da5ca8b20dad6d5ca405260084f780af4b2ff8db93c3598f859fe9d5d88cbeeb7d9f6dd0d117

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus_product.dll
    Filesize

    851KB

    MD5

    a4085f7f5bd1406f050995b529ed6640

    SHA1

    d59acba50b5ca04eeb55a08dfa09c24445b2e722

    SHA256

    d060cb6368bf7df914a5f6619a3bcc51430558909434f7e565dcea484778d852

    SHA512

    bec6aeed862e12adda63689d806d331946c0b7d743712f1f1c3f11f76e6badfa7752323407ee73b82287f3335034f11014662014db382ad3a19a3c6825dfc6e4

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\product-def.xml
    Filesize

    57KB

    MD5

    79658c0c7aeeefe6821ae642f864772e

    SHA1

    2cfc73956be01440b9d7d17a3e129a2504d3bcfe

    SHA256

    971e697d2e640b2be654c57ac1e1a523ff3b6b243157f26abfa276cd2b9d0bd8

    SHA512

    41fc6322f183a51a545daa08b168c19d61e07daf82edd5f3070da9e77aa447ab358480b5caf0226ae0ccc7d77486ccd6e4d354ea0d83d8576fac26dc1d94d523

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\product-info.xml
    Filesize

    5KB

    MD5

    44f890102c5bc0cf48e4d586e0824c84

    SHA1

    939f09d220caa71214024956bf5d7848f4bc9096

    SHA256

    3a5a48c214c2759eb9a6b2f621ac0af16b564e5774d214db925629bbc7692af9

    SHA512

    3977244dbba86d07eedfe29589ffd13c77e307936d59cb81d44659f67d219c8dc2d0973056aa2a038120f806b2acbf45443af3624c7fcc5596131024e6007e6d

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe
    Filesize

    2.3MB

    MD5

    14ab1b335b1b9a39a7c3038626ef9d3d

    SHA1

    96608c4427861b524cea46ec47bd5185ea10815a

    SHA256

    90364dd980f0c7a8b126d5fb65c7788921e13aba273ad8fb296b5eba59778f12

    SHA512

    913188939451702639f34299145e4a1719ce5ee416aa9ef13fbdec868185a9b6ccbedd4b0fbc8212f72035b757780c368e6f7d44b93dfb46e3577be1c16ab1d5

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\config.def
    Filesize

    757B

    MD5

    264d61ef38e6f06891da07c11bf71436

    SHA1

    e4a258aa41ce4aaacdfa7f5c0f6f11d4859fe1b2

    SHA256

    96976bd5ecb653aded30321685e44a59886901652c031de101e3a13326d61387

    SHA512

    c818737bcb76b4d50673c8007118320f0b6081108f4934016a04167d5a8f4835393274438769e05276c5db79c5d9f5e4e3748788a1439c974bdf16b3d5dd6890

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\config.def.edat
    Filesize

    20KB

    MD5

    934e4c0db2900855ec6b7bada158d464

    SHA1

    095811d2cc7924bf2b4c0d88537de9eaca106eb3

    SHA256

    b419fe15dd54882a70e9c1ff902467d2e1abfa8565a9cfd0770481ff0ac84e10

    SHA512

    0d7a0c5a0c545e6dc35d14ec16486f146e89145c2ac7126780012723ebb57d968b46208c6fd379f1d01ca3af188afb68e5a4fd74c351f40134f40630c50ef7a8

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\edition.edat
    Filesize

    2B

    MD5

    9bf31c7ff062936a96d3c8bd1f8f2ff3

    SHA1

    f1abd670358e036c31296e66b3b66c382ac00812

    SHA256

    e629fa6598d732768f7c726b4b621285f9c3b85303900aa912017db7617d8bdb

    SHA512

    9a6398cffc55ade35b39f1e41cf46c7c491744961853ff9571d09abb55a78976f72c34cd7a8787674efa1c226eaa2494dbd0a133169c9e4e2369a7d2d02de31a

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus_product.dll
    Filesize

    6.0MB

    MD5

    48868d9172e27b4dab1e0608bebb79c0

    SHA1

    7680a1779631b10e76ce4b7ab5993cb438fa1add

    SHA256

    dfdcaa2c3313544eeb19361a5fa343fe7e820a0ec6f37c6e6b866dd56f1e7c94

    SHA512

    848e5565a8f8809acf4ca7be594dbadf95ace9f4806e25b6bad8075acd247d10d85dd295ea85f6c63c8b8ede149afd8866e3ec0879c581892064323b107f66a2

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exe
    Filesize

    7.7MB

    MD5

    392d142e6b814f42079d5ed9011758f4

    SHA1

    4111eb5a27f84c26f1a95cc8d577e5b3743dfebf

    SHA256

    dfefb27fc9a96a2a7aab2059067d670178ede0f926215464d61c298e8e3f895f

    SHA512

    11678c9857ced88d947779b10089a91abc1e80a43f6518289c4fea88353241767406a59a6e682bf300344a7a5aab34126b373aff33fad04d0fee4a78db01b58d

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_mod.dll
    Filesize

    14KB

    MD5

    ce33da043c6139937b48164733916798

    SHA1

    578b88b7369d76aab8fc671dc9e75125d4006b07

    SHA256

    41ed21bcc7c2e31bd5d7b40f2fdf6fb4a27e07e07ff454a560ab9563265c7786

    SHA512

    ce2ef23cde2b5ee30cd3479ed20946f07055262b6d644fa4dc97c421f1e012a5acf5737dd69024771e2ac14d13742acd3a32a3cbb28c51d7e12b36b42c8185bb

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exe
    Filesize

    11.7MB

    MD5

    93ac5443af08533a675113b0227705c0

    SHA1

    cecc66d306ec3a4cfbe93abf51472385aa157795

    SHA256

    3342f6600ce7e3a7f88d041ad8f4a27fe8f06dc549c371d28eb202e4ec7e8064

    SHA512

    9de0fd990e88ec37655b7968623823c9cef7aa2444573d8f7863cb77d6b55622e41197612421a19f08f60b65bd59f8d656556d6254b16ed8fcfed0613ca73071

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\product-def.xml
    Filesize

    1.3MB

    MD5

    bb399f3eb4cb55dc8f2467c1625535c6

    SHA1

    3b47ad5966bab7ad26b263e14a38c7792b9ee349

    SHA256

    10bd70200dc8414774e02c8751d7f35e5d8ee80657db4c2efc54369e1da59d2f

    SHA512

    7294a989592fae569f1066451f6dd7fd36c52ad20d956d6be20cf69e070ed812fdc9b6dd506c74b54d9fb35a31c5382b8353ca814207dd69b98f7963da7e6717

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\product-info.xml
    Filesize

    9KB

    MD5

    ec1d45e035964aa35a3e34138de2eb0e

    SHA1

    72dcf5cc92f0ddd139aedd754a7dc22bcd49082e

    SHA256

    dc5ad9f2d6c6cc5c43c1f2fbb44008997de8c7a6cfdb22b3bbf061b10075284a

    SHA512

    38ad9991b9ec6601810413498decc740fb47130ac70093f9363c0fa17187ec100e89d45f8e798a47a8c8ad2fd64e6ba7d9b5d198d2986431ca08a85efd3e5816

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\setupui.cont
    Filesize

    381KB

    MD5

    a55572f37fe1652b92e09b1f2a0d43bd

    SHA1

    4d1ffb01d15c8482607a8fcec2a4bcd905448946

    SHA256

    79f91b261fede95ab25c4a2ed1d118221552a33ba3e13c9746b1f3200bdfc4ef

    SHA512

    1da2fcfa34b72dc64e00f5907d59f68e23be20794884cccb838a41b6023683471dfcb1b0b5bf4695958879aa2e80e8f92385d1b081acde4d4c5002c8a1a468c6

  • C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\icarus-info.xml
    Filesize

    1KB

    MD5

    d02d5948e5b7a8508f84330551c3c4e2

    SHA1

    3dc5b61412fe33accf607887aae3ba81871320e3

    SHA256

    abd128f83ba42ed472288bbdf1d491773424d6b541594c845a575335cd019edc

    SHA512

    7d565852dfc740fc35344514e2ef887f56fd72f7ef8e4efb9f27187e40e7b2df88475cfdc05a8a806485abfd937ff99a1f7cc97af6de20e0fab4d3bca070e2c4

  • C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exe
    Filesize

    1.5MB

    MD5

    532f95e90c93fedd7c1d3758bea1dda6

    SHA1

    ecf90929ae1bcb1bf4247147b247363802ecb1cb

    SHA256

    78d4d80014d4815cd798b44272dba55056b7955a22e29c66e96e2ff47f2bb9a8

    SHA512

    865621304c0a2e993ee62e90c0915883d9e37d5c1ff329347692d32fe33c83366ef554891d61422fbbab6efd1ba3da59071860b5aaccca96ad6ce4d3835f5801