Analysis

  • max time kernel
    120s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 11:36

General

  • Target

    342cc457626afaa4b4e64d611e16fbb74b3128656061e79b73cd042d16adce1a.exe

  • Size

    219KB

  • MD5

    bc327ae378d0e92f5da8e6e404b0b3ac

  • SHA1

    7ccf7eb64597bc6662c9ff066ef16e03c6914cab

  • SHA256

    342cc457626afaa4b4e64d611e16fbb74b3128656061e79b73cd042d16adce1a

  • SHA512

    085b8cef473a0b00e207cb59cbefbb7a99cf0fb76a84604c8fea0b1df16445877df818ac0adc50b0ddbc5713f585bdaa8b5213de1425aaadf9a2d7862f34d067

  • SSDEEP

    3072:w2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhh9K0Ks:w0KgGwHqwOOELha+sm2D2+UhngNHK4M0

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\342cc457626afaa4b4e64d611e16fbb74b3128656061e79b73cd042d16adce1a.exe
    "C:\Users\Admin\AppData\Local\Temp\342cc457626afaa4b4e64d611e16fbb74b3128656061e79b73cd042d16adce1a.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\Temp\asw.32ad6c96f5cd2a89\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.32ad6c96f5cd2a89\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_013_999_e7f_m /ga_clientid:407c9be3-0512-4f05-abb4-f89a68039414 /edat_dir:C:\Windows\Temp\asw.32ad6c96f5cd2a89
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Windows\Temp\asw.79a220a8dbc3d890\instup.exe
        "C:\Windows\Temp\asw.79a220a8dbc3d890\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.79a220a8dbc3d890 /edition:15 /prod:ais /stub_context:e0b99781-b7b9-49da-b9fc-98c73619f2d3:9994552 /guid:402b667f-9b9e-4118-8fde-fcac7e535d2e /ga_clientid:407c9be3-0512-4f05-abb4-f89a68039414 /cookie:mmm_bav_013_999_e7f_m /ga_clientid:407c9be3-0512-4f05-abb4-f89a68039414 /edat_dir:C:\Windows\Temp\asw.32ad6c96f5cd2a89
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\instup.exe
          "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.79a220a8dbc3d890 /edition:15 /prod:ais /stub_context:e0b99781-b7b9-49da-b9fc-98c73619f2d3:9994552 /guid:402b667f-9b9e-4118-8fde-fcac7e535d2e /ga_clientid:407c9be3-0512-4f05-abb4-f89a68039414 /cookie:mmm_bav_013_999_e7f_m /edat_dir:C:\Windows\Temp\asw.32ad6c96f5cd2a89 /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:4824
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:628
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3136
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2984
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4648
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4828
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3552
          • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe
            "C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3420

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    27KB

    MD5

    4a3909d110ccec7effdab12df5f59052

    SHA1

    1636a4bf5b42c0bc9c06a58b10b290969a9d536d

    SHA256

    8e5f2cae0917b4a04217ad11d919e0b0240d5fce8cb08ce7e5961036011ecee1

    SHA512

    139e3e8078e8d8cd54c0b0047d7537df401f81129ae54feec9281b7fc7fe7492f2b62ce3888e4a7a77c688a998e191a98cf4111644d632ff3b2293385475f26e

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log
    Filesize

    1KB

    MD5

    a05a740e8d4717461ae1f63f7447e9ba

    SHA1

    55392c404c300192b040458ab5cf82d2118208c9

    SHA256

    0d1507d4b8e91fdbb7fa175d48456a5985dff5797d0853233324d66721102ba1

    SHA512

    6b0100125e77331b2e11f4733f27b9f51501efcedcb40e9bf4898bfdf4bff37b0f48b4c6089646a2b9c7d30f1a58dadc37baeaa715db9a0c523283f909aefe56

  • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log
    Filesize

    281B

    MD5

    f374d2e16c744f8d589bfa4819faf54a

    SHA1

    10fb6386de9acb145da7d9071a70293008d20298

    SHA256

    1ca9f8dfdcac71164be1c790ca5a7fd23de59a5a63e9fb76f684d70f8cca0c0a

    SHA512

    9ebc45dae9cb6152f3aa1a339ce6d6262c2f3f738b912d07ff3156c87d9e4eb373252fa343fd65c6984738172a9e88f60755ed2958a8d3fe3a3ce74c08ebe43b

  • C:\Windows\Temp\asw.32ad6c96f5cd2a89\avg_antivirus_free_setup_x64.exe
    Filesize

    9.5MB

    MD5

    72c1cad77d7a37f6eed6606b00b22738

    SHA1

    1883d039f42ead5318de8f5f37b61bad4b61fa72

    SHA256

    47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

    SHA512

    87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

  • C:\Windows\Temp\asw.32ad6c96f5cd2a89\ecoo.edat
    Filesize

    21B

    MD5

    24440995e9420448059bd2a91740ce8f

    SHA1

    a5a17cf14c70737b03d6c2033271cd7e1070fdeb

    SHA256

    c1fdbc5a3b378729ff413df38e4fea67421cdce166084d48d64cbbea4f8096ca

    SHA512

    20c80c5b8238cbb0db178a28e825d9d17764abaa3e306ceff8a7ab9fa1fc513b96823cc8df1ca19ed552e878a440b545deed1d6804532db3b911b3fa79ba51e5

  • C:\Windows\Temp\asw.79a220a8dbc3d890\HTMLayout.dll
    Filesize

    4.0MB

    MD5

    4cc6efda014cc654142c97cd09175e37

    SHA1

    9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

    SHA256

    0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

    SHA512

    064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

  • C:\Windows\Temp\asw.79a220a8dbc3d890\Instup.dll
    Filesize

    18.1MB

    MD5

    e9134948a4db2642f9bfaaf157a18bd0

    SHA1

    98249d941c196e9ee01f5d77713f13a12fff87f4

    SHA256

    67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

    SHA512

    629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

  • C:\Windows\Temp\asw.79a220a8dbc3d890\Instup.exe
    Filesize

    3.6MB

    MD5

    cb33ee6145c1dfad640103e1bc8b00e9

    SHA1

    e68405536c9501a5f7617636db734a7e7bfdb61c

    SHA256

    068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

    SHA512

    31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

  • C:\Windows\Temp\asw.79a220a8dbc3d890\New_18050d08\gcapi.dll
    Filesize

    867KB

    MD5

    3ead47f44293e18d66fb32259904197a

    SHA1

    e61e88bd81c05d4678aeb2d62c75dee35a25d16b

    SHA256

    e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

    SHA512

    927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

  • C:\Windows\Temp\asw.79a220a8dbc3d890\asw2fdf4be719e614a2.ini
    Filesize

    1KB

    MD5

    bd2a22d97ebbe823350d557a494c86d6

    SHA1

    13657551f27e995266f5aa8eaec74ef87f215ebd

    SHA256

    88d5fda11b637e45eca268b995ac0ea0338dc1d3f32302e8b93d038f499accec

    SHA512

    037d0bd04ca89dfad3cc1fc18ebf002f2f661ed5bf0a0cc77fc6f2efa711cce8cd5ffca4b7d62a44b55b3825f3b692fcbfa413556c753e3697befee51ce84ce1

  • C:\Windows\Temp\asw.79a220a8dbc3d890\asw2fdf4be719e614a2.ini
    Filesize

    1KB

    MD5

    1602d8e4676886395e3551458053cf66

    SHA1

    0e7961ff7ed61001f6243a73d1061ccbd05f736a

    SHA256

    042234d1806fac967a25c56ee2cdb8e43c72f15ecb2cdcc7330199ff099002e6

    SHA512

    a1b31502b6884bd61a84b42358b3b992feeefc5d21a4b722e6c9b6c3af447da896cd4891644c3c3ca976ec0f4d0d897d1b83131e65c1161501a9e54a5b36db16

  • C:\Windows\Temp\asw.79a220a8dbc3d890\avbugreport_x64_ais-d08.vpx
    Filesize

    4.7MB

    MD5

    ebc2e21a31af7ba94c3a70db0caf23ad

    SHA1

    36a25c19c6becbcf8e1c959458867f59cab774a3

    SHA256

    b1819bf1551be44e0f293f6b6ead1841aacb63ca3a9d90f1a31c9cb52f648c6e

    SHA512

    e777fd82cf1d782e73dc8796c57ecb9be4ed09256af456190ae0e414de651226c3eb616ae4ec1c245e55934843dd85485e0594c0125e013c47b48d89fff5f739

  • C:\Windows\Temp\asw.79a220a8dbc3d890\avdump_x64_ais-d08.vpx
    Filesize

    3.3MB

    MD5

    c339cfe0485edefebae496b088d41221

    SHA1

    684e4fa30a601ef645293cc5a8b008bbc03b9483

    SHA256

    55ebd9dc7c26877a51e11722d3ea17f1afdf39a30aeda07ef6804659c34e54c4

    SHA512

    c78b4735ed9184219f95a461e97a47d95b60f353ded28d692a72f9c3db2ead081b700731c8b673e8a1ca969519281d8e73cef449d5bb6bcfd282fcd2261f4a5d

  • C:\Windows\Temp\asw.79a220a8dbc3d890\config.def
    Filesize

    18KB

    MD5

    011053bb88eaf0781b0d54d9a17e1b09

    SHA1

    4085596507ecf2d89f51f2c2a75308cdc81d9af5

    SHA256

    8e32da70b571b8efdee0a9039278b7615db2d82c6252c2c7d08ec3c704cc7141

    SHA512

    fe1fe87623d1e6600f2b973dea9bfaf00425998e6040d85909e4c86ad33dc8507b69d41a7234b5ee54627bdc1358fb1a38baae9098a3af4c76e8f984c4222852

  • C:\Windows\Temp\asw.79a220a8dbc3d890\config.def
    Filesize

    24KB

    MD5

    d35922b344d5cf5aa17aff8325303eb4

    SHA1

    7b781c21dd3a85fb3f664478a9f145f5bdd294d9

    SHA256

    14c393d64497e0d13eeb48249c662a8cf197925e08158c0d8c031c07ba2d6663

    SHA512

    fdd6fa558a7401faa1a022ac28397450f5e9de1d045ba68fa049e7ff14dd6d7b6388f2809e05dde8f40dcf94c6fcf490af9cecc7922c74a05f21966dc9b0264c

  • C:\Windows\Temp\asw.79a220a8dbc3d890\config.def
    Filesize

    18KB

    MD5

    b86dd14aadb9e34d004ad39a4693ced0

    SHA1

    1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

    SHA256

    b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

    SHA512

    03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

  • C:\Windows\Temp\asw.79a220a8dbc3d890\config.ini
    Filesize

    668B

    MD5

    cc873c21c50429f9717f238c8d331800

    SHA1

    c7534216cdcfd209bbf002bd6fa03bae9e6786a5

    SHA256

    23d33e25e0be3a673b56632cfd71f00b86d78fed36e764912fd376ac9d1ff9aa

    SHA512

    49c71d004be41f22b1feb2a5d05a25cc71303c959625e70cdeaab3276611b3a8d242f08cd57f8143e56a3895ae99cb5c9932912887a3778d6f0fad50850b34c1

  • C:\Windows\Temp\asw.79a220a8dbc3d890\offertool_x64_ais-d08.vpx
    Filesize

    2.3MB

    MD5

    993a67fbd5162510a2b0f3fba05bad33

    SHA1

    3c76258240a04c05341e611f55bef10341e34ff3

    SHA256

    0b7c3caa31928131ce0e1ca570aa72e20a98dda13e4ca0c59f31cc677d8e8c6e

    SHA512

    44a335d3db00fa9148066a5f2d2a9f5250d7df2315d132ab2798b02e2d21b700525a00be91d960e1564a6ffc0ee95347f0df9ffc27a10cf807d5a926ab5154a3

  • C:\Windows\Temp\asw.79a220a8dbc3d890\part-jrog2-79.vpx
    Filesize

    211B

    MD5

    aa442786f758e5ad442aea88d6cf6124

    SHA1

    6c464722d20d261a155e2c5f6105cd8a4f0e5c21

    SHA256

    ba1333f2355a7660001410efc8ae3e0b49d1600806272050883980889d6e250b

    SHA512

    add459ffec8fa3883a56a64fb0a34bf0c99fbda9e296e30911f2fee313626a68ba3e1d56671615b6250a9adfa8a6e07e76a86dab234500a03c60a07556a50e1f

  • C:\Windows\Temp\asw.79a220a8dbc3d890\part-prg_ais-18050d08.vpx
    Filesize

    73KB

    MD5

    d264bf74d7ffcbad341d9fcefa4893bb

    SHA1

    c7e9a0972524fa573825865c46eb6728d3e219e0

    SHA256

    4b01a68078d7e1af1c0197baddbbb1ef4d3cbf13f71e8b9df766f88b4e6d8025

    SHA512

    afbfdf6fdeb5dc427340de691726e79cb5bcc41bd488c557c684efe3f26d83a17f1118cc50bd64541a9a839d3dd4329a72a9423e65d3e9cdcfbd14003f1e0dc3

  • C:\Windows\Temp\asw.79a220a8dbc3d890\part-setup_ais-18050d08.vpx
    Filesize

    4KB

    MD5

    0344288a18997069003d84c226a168f9

    SHA1

    0fe47920601834e620737ad321fbb24d38c7ee94

    SHA256

    675bd92f752a51bd7d9797895252b3130095a06d7d5db8f221ab6251735ead8d

    SHA512

    b1680ef42d7e2e56fbb124c91da27f15e6c946450c7d03d95b937c3cde80dbc2260e11926578075df255058c2307058429fd2f7307fc0a105c775a9b8aa82429

  • C:\Windows\Temp\asw.79a220a8dbc3d890\part-vps_windows-24061199.vpx
    Filesize

    7KB

    MD5

    91760dd268918f34d5035b70231c6662

    SHA1

    c244a869726ab00bc674ea81970ddc739f240426

    SHA256

    60cbcb938b4d06ec162bb2379fe94f0f22cac8927ea5740cb52260809c5ef50a

    SHA512

    30f015fc4cb040e617caff7545290b7add9ce500a2bf10a72d53eed64b0972754e4a5dc1296b50b06f286a473950b21c3bec9fadbe9733942d59542ec19175d6

  • C:\Windows\Temp\asw.79a220a8dbc3d890\prod-pgm.vpx
    Filesize

    572B

    MD5

    6d08ac0131cac7a2f9f2ea5d9d0b0cc6

    SHA1

    25983c1419089c6a7570963dda2d06e022b3b36d

    SHA256

    846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

    SHA512

    753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

  • C:\Windows\Temp\asw.79a220a8dbc3d890\prod-vps.vpx
    Filesize

    343B

    MD5

    b516373c4f4f0bd98bbbcd71b4022e4d

    SHA1

    fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

    SHA256

    52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

    SHA512

    b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

  • C:\Windows\Temp\asw.79a220a8dbc3d890\prod-vps.vpx
    Filesize

    340B

    MD5

    a6aa5195417c52019dac2ea520161d70

    SHA1

    3867f26e50214fbef5698dcea3840ba6c35ab23b

    SHA256

    b5992d7f4f9cfbd8c06d0b40110f296e70a7b804e581553d120d22146efdfc92

    SHA512

    6986e715d9adf1142d965f0b8d0ec99915537015cb95ea14b9565f0aab3f2fde6c36ef06d760c8c32e0ad452419edcce0695eee5397f97afed3a28e75f25fc50

  • C:\Windows\Temp\asw.79a220a8dbc3d890\sbr_x64_ais-d08.vpx
    Filesize

    19KB

    MD5

    ebd5c38aa827d9777dcde81e2a037b6f

    SHA1

    740eee39569863c6baa780e7d82c848c92abe0c1

    SHA256

    7fd358eddcef6756f315fec2bfad52286402f7194104fcfd3dcec7d588597025

    SHA512

    fc22fff31b6e84297af9769b84142960e45bf9d8b71e9039e3829be9c671fc173dd47c88c25807f3e7bca0b87f842de500f5227e21ed312bfae2e89d0b65ff0d

  • C:\Windows\Temp\asw.79a220a8dbc3d890\servers.def
    Filesize

    27KB

    MD5

    2b62fb1ecd174c7e951f2b8af502c1c0

    SHA1

    90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

    SHA256

    1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

    SHA512

    0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

  • C:\Windows\Temp\asw.79a220a8dbc3d890\servers.def.vpx
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Windows\Temp\asw.79a220a8dbc3d890\servers.def.vpx
    Filesize

    1KB

    MD5

    ca027a5ef5f6d21d7e42855fa4db4120

    SHA1

    eee669fe1c3cabd5f96c65ac992e4851f8eca9da

    SHA256

    e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

    SHA512

    8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

  • C:\Windows\Temp\asw.79a220a8dbc3d890\setup.def
    Filesize

    38KB

    MD5

    49474897d267894daa13e9dcb168793d

    SHA1

    10331de148bb89ecc6e1af25bd3b0a862dd2b4eb

    SHA256

    0b9aedce74468150c054d27649dad8f98109e537a581649be6668a13cd29e6a7

    SHA512

    687dfcfdff27d8be7fa2b7a277a6bd269bf719ca12bf5e7f38643582785032cb8b0e11c04180736dfa56c2b10a12e10c10e50427ceacf6d6332125ebf65eb9da

  • C:\Windows\Temp\asw.79a220a8dbc3d890\uat64.dll
    Filesize

    29KB

    MD5

    c53dc6d8050e08d12939b95e2f5c53dc

    SHA1

    01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

    SHA256

    5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

    SHA512

    75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

  • C:\Windows\Temp\asw.79a220a8dbc3d890\uat64.vpx
    Filesize

    16KB

    MD5

    bd33707a5e0b6cc434fbaa32e69cb30a

    SHA1

    34ddc8fbda6acef9e07de571d4c00e65e3c09958

    SHA256

    bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

    SHA512

    02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de