Analysis

  • max time kernel
    145s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 13:54

General

  • Target

    2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe

  • Size

    219KB

  • MD5

    df5f5189b5ad2dbe381c497e2014cff5

  • SHA1

    6186f4ebdbb0089108ead978e3eb7d48b36b83e2

  • SHA256

    2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532

  • SHA512

    38323e075be56e3df22fb63bdfdd5fa4559b4f61fcdae0380c7857fe3701635e6462ace533e4e079444180732e0180f9104771ca1b5408573077db637f222b6d

  • SSDEEP

    6144:20KgGwHqwOOELha+sm2D2+UhngN2K4Zpk:20KgGXFhazmdVgoK4ZC

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 30 IoCs
  • Checks for any installed AV software in registry 1 TTPs 5 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe
    "C:\Users\Admin\AppData\Local\Temp\2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\Temp\asw.cb29a268e58a04f0\avg_antivirus_free_setup_x64.exe
      "C:\Windows\Temp\asw.cb29a268e58a04f0\avg_antivirus_free_setup_x64.exe" /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /ga_clientid:569879cf-a819-4e6a-83d5-64afed65cb71 /edat_dir:C:\Windows\Temp\asw.cb29a268e58a04f0
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\Temp\asw.1e69161b0325ef6b\instup.exe
        "C:\Windows\Temp\asw.1e69161b0325ef6b\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.1e69161b0325ef6b /edition:15 /prod:ais /stub_context:f6ab8e03-87fe-4b32-8587-cb0db79e2efb:9994552 /guid:8c1c9dfb-afb9-4a52-99e5-a9ba086c8a8a /ga_clientid:569879cf-a819-4e6a-83d5-64afed65cb71 /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /ga_clientid:569879cf-a819-4e6a-83d5-64afed65cb71 /edat_dir:C:\Windows\Temp\asw.cb29a268e58a04f0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\instup.exe
          "C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.1e69161b0325ef6b /edition:15 /prod:ais /stub_context:f6ab8e03-87fe-4b32-8587-cb0db79e2efb:9994552 /guid:8c1c9dfb-afb9-4a52-99e5-a9ba086c8a8a /ga_clientid:569879cf-a819-4e6a-83d5-64afed65cb71 /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /edat_dir:C:\Windows\Temp\asw.cb29a268e58a04f0 /online_installer
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated
            5⤵
            • Executes dropped EXE
            PID:2456
          • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe" /check_secure_browser
            5⤵
            • Executes dropped EXE
            PID:2916
          • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1600
          • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe
            "C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2764
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

          Filesize

          27KB

          MD5

          eb10dfa08fbe64dae8aa55512cee8d4d

          SHA1

          87e64c5889f1c9a9fdc2e12d60de2707a7609c19

          SHA256

          4f754e1f227ce72275638af6c479bfe0b626b9b66fa38ff086681bd4023c4ffd

          SHA512

          700c120ab4bd44483eac011e5785c474b2ab2f77652798a7257cd020c00106e3a10a92a44030f77b65b5b644c7b87d5c5dd497e5fe3ad061fc2abfe25134b3b9

        • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\Setup.log

          Filesize

          1KB

          MD5

          eb1085b049a2ed7eab9c28ee71ceecfc

          SHA1

          c173b6595d806738a89f2b968235aa52bf6b48fb

          SHA256

          e006de550dfcdf87a3eb57f22fbc820c32f52ea87d1e0800c8c021adaa71e40b

          SHA512

          509aec441a2385aaabec35166716283011135f765517791b5194b6551a550d3f1a7b7328b4bee54ea8794d7581e3a8d54d384776f9bcbdb531a4e666eb84c4d2

        • C:\ProgramData\AVG\Persistent Data\Antivirus\Logs\event_manager.log

          Filesize

          142B

          MD5

          816dc924909f413325b1de6d1304f3cf

          SHA1

          86c9e91593ed6f42a21b28437e4ae5803f964c8d

          SHA256

          1ad913d766d4488fd44af4c173ca9302395b22e2b72a6d6f7c92b1b57ba4daa4

          SHA512

          b7e2c1378bf1eee0ef204d1a4ee6bf38be0b1056bd5695fc243be993e841965dc4c8daf875d6b3718ad0268980f40bc9338baa80a72a45402c5e4305a9fcc1a3

        • C:\Windows\Temp\asw.1e69161b0325ef6b\HTMLayout.dll

          Filesize

          4.0MB

          MD5

          4cc6efda014cc654142c97cd09175e37

          SHA1

          9ff80f73eb8aa9563ee04f3857fedbb4167a9a2a

          SHA256

          0ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2

          SHA512

          064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751

        • C:\Windows\Temp\asw.1e69161b0325ef6b\Instup.dll

          Filesize

          18.1MB

          MD5

          e9134948a4db2642f9bfaaf157a18bd0

          SHA1

          98249d941c196e9ee01f5d77713f13a12fff87f4

          SHA256

          67721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a

          SHA512

          629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\asw6d61f1cd5e0335fc.tmp

          Filesize

          907KB

          MD5

          43dc9e69f1e9db4059cf49a5e825cfda

          SHA1

          519298f8a681b41d2d70db2670cc7543f1ee6da4

          SHA256

          98efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d

          SHA512

          d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\asw71a9ca5e98a73548.tmp

          Filesize

          4.5MB

          MD5

          bbb61ad0f20d3fe17a5227c13f09e82d

          SHA1

          01700413fc5470aa0ba29aa1a962d7a719a92a82

          SHA256

          39154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e

          SHA512

          c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\asw809f88f77aee98c3.tmp

          Filesize

          19.1MB

          MD5

          917a284494cbe4a4ec85e1ec768339c9

          SHA1

          47ccc0a04ecc7c3c1ff79bf42d424cfda356137c

          SHA256

          57cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772

          SHA512

          90849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswc50300b388914e52.tmp

          Filesize

          831KB

          MD5

          ce4d45d0b684f591d5a83fdbd99bd306

          SHA1

          e89637b905c37033950afadaca2161bd5b09fb5e

          SHA256

          907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7

          SHA512

          af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswd14c4164c0154614.tmp

          Filesize

          15KB

          MD5

          e38cc92cd980a55d811316ac62883e14

          SHA1

          fa83737abe11ee825c3da6843cc4d8e3b459729a

          SHA256

          be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87

          SHA512

          1422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16

        • C:\Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\aswd618281e734080da.tmp

          Filesize

          3.8MB

          MD5

          0b830444a6ef848fb85bfbb173bb6076

          SHA1

          27964cc1673ddb68ca3da8018f0e13e9a141605e

          SHA256

          63f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f

          SHA512

          31655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65

        • C:\Windows\Temp\asw.1e69161b0325ef6b\asw6dbe6b184484ad5c.ini

          Filesize

          572B

          MD5

          46c6d7333813406a0908c184782c559b

          SHA1

          590a8c4caa7cb6b8deaca4ca23666dfd65354264

          SHA256

          33094e1895684e227c37ecec9c625b6662c122584f1be3ab5d94fcfe3b4c736c

          SHA512

          656de0435fb83bf5fd17a70d0603a2b57ef8c43f89fcb25682ee3512513934714e80f8006ecce6dd2037db8ce538e52eb3f36ad938e62166070334ba44989a0f

        • C:\Windows\Temp\asw.1e69161b0325ef6b\config.def

          Filesize

          23KB

          MD5

          14174a192d97c54af2db1167dad619fc

          SHA1

          3d3a3033f7ea584347e607c3012240b886dc46a8

          SHA256

          4007543d32edfe93aba295d5f46cd0d2e7c71b3b4d0b29bd886adb570a7b285c

          SHA512

          ab6777a12bb76332b3eff007088dacb8a14984fe2f0accf86a3595ad6dc3746195263fd557bb17a07dcc37b757cb33883b71c0d27a0842d10c095516f6f89c97

        • C:\Windows\Temp\asw.1e69161b0325ef6b\config.def

          Filesize

          18KB

          MD5

          b86dd14aadb9e34d004ad39a4693ced0

          SHA1

          1cb7775cee3e4106b2ddba89a0ccdc9dd547c521

          SHA256

          b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878

          SHA512

          03cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1

        • C:\Windows\Temp\asw.1e69161b0325ef6b\config.def

          Filesize

          18KB

          MD5

          1f176486131d1f922129c3c8f5142595

          SHA1

          f89ab25d06c895bdd62de23856a7ff1f109ad0dd

          SHA256

          421e5a406f20b5b4109bdfd520748dd5febf3e25847838d9ae21529cde182e9b

          SHA512

          c70b02abda87b18e4d5413f1fda9ea2dc46f30542a0333058958296d7b0de916ae0ecbfd5f47d01bdfce4993f6eb4d0b63e30d8e1cfc3fe67f8f2cb2bb3e5eff

        • C:\Windows\Temp\asw.1e69161b0325ef6b\config.ini

          Filesize

          669B

          MD5

          2fde80532cfcf952095a9e91a729ff61

          SHA1

          5a29f9f5f5bf44947f3776b8eeba6bf27ba02796

          SHA256

          10c5450bab0818a377ad05b5bc49267552cbb68d9ac8302e6d34a06b3f95c79c

          SHA512

          c3696ad37cc5bbe3193a20536403c8ceef51b4bfb62de781e7d4e9c33616efc917a50fca484d6c8ab31f53629c16860cb94c1ed4039f429a37ca0551a2a272f8

        • C:\Windows\Temp\asw.1e69161b0325ef6b\part-jrog2-7a.vpx

          Filesize

          211B

          MD5

          029594e2a837803f50b842a87bce0413

          SHA1

          e2850fbbb8c066e6acc771b586b670e109f41709

          SHA256

          5cc54f13a2c160b8010ed382be9dc03b156ec070410a4074d4de22c1523492d1

          SHA512

          00f7fd4b0ab8bab188cd529a358e47f3b9b85754e0bf96850651d006f8dbd30f03c970f40ca8f62382257412f4ba87a14e35e9ad663164371105cf9c62e73129

        • C:\Windows\Temp\asw.1e69161b0325ef6b\part-prg_ais-15020c62.vpx

          Filesize

          175KB

          MD5

          29b9bfd25fabf42939e3a6877f9b3ece

          SHA1

          c30d865bc2d680311c68eb0bed0e356845f700f9

          SHA256

          ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475

          SHA512

          a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e

        • C:\Windows\Temp\asw.1e69161b0325ef6b\part-setup_ais-15020c62.vpx

          Filesize

          5KB

          MD5

          d5b798d8816b252e7d718195dfeb8a8c

          SHA1

          860c5807fd491aeeb12d661d8cf2ecca4ca1639b

          SHA256

          75176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499

          SHA512

          16cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5

        • C:\Windows\Temp\asw.1e69161b0325ef6b\part-vps_windows-24061201.vpx

          Filesize

          7KB

          MD5

          4fe64f4a6a83da82fefde63d3873ce43

          SHA1

          ab35bfe47a520fa7e09a97145fc7746261ef4906

          SHA256

          196983eb82410a7c045c828e3f5d796ac23b31bd39ff83077ccb0d5800302558

          SHA512

          9c4badae12ca9ae74a985a6058890f9fa463fc95a5df42432912ccfa7f0f633e00a59abfd7e79e4632b8b9ec16013313344fd6849ef157700d0c7d51379f8fcf

        • C:\Windows\Temp\asw.1e69161b0325ef6b\prod-pgm.vpx

          Filesize

          572B

          MD5

          6d08ac0131cac7a2f9f2ea5d9d0b0cc6

          SHA1

          25983c1419089c6a7570963dda2d06e022b3b36d

          SHA256

          846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f

          SHA512

          753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c

        • C:\Windows\Temp\asw.1e69161b0325ef6b\prod-vps.vpx

          Filesize

          343B

          MD5

          b516373c4f4f0bd98bbbcd71b4022e4d

          SHA1

          fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062

          SHA256

          52e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099

          SHA512

          b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469

        • C:\Windows\Temp\asw.1e69161b0325ef6b\prod-vps.vpx

          Filesize

          341B

          MD5

          0f0b7bf12895cd6de6ad861763aeb094

          SHA1

          6e6f4fa3fac91de6a81bfc72fc90352f7a82d612

          SHA256

          57f649a2b539b6b9f345e883fd5a541208ab88825daebb6fedef627c6f6290d0

          SHA512

          bdb482b556c391d40f1e2228e32e7b11399bbe0379d25e219bf8f7745f8e7d1c0d104cb4f090d3814d4d7987008f49f750542c747bc0d761bae66d123fa5918f

        • C:\Windows\Temp\asw.1e69161b0325ef6b\servers.def

          Filesize

          27KB

          MD5

          2b62fb1ecd174c7e951f2b8af502c1c0

          SHA1

          90744a9355dd5b74d2ecc7ee34fccbeca1c18f1b

          SHA256

          1fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67

          SHA512

          0f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0

        • C:\Windows\Temp\asw.1e69161b0325ef6b\servers.def.vpx

          Filesize

          1KB

          MD5

          ca027a5ef5f6d21d7e42855fa4db4120

          SHA1

          eee669fe1c3cabd5f96c65ac992e4851f8eca9da

          SHA256

          e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d

          SHA512

          8dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491

        • C:\Windows\Temp\asw.1e69161b0325ef6b\setup.def

          Filesize

          37KB

          MD5

          3fc9d055795a4c01893e5661f300c513

          SHA1

          29c64165afecea436a2dcb57dd5b54163a002df4

          SHA256

          425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0

          SHA512

          e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902

        • C:\Windows\Temp\asw.1e69161b0325ef6b\uat64.vpx

          Filesize

          16KB

          MD5

          bd33707a5e0b6cc434fbaa32e69cb30a

          SHA1

          34ddc8fbda6acef9e07de571d4c00e65e3c09958

          SHA256

          bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036

          SHA512

          02b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de

        • C:\Windows\Temp\asw.cb29a268e58a04f0\ecoo.edat

          Filesize

          56B

          MD5

          d5abc1383ade19cd9efbb1a2fae79d79

          SHA1

          e9bd1c16e77d767c3cc4de19b9d980812df712c9

          SHA256

          13e344bc277c0a5a3dc77d5fd1ccb57913570ad0d61da8902a5ff2efb4c34fa1

          SHA512

          1e1bbf2d2055290f31fae5434c35a6e2d2859d8421abced559ae699b403390ff7b5cfa19de883625bab0287ddf198f33393ae4fb6683993ddb711c5dd7a5073f

        • \Windows\Temp\asw.1e69161b0325ef6b\Instup.exe

          Filesize

          3.6MB

          MD5

          cb33ee6145c1dfad640103e1bc8b00e9

          SHA1

          e68405536c9501a5f7617636db734a7e7bfdb61c

          SHA256

          068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac

          SHA512

          31608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b

        • \Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\asw131350b694fba390.tmp

          Filesize

          3.1MB

          MD5

          c545527e69a46359a4a45f58794a0fe5

          SHA1

          e233e5837bfe5d1429300fb33f12f5b54689781b

          SHA256

          8d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9

          SHA512

          754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0

        • \Windows\Temp\asw.1e69161b0325ef6b\New_15020c62\gcapi_17182005251600.dll

          Filesize

          348KB

          MD5

          2973af8515effd0a3bfc7a43b03b3fcc

          SHA1

          4209cded0caac7c5cb07bcb29f1ee0dc5ac211ee

          SHA256

          d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0

          SHA512

          b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e

        • \Windows\Temp\asw.1e69161b0325ef6b\uat64.dll

          Filesize

          29KB

          MD5

          c53dc6d8050e08d12939b95e2f5c53dc

          SHA1

          01f3fd1a4c730cad939d243e6bb8f9fe8f1e0138

          SHA256

          5a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece

          SHA512

          75ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a

        • \Windows\Temp\asw.cb29a268e58a04f0\avg_antivirus_free_setup_x64.exe

          Filesize

          9.5MB

          MD5

          72c1cad77d7a37f6eed6606b00b22738

          SHA1

          1883d039f42ead5318de8f5f37b61bad4b61fa72

          SHA256

          47cee4d44e8fe27f3229fa751c11259227a00b605d6a42e2cb066f100a9049c3

          SHA512

          87104f2cf47683f113398e71b795fbeadd6835b5d333e1aedf22e7d3afec7de3e138cbc949947235ff4892489caaf219405832df91885084e361806ac22d0209

        • memory/1848-325-0x000007FEF3210000-0x000007FEF35EA000-memory.dmp

          Filesize

          3.9MB

        • memory/1848-324-0x000007FEF35F0000-0x000007FEF4916000-memory.dmp

          Filesize

          19.1MB

        • memory/1848-326-0x000007FEF35F0000-0x000007FEF4916000-memory.dmp

          Filesize

          19.1MB

        • memory/1848-336-0x000007FEF35F0000-0x000007FEF4916000-memory.dmp

          Filesize

          19.1MB

        • memory/1848-338-0x000007FEF35F0000-0x000007FEF4916000-memory.dmp

          Filesize

          19.1MB

        • memory/1848-343-0x000007FEF3210000-0x000007FEF35EA000-memory.dmp

          Filesize

          3.9MB

        • memory/1848-342-0x000007FEF35F0000-0x000007FEF4916000-memory.dmp

          Filesize

          19.1MB