Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 13:54

General

  • Target

    2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe

  • Size

    219KB

  • MD5

    df5f5189b5ad2dbe381c497e2014cff5

  • SHA1

    6186f4ebdbb0089108ead978e3eb7d48b36b83e2

  • SHA256

    2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532

  • SHA512

    38323e075be56e3df22fb63bdfdd5fa4559b4f61fcdae0380c7857fe3701635e6462ace533e4e079444180732e0180f9104771ca1b5408573077db637f222b6d

  • SSDEEP

    6144:20KgGwHqwOOELha+sm2D2+UhngN2K4Zpk:20KgGXFhazmdVgoK4ZC

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe
    "C:\Users\Admin\AppData\Local\Temp\2221276e667db7e2603f57079dd428ed6cfe8d40ccb5e9d8df78b966e7a9d532.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\Temp\asw.90a2850c3fbdce34\avg_antivirus_free_online_setup.exe
      "C:\Windows\Temp\asw.90a2850c3fbdce34\avg_antivirus_free_online_setup.exe" /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /ga_clientid:d671b3ed-5e80-471f-8554-bdd97c6c948a /edat_dir:C:\Windows\Temp\asw.90a2850c3fbdce34
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus.exe
        C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\icarus-info.xml /install /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /edat_dir:C:\Windows\Temp\asw.90a2850c3fbdce34 /track-guid:d671b3ed-5e80-471f-8554-bdd97c6c948a /sssid:4284
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus_ui.exe
          C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus_ui.exe /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /edat_dir:C:\Windows\Temp\asw.90a2850c3fbdce34 /track-guid:d671b3ed-5e80-471f-8554-bdd97c6c948a /sssid:4284 /er_master:master_ep_cb3879b0-0244-4b8c-a5a4-6924f001bb28 /er_ui:ui_ep_1f0a3be9-4c3c-457c-bfb6-936afa2ab161
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:624
        • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\icarus.exe
          C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\icarus.exe /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /edat_dir:C:\Windows\Temp\asw.90a2850c3fbdce34 /track-guid:d671b3ed-5e80-471f-8554-bdd97c6c948a /sssid:4284 /er_master:master_ep_cb3879b0-0244-4b8c-a5a4-6924f001bb28 /er_ui:ui_ep_1f0a3be9-4c3c-457c-bfb6-936afa2ab161 /er_slave:avg-av_slave_ep_b1261686-7aa9-4aa2-ba68-ce3c05f047c7 /slave:avg-av
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4108
          • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\aswOfferTool.exe
            "C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4548
            • C:\Users\Public\Documents\aswOfferTool.exe
              "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1896
          • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\aswOfferTool.exe
            "C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\aswOfferTool.exe" -checkChrome -elevated
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3832
        • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\icarus.exe
          C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\icarus.exe /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR-GLOWEB-7453-HP-ICARUS /edat_dir:C:\Windows\Temp\asw.90a2850c3fbdce34 /track-guid:d671b3ed-5e80-471f-8554-bdd97c6c948a /sssid:4284 /er_master:master_ep_cb3879b0-0244-4b8c-a5a4-6924f001bb28 /er_ui:ui_ep_1f0a3be9-4c3c-457c-bfb6-936afa2ab161 /er_slave:avg-av-vps_slave_ep_4e0e3055-d9be-472f-aebc-822e0b845deb /slave:avg-av-vps
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:2396
  • C:\Windows\System32\Upfc.exe
    C:\Windows\System32\Upfc.exe /launchtype periodic /cv bEdO2E+oHEevXDS2pOhReA.0
    1⤵
      PID:764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AVG\Icarus\Logs\icarus.log

      Filesize

      60KB

      MD5

      1bbc1791ceb59bcd164764f55b454ae2

      SHA1

      8cb2a93439ff22b9d696d4396dc5c13e16d63f9b

      SHA256

      11a535262ec5bb51ff875c53365c92d02f2e75cc8eef801caf9ed77577afe8c0

      SHA512

      400d40b8cf2e5fa958c76dded437429d9be655970c57dcf76c2e2e346063f78574ee91f57c3c709131930da8a467ada78cb712fcca42c40a1fea0667837ee4b1

    • C:\ProgramData\AVG\Icarus\Logs\icarus.log

      Filesize

      60KB

      MD5

      766ce6b31dc2880e5c7a5ab3f9f49589

      SHA1

      108489b33c5512c680deadbf04ab6f384b0e6387

      SHA256

      b7bb14b9a4c96030908a91726586b12a2810e5d79e8111157d60e34b3d14b7eb

      SHA512

      ce0de074a9345b02951b627524e94a7faffde873121fccc3ae9f7a2a291fd7ec2cf75893510b33999aea60fe6368e97d1a53ad33e6284369b22efe8833d79af6

    • C:\ProgramData\AVG\Icarus\Logs\icarus.log

      Filesize

      129KB

      MD5

      654438daa7baf5c5731cbc79dc536120

      SHA1

      7ba13283bcd1ae8cc53bbe866eb9b4c4b846176c

      SHA256

      3a9ad688c0066a00be689bb9c7af5a4a7c856775fde6170f766d62b8e5336dfb

      SHA512

      c571b874c5d39fa7b4a9de74e7da083e2958cc6aaafd03fb302a3b3957e97e34397be97a4754128d1f080aba7bb768e1611efa192dd8c332c18d722afc945a5f

    • C:\ProgramData\AVG\Icarus\Logs\sfx.log

      Filesize

      13KB

      MD5

      055888668b1135a1f55659c93f1e649f

      SHA1

      45b1290d6419f07c6822691b157cedbe145e421d

      SHA256

      d49f52a0db6473409a74df184589b697428c1471055888d0c6badc6af737aac1

      SHA512

      e6fd61f572963f2ded74ce07f0b2714522d6b75a4cc62c1896ffb70fdf2ba29ee5cdb4a061bc9416031f6f220266381d031b7f28961c5e1796ffd7b79e2b8157

    • C:\ProgramData\AVG\Icarus\Logs\sui.log

      Filesize

      14KB

      MD5

      0ee136b99517680b1168f2b18bf82b19

      SHA1

      a3b8ab314286a64918528171da5fbc814027ecad

      SHA256

      b9231fb1f9aabf5ae0c86c5c6d12ed7b312851dc9839f15fcce3424c47641c70

      SHA512

      e659767fc1dbb89b67aae19dbac8be2ad9fbfd4926e3e56153634381a77a85e43fb843aa698bdc791fdd0a9c66ab5ef5d80d555f98f683d71820a55bd1ae9d91

    • C:\ProgramData\AVG\Icarus\settings\proxy.ini

      Filesize

      278B

      MD5

      b8853a8e6228549b5d3ad97752d173d4

      SHA1

      cd471a5d57e0946c19a694a6be8a3959cef30341

      SHA256

      8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9

      SHA512

      cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

    • C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

      Filesize

      64B

      MD5

      168f03c5c241049561d93853fa2304dc

      SHA1

      ee086aa5bc60436a75015003cb2dd27ae57620ff

      SHA256

      374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e

      SHA512

      169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

    • C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

      Filesize

      72B

      MD5

      32c4eea63bc404a6a9ff5cdcac3a50ae

      SHA1

      ec1c981a1fc50d9926265b298055baa8fc9fafe8

      SHA256

      995e59df8f019a4c371008a5005c7f0ab3be1bee4a45aac6efdde86ac338cde8

      SHA512

      18b51d9f4c919948a725f47bb36c066c81f36f92e4055bd0d1836913009f5805a82d0211681768d0d4b9a25fc7ab0170b63884a8b33a7660d4889cf3b8b702c2

    • C:\Users\Public\Documents\gcapi.dll

      Filesize

      867KB

      MD5

      3ead47f44293e18d66fb32259904197a

      SHA1

      e61e88bd81c05d4678aeb2d62c75dee35a25d16b

      SHA256

      e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905

      SHA512

      927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\config.def

      Filesize

      583B

      MD5

      88b8bbca6adfb658e9f64786290b1508

      SHA1

      a7e19f0be671882e7c0de8d546482d20045139de

      SHA256

      a98977649c4c1e25f732e3023515cac1cf5d54df88d58c170dde6f895bc695fc

      SHA512

      b7329cac2951e04645771d207dc0c095fe81dfa17bd3df185f4da1e1cc4f726750a48921fd97345b6777638e212624d4f0d3824d39f363d9421bbbffd44f3968

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\icarus_product.dll

      Filesize

      851KB

      MD5

      a4085f7f5bd1406f050995b529ed6640

      SHA1

      d59acba50b5ca04eeb55a08dfa09c24445b2e722

      SHA256

      d060cb6368bf7df914a5f6619a3bcc51430558909434f7e565dcea484778d852

      SHA512

      bec6aeed862e12adda63689d806d331946c0b7d743712f1f1c3f11f76e6badfa7752323407ee73b82287f3335034f11014662014db382ad3a19a3c6825dfc6e4

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\product-def.xml

      Filesize

      57KB

      MD5

      79658c0c7aeeefe6821ae642f864772e

      SHA1

      2cfc73956be01440b9d7d17a3e129a2504d3bcfe

      SHA256

      971e697d2e640b2be654c57ac1e1a523ff3b6b243157f26abfa276cd2b9d0bd8

      SHA512

      41fc6322f183a51a545daa08b168c19d61e07daf82edd5f3070da9e77aa447ab358480b5caf0226ae0ccc7d77486ccd6e4d354ea0d83d8576fac26dc1d94d523

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av-vps\product-info.xml

      Filesize

      5KB

      MD5

      44f890102c5bc0cf48e4d586e0824c84

      SHA1

      939f09d220caa71214024956bf5d7848f4bc9096

      SHA256

      3a5a48c214c2759eb9a6b2f621ac0af16b564e5774d214db925629bbc7692af9

      SHA512

      3977244dbba86d07eedfe29589ffd13c77e307936d59cb81d44659f67d219c8dc2d0973056aa2a038120f806b2acbf45443af3624c7fcc5596131024e6007e6d

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\aswOfferTool.exe

      Filesize

      2.3MB

      MD5

      14ab1b335b1b9a39a7c3038626ef9d3d

      SHA1

      96608c4427861b524cea46ec47bd5185ea10815a

      SHA256

      90364dd980f0c7a8b126d5fb65c7788921e13aba273ad8fb296b5eba59778f12

      SHA512

      913188939451702639f34299145e4a1719ce5ee416aa9ef13fbdec868185a9b6ccbedd4b0fbc8212f72035b757780c368e6f7d44b93dfb46e3577be1c16ab1d5

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\config.def

      Filesize

      757B

      MD5

      264d61ef38e6f06891da07c11bf71436

      SHA1

      e4a258aa41ce4aaacdfa7f5c0f6f11d4859fe1b2

      SHA256

      96976bd5ecb653aded30321685e44a59886901652c031de101e3a13326d61387

      SHA512

      c818737bcb76b4d50673c8007118320f0b6081108f4934016a04167d5a8f4835393274438769e05276c5db79c5d9f5e4e3748788a1439c974bdf16b3d5dd6890

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\config.def.edat

      Filesize

      20KB

      MD5

      934e4c0db2900855ec6b7bada158d464

      SHA1

      095811d2cc7924bf2b4c0d88537de9eaca106eb3

      SHA256

      b419fe15dd54882a70e9c1ff902467d2e1abfa8565a9cfd0770481ff0ac84e10

      SHA512

      0d7a0c5a0c545e6dc35d14ec16486f146e89145c2ac7126780012723ebb57d968b46208c6fd379f1d01ca3af188afb68e5a4fd74c351f40134f40630c50ef7a8

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\edition.edat

      Filesize

      2B

      MD5

      9bf31c7ff062936a96d3c8bd1f8f2ff3

      SHA1

      f1abd670358e036c31296e66b3b66c382ac00812

      SHA256

      e629fa6598d732768f7c726b4b621285f9c3b85303900aa912017db7617d8bdb

      SHA512

      9a6398cffc55ade35b39f1e41cf46c7c491744961853ff9571d09abb55a78976f72c34cd7a8787674efa1c226eaa2494dbd0a133169c9e4e2369a7d2d02de31a

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\avg-av\icarus_product.dll

      Filesize

      6.0MB

      MD5

      48868d9172e27b4dab1e0608bebb79c0

      SHA1

      7680a1779631b10e76ce4b7ab5993cb438fa1add

      SHA256

      dfdcaa2c3313544eeb19361a5fa343fe7e820a0ec6f37c6e6b866dd56f1e7c94

      SHA512

      848e5565a8f8809acf4ca7be594dbadf95ace9f4806e25b6bad8075acd247d10d85dd295ea85f6c63c8b8ede149afd8866e3ec0879c581892064323b107f66a2

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\bug_report.exe

      Filesize

      4.8MB

      MD5

      51d5604dd0a85f5fa6586980e64d0785

      SHA1

      cfc31d787dbf01e039971365a9c7a1b6affa1132

      SHA256

      0bc7930fe347a5a4a0ad244f60122a4635baf0695ca30c9ac8df923f540013e6

      SHA512

      247490f99e7f8343c00223c1cb2a596ed12584f76c0c3fff24d14859651dacc11ef5ecaa5785af063ee62965b6c8bc535e12d1b78fa43c2bb3f8b133b5af0bda

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\dump_process.exe

      Filesize

      3.4MB

      MD5

      21d84898683d48daa44ed5a2f0f3591b

      SHA1

      d1a3d3755d2facb545e69578459f64bb7ddc736b

      SHA256

      c109510846192f6f93efb0955a784c302b07858c98a8548e861209b353a31e71

      SHA512

      5bb4a5e0039059f32ef77aa4d45a7661801f539fe341fd1ed667da5ca8b20dad6d5ca405260084f780af4b2ff8db93c3598f859fe9d5d88cbeeb7d9f6dd0d117

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus.exe

      Filesize

      7.7MB

      MD5

      392d142e6b814f42079d5ed9011758f4

      SHA1

      4111eb5a27f84c26f1a95cc8d577e5b3743dfebf

      SHA256

      dfefb27fc9a96a2a7aab2059067d670178ede0f926215464d61c298e8e3f895f

      SHA512

      11678c9857ced88d947779b10089a91abc1e80a43f6518289c4fea88353241767406a59a6e682bf300344a7a5aab34126b373aff33fad04d0fee4a78db01b58d

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus_mod.dll

      Filesize

      14KB

      MD5

      ce33da043c6139937b48164733916798

      SHA1

      578b88b7369d76aab8fc671dc9e75125d4006b07

      SHA256

      41ed21bcc7c2e31bd5d7b40f2fdf6fb4a27e07e07ff454a560ab9563265c7786

      SHA512

      ce2ef23cde2b5ee30cd3479ed20946f07055262b6d644fa4dc97c421f1e012a5acf5737dd69024771e2ac14d13742acd3a32a3cbb28c51d7e12b36b42c8185bb

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\icarus_ui.exe

      Filesize

      11.7MB

      MD5

      93ac5443af08533a675113b0227705c0

      SHA1

      cecc66d306ec3a4cfbe93abf51472385aa157795

      SHA256

      3342f6600ce7e3a7f88d041ad8f4a27fe8f06dc549c371d28eb202e4ec7e8064

      SHA512

      9de0fd990e88ec37655b7968623823c9cef7aa2444573d8f7863cb77d6b55622e41197612421a19f08f60b65bd59f8d656556d6254b16ed8fcfed0613ca73071

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\product-def.xml

      Filesize

      1.3MB

      MD5

      bb399f3eb4cb55dc8f2467c1625535c6

      SHA1

      3b47ad5966bab7ad26b263e14a38c7792b9ee349

      SHA256

      10bd70200dc8414774e02c8751d7f35e5d8ee80657db4c2efc54369e1da59d2f

      SHA512

      7294a989592fae569f1066451f6dd7fd36c52ad20d956d6be20cf69e070ed812fdc9b6dd506c74b54d9fb35a31c5382b8353ca814207dd69b98f7963da7e6717

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\product-info.xml

      Filesize

      9KB

      MD5

      ec1d45e035964aa35a3e34138de2eb0e

      SHA1

      72dcf5cc92f0ddd139aedd754a7dc22bcd49082e

      SHA256

      dc5ad9f2d6c6cc5c43c1f2fbb44008997de8c7a6cfdb22b3bbf061b10075284a

      SHA512

      38ad9991b9ec6601810413498decc740fb47130ac70093f9363c0fa17187ec100e89d45f8e798a47a8c8ad2fd64e6ba7d9b5d198d2986431ca08a85efd3e5816

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\common\setupui.cont

      Filesize

      381KB

      MD5

      a55572f37fe1652b92e09b1f2a0d43bd

      SHA1

      4d1ffb01d15c8482607a8fcec2a4bcd905448946

      SHA256

      79f91b261fede95ab25c4a2ed1d118221552a33ba3e13c9746b1f3200bdfc4ef

      SHA512

      1da2fcfa34b72dc64e00f5907d59f68e23be20794884cccb838a41b6023683471dfcb1b0b5bf4695958879aa2e80e8f92385d1b081acde4d4c5002c8a1a468c6

    • C:\Windows\Temp\asw-ce1ea834-bd7c-49d7-b13c-4c2b3db53746\icarus-info.xml

      Filesize

      1KB

      MD5

      a7eafaa4dde8e6d6cfbf56d858b2727a

      SHA1

      f0ea7f1895b036cffacbbceed26e174b39c4aff6

      SHA256

      3af6f0364e6a4dd1165b4860eb3a6d3aefeec703bdabfdea266ea6cca5f3c3dd

      SHA512

      752ff202f79271e5f2d60d38560e68db1c2d7cbac380f71cb5df29171c053fefd4e925f521e11cb1e3e72f55ec77d09133d485e76b7ed3d4c27db2fb7a1494a8

    • C:\Windows\Temp\asw.90a2850c3fbdce34\avg_antivirus_free_online_setup.exe

      Filesize

      1.5MB

      MD5

      532f95e90c93fedd7c1d3758bea1dda6

      SHA1

      ecf90929ae1bcb1bf4247147b247363802ecb1cb

      SHA256

      78d4d80014d4815cd798b44272dba55056b7955a22e29c66e96e2ff47f2bb9a8

      SHA512

      865621304c0a2e993ee62e90c0915883d9e37d5c1ff329347692d32fe33c83366ef554891d61422fbbab6efd1ba3da59071860b5aaccca96ad6ce4d3835f5801