Malware Analysis Report

2025-01-03 09:27

Sample ID 240604-yfmpkahc7x
Target 2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber
SHA256 19557222fc65edc3733f3d1693224c749af2dd6d34af224cc7d3b18993cd738a
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

19557222fc65edc3733f3d1693224c749af2dd6d34af224cc7d3b18993cd738a

Threat Level: Shows suspicious behavior

The file 2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Writes to the Master Boot Record (MBR)

Checks for any installed AV software in registry

Loads dropped DLL

Executes dropped EXE

Modifies registry class

Checks processor information in registry

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 19:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 19:43

Reported

2024-06-04 19:46

Platform

win7-20240419-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAIsT8jOTV+keZhOEchKmQoAQAAAACAAAAAAAQZgAAAAEAACAAAAAyjIUS/rflWTTbXmTvkhINJitSVnVSaFf6D/HFMXxLUAAAAAAOgAAAAAIAACAAAABO1NqOmekxfGtnLdHGiyem9gfGBxFpQia4V1EtRNL7EDAAAAD7M+buRjjL/HByW/6VXXAfD2XhpfB+sd6IVhGHEeEEXyWZK+0rg7d2sH4z0M/TDG5AAAAAiRh6X+uz4gcr5tq6a6uvo55y5in9ygDULi34CUspo2lV3gk6VGNFSWeG9I4n0kFJFm+1anXvHO74da+qonjt9w==" C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "4fc6d5f2-31d0-4b60-9c4c-7b6a9f6b4da8" C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "4fc6d5f2-31d0-4b60-9c4c-7b6a9f6b4da8" C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2288 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe
PID 2288 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe
PID 2288 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe
PID 2288 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe
PID 2720 wrote to memory of 2432 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe
PID 2720 wrote to memory of 2432 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe
PID 2720 wrote to memory of 2432 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe
PID 2720 wrote to memory of 2636 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe
PID 2720 wrote to memory of 2636 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe
PID 2720 wrote to memory of 2636 N/A C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe"

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\icarus-info.xml /install /sssid:2288

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe /sssid:2288 /er_master:master_ep_7e57399a-6929-42f8-bbf9-3f5728247e0a /er_ui:ui_ep_78010efa-1c9d-4e91-bd5c-70ad00f35b1c

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus.exe /sssid:2288 /er_master:master_ep_7e57399a-6929-42f8-bbf9-3f5728247e0a /er_ui:ui_ep_78010efa-1c9d-4e91-bd5c-70ad00f35b1c /er_slave:avg-tu_slave_ep_de3ba236-588d-4485-9d25-e8e043f77938 /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.ff.avast.com udp
US 34.117.223.223:443 analytics.ff.avast.com tcp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 104.73.93.22:443 honzik.avcdn.net tcp
SE 104.73.93.22:80 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.ff.avast.com udp
US 34.160.176.28:443 shepherd.ff.avast.com tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 104.73.93.22:443 honzik.avcdn.net tcp
SE 104.73.93.22:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp

Files

\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 0707f613b1816d58008c26acac6d2760
SHA1 10dfae00cf2a72740096b68baff619c86280b315
SHA256 6831c0248e8b3dd27f53bbde6bd4e23b469beea2c67e520535b2329084cc840f
SHA512 6a399aa2f79e895b8a6b0a034bd02938e6c14d7899a70faae9bba0a16be7ed811b4db4e4c7f431b72e5578223b5de2364c160c2f143b7c4819780b376303ee6c

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\icarus-info.xml

MD5 afeb4385b7c209cd2c1bcbe36cdc1bf9
SHA1 b9d9f55c4dc7e1409c354df2a4a8a3feb9c783af
SHA256 e722e15b8e2f80a76636561bd7786d4743a299a2c259d44e1afb12ed2700673b
SHA512 54e12a14b1859dfb68dfbbb655aec566eecee5159a94016f582f687b12b2247776dd726671e91429a8780e8ddc4fead7a5c69009fe06d2c1c8ffc0d80ece506d

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\ecoo.edat

MD5 9c0399c216de01b580b3459d7dbd45be
SHA1 83de7f6d03030e11c703a61f1b2b3ae556d4e6aa
SHA256 9e32f7058b2a529b923215f674c6f641c66abc3c87f02aa673ae678e83a2cfc4
SHA512 831e7f605d697510f961020db26e232a4c25d07d78617607a049e2471c964b7720c570e3114349fb852cc8310b4aa2ca7dae31bdf7e2ee578a7cfe7d64db34f9

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 0be1084538f367fbf82a62da7f1c05df
SHA1 09b60403b6abe191498dc34a83d17567140bf62b
SHA256 164648b7959db667bd24c19184e4333ca208e69e6c16aa575cc0b7592263646e
SHA512 4a8eb6c362c9e736e86e34744125bd8016e72b5144c27d9f11ea984c340694ae38d2d31c09b3725db35bb89a537c1bdec9aef024b47bb24278cc279c799de13f

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 175e193c6a45b0fc7dfa28d8f645cf92
SHA1 2f5fedda670c40a4862d991a5ac11e46aabf2c98
SHA256 b3d97769241f2883508c7895547bf72ec358b31cff71e1f6e6cf0d5c2c7788d5
SHA512 1c588d75907ac99f29799641a7605c6eb6f3f77f29d9594588b7554026e1f9d404089d93a63dce1e9cf6be0347e8bfe5aec7a342c03f3a9ab8deb506df8e421a

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 dcda05a74f833ca4ef602a182256d468
SHA1 8aff850a6d9989b2cc7822ed4632d5a8aa5d6846
SHA256 8a1e45c6453ad7b5805a12fb5b6b4c2e8142330e683f2ef55ab3132de0e77757
SHA512 8fe29b2bec7d154259a2354220ae2574b5621dc22d75ca7746c57797eeff606ce932740813e5d3fa76596c1851d3ba0b6ef5a4c1b6274b4de367f6a383ccd2e3

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Windows\Temp\asw-4dffc45f-7a3b-42af-927e-d37441b82a8e\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

memory/2432-105-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 19:43

Reported

2024-06-04 19:46

Platform

win10v2004-20240426-en

Max time kernel

91s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAVgQhpkWkuki+27Vx+Lyc0QQAAAACAAAAAAAQZgAAAAEAACAAAACylg8ilm5sefrRLJUvdyCgiteLq9TaKCLNDIwgyKtcrwAAAAAOgAAAAAIAACAAAAAUVVjuU2ApQrNqthwRLj/1EbI2s0Qb9DeRUfo3/3bADzAAAAAN9vRGOoOYIdN1PK2mlY10Ll5eAS0PtdzFXb0NSqjd8DUK0DEFdVhYT4BNRv4urPpAAAAASrFZlwVjPU6zvThBUNz669W/0LcbBtI1lXHhLTr+QpisWMKQfl9slQ8T90M9LAltOoAJXebRXCz+QWj2prPP8w==" C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b59b4824-161b-4f82-a135-4deff9e5900f" C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b59b4824-161b-4f82-a135-4deff9e5900f" C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_a86775c3218b0de53e8a07ca8918e245_magniber.exe"

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\icarus-info.xml /install /sssid:2388

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe /sssid:2388 /er_master:master_ep_40901a63-766a-4aa9-b39f-9dc6979989c3 /er_ui:ui_ep_b1227fa3-4a1a-4837-936a-ddfb6414fb51

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus.exe /sssid:2388 /er_master:master_ep_40901a63-766a-4aa9-b39f-9dc6979989c3 /er_ui:ui_ep_b1227fa3-4a1a-4837-936a-ddfb6414fb51 /er_slave:avg-tu_slave_ep_3b0ec974-988f-40b4-9e69-ed08d85f040c /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.ff.avast.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 34.117.223.223:443 analytics.ff.avast.com tcp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 104.73.93.22:443 honzik.avcdn.net tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 223.223.117.34.in-addr.arpa udp
US 8.8.8.8:53 43.43.201.23.in-addr.arpa udp
SE 104.73.93.22:80 honzik.avcdn.net tcp
US 8.8.8.8:53 22.93.73.104.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.ff.avast.com udp
US 34.160.176.28:443 shepherd.ff.avast.com tcp
US 8.8.8.8:53 28.176.160.34.in-addr.arpa udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 104.73.93.22:443 honzik.avcdn.net tcp
SE 104.73.93.22:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp

Files

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 0ff44565a3be46b1e04294309ab7887a
SHA1 d10a385ca2a5667df6e2f070f4bb7502cacb06b9
SHA256 3fc7f1cc32655d5a6fcca7da9669c8b37d6b46ea0f41c3363bd63b37e4e31ec5
SHA512 3373823d10a5ed3ebd43247841ce51d9b4c8cf240237919ec0fa31e1e2cecee10cb438e9068a34e51bc56dff2d5fc045f5a99124c59a2097354fac17244a5526

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\icarus-info.xml

MD5 bef9dafc39df1a24db8b717b99da0530
SHA1 cd6c6068c45d537c4d5cffa3153a5ac0d2b5a3f4
SHA256 f9a16af70ed19e49af99ca00046d4c8ee15cafa45818cbb8634b8355b8d9ff63
SHA512 894c51cb45bf4aa8ecb814e46c3502a65d82a267a5ab196ed08f5e88c58a2386cd1730655b7aa533c713589e9e83664cc8f07c64f38ad33074cb4bbddc152006

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\ecoo.edat

MD5 9c0399c216de01b580b3459d7dbd45be
SHA1 83de7f6d03030e11c703a61f1b2b3ae556d4e6aa
SHA256 9e32f7058b2a529b923215f674c6f641c66abc3c87f02aa673ae678e83a2cfc4
SHA512 831e7f605d697510f961020db26e232a4c25d07d78617607a049e2471c964b7720c570e3114349fb852cc8310b4aa2ca7dae31bdf7e2ee578a7cfe7d64db34f9

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 62d4b67bb08b852108b778eeceb3ea55
SHA1 b132a6a651c8e3474ba80bc0ad5e00ee8f7a2ab9
SHA256 dc81a12c62803ebc6464de9e962cdab7b272f00ebed8d937f0d899c5aa0be93c
SHA512 dd8861df9508e3d71ac50cdb0f629de9697c4b1541ffffd311308975ca1ebe0d5f16f9c25b2ce898bdbc5ada2406e7c262a2678bbf253204de94c4e6f2551f52

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 78802af9a7c920d9c046ce7153763bb3
SHA1 5c8ac43eeb443295eaecc526a9bfa37f8e173b0d
SHA256 8b534e86f9b864327e1c2ac637e86523fbbc7199c2ce21be6c69be50d64ce962
SHA512 d2fb81ce47a46a55cf76522809ad350d21b7c07dc528a1d3c45e2fd59014c2d775c0939d1be9f9dc8f87441db4639f2283076187d29719f11f93d4347c9d7bc0

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 c0d291b0a00ce9ed7b0d61aefee9eee9
SHA1 0b76e3d31c8f117fc8f1db4696ec512d59dbe326
SHA256 dffc1ba64b6d264c7bc7215c094267019d4908045063846bcb2a9fb749335310
SHA512 9d8eac950e534108450d1f26fba8f7202beb07620ccaab4add8c260044f94b6f2f802859bf73ad16c412df0568674eded697ee14aef5d3a8e1a89d4b370b78a9

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-83e9cc8f-3c24-4bff-bbac-21953ec51c35\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179