Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe
Resource
win10v2004-20240611-en
General
-
Target
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe
-
Size
219KB
-
MD5
03a56575ca7883f9a60bb8008b7d5350
-
SHA1
240896a7268b208fe0fcb1d04ae6429e36db7088
-
SHA256
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398
-
SHA512
c124aad0470dda0d32309a4cb097aec07482a8be99dfce5fe6c291508485baa7c538b55a6f8a2822e3e73a9482e6b2610de707ea60a6921bd6ec499c94704afc
-
SSDEEP
3072:m2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhZK0KJ:m0KgGwHqwOOELha+sm2D2+UhngN7K4t6
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
avg_antivirus_free_online_setup.exeicarus.exeicarus_ui.exeicarus.exeicarus.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exepid process 1540 avg_antivirus_free_online_setup.exe 4636 icarus.exe 1016 icarus_ui.exe 1916 icarus.exe 1824 icarus.exe 412 aswOfferTool.exe 3496 aswOfferTool.exe 1552 aswOfferTool.exe -
Loads dropped DLL 6 IoCs
Processes:
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exeavg_antivirus_free_online_setup.exeicarus.exeicarus.exeaswOfferTool.exeaswOfferTool.exepid process 3620 139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe 1540 avg_antivirus_free_online_setup.exe 1916 icarus.exe 1824 icarus.exe 3496 aswOfferTool.exe 1552 aswOfferTool.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exeavg_antivirus_free_online_setup.exeicarus.exeicarus.exeicarus.exedescription ioc process File opened for modification \??\PhysicalDrive0 139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe File opened for modification \??\PhysicalDrive0 avg_antivirus_free_online_setup.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
icarus.exeicarus.exeicarus.exeicarus_ui.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe -
Modifies registry class 13 IoCs
Processes:
icarus.exeicarus.exeavg_antivirus_free_online_setup.exeicarus.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "71ca528d-52a6-47bc-b1d9-49b5c0007ec3" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA9LwN9XjrHkeaFpKmtNrmHwQAAAACAAAAAAAQZgAAAAEAACAAAADC5V9lwuqml+aTSp1jxMxzX1tW4Jk4CB38X1QLn/3uFwAAAAAOgAAAAAIAACAAAABwHmn6NqLzvRu6mtgvxzZCRFNItP/Maep7X8FZ1badgTAAAABBO7qLCppnxtYla3NsBE9uvvkvCj0+mksxGF1KJ87FPiYNH2Gxsqj/XzNCLPV/iJFAAAAA5yX9al1S+soj9+GC0fEjESaoeVunHb8L20Rw/g7oCpQ17f4mHnttbNn1ctkeY5eQxTGz8Mv+7qm1+i00vJtB2A==" avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "71ca528d-52a6-47bc-b1d9-49b5c0007ec3" avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "71ca528d-52a6-47bc-b1d9-49b5c0007ec3" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "71ca528d-52a6-47bc-b1d9-49b5c0007ec3" icarus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
icarus_ui.exepid process 1016 icarus_ui.exe 1016 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exeicarus.exeaswOfferTool.exedescription pid process Token: SeRestorePrivilege 4636 icarus.exe Token: SeTakeOwnershipPrivilege 4636 icarus.exe Token: SeRestorePrivilege 4636 icarus.exe Token: SeTakeOwnershipPrivilege 4636 icarus.exe Token: SeRestorePrivilege 4636 icarus.exe Token: SeTakeOwnershipPrivilege 4636 icarus.exe Token: SeRestorePrivilege 4636 icarus.exe Token: SeTakeOwnershipPrivilege 4636 icarus.exe Token: SeDebugPrivilege 4636 icarus.exe Token: SeDebugPrivilege 1016 icarus_ui.exe Token: SeRestorePrivilege 1916 icarus.exe Token: SeTakeOwnershipPrivilege 1916 icarus.exe Token: SeRestorePrivilege 1916 icarus.exe Token: SeTakeOwnershipPrivilege 1916 icarus.exe Token: SeRestorePrivilege 1916 icarus.exe Token: SeTakeOwnershipPrivilege 1916 icarus.exe Token: SeRestorePrivilege 1916 icarus.exe Token: SeTakeOwnershipPrivilege 1916 icarus.exe Token: SeRestorePrivilege 1824 icarus.exe Token: SeTakeOwnershipPrivilege 1824 icarus.exe Token: SeRestorePrivilege 1824 icarus.exe Token: SeTakeOwnershipPrivilege 1824 icarus.exe Token: SeRestorePrivilege 1824 icarus.exe Token: SeTakeOwnershipPrivilege 1824 icarus.exe Token: SeRestorePrivilege 1824 icarus.exe Token: SeTakeOwnershipPrivilege 1824 icarus.exe Token: SeDebugPrivilege 1916 icarus.exe Token: SeDebugPrivilege 1824 icarus.exe Token: SeDebugPrivilege 412 aswOfferTool.exe Token: SeImpersonatePrivilege 412 aswOfferTool.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
avg_antivirus_free_online_setup.exeicarus_ui.exepid process 1540 avg_antivirus_free_online_setup.exe 1016 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
icarus_ui.exepid process 1016 icarus_ui.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exeavg_antivirus_free_online_setup.exeicarus.exeicarus.exedescription pid process target process PID 3620 wrote to memory of 1540 3620 139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe avg_antivirus_free_online_setup.exe PID 3620 wrote to memory of 1540 3620 139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe avg_antivirus_free_online_setup.exe PID 3620 wrote to memory of 1540 3620 139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe avg_antivirus_free_online_setup.exe PID 1540 wrote to memory of 4636 1540 avg_antivirus_free_online_setup.exe icarus.exe PID 1540 wrote to memory of 4636 1540 avg_antivirus_free_online_setup.exe icarus.exe PID 4636 wrote to memory of 1016 4636 icarus.exe icarus_ui.exe PID 4636 wrote to memory of 1016 4636 icarus.exe icarus_ui.exe PID 4636 wrote to memory of 1916 4636 icarus.exe icarus.exe PID 4636 wrote to memory of 1916 4636 icarus.exe icarus.exe PID 4636 wrote to memory of 1824 4636 icarus.exe icarus.exe PID 4636 wrote to memory of 1824 4636 icarus.exe icarus.exe PID 1824 wrote to memory of 412 1824 icarus.exe aswOfferTool.exe PID 1824 wrote to memory of 412 1824 icarus.exe aswOfferTool.exe PID 1824 wrote to memory of 412 1824 icarus.exe aswOfferTool.exe PID 1824 wrote to memory of 1552 1824 icarus.exe aswOfferTool.exe PID 1824 wrote to memory of 1552 1824 icarus.exe aswOfferTool.exe PID 1824 wrote to memory of 1552 1824 icarus.exe aswOfferTool.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe"C:\Users\Admin\AppData\Local\Temp\139621391dd57244197e2c892e42b96e90570f701d3efae5e1d2b05cb4e6b398.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exe"C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exe" /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /ga_clientid:01904e77-ebb1-43b3-888d-c551bbeaab6d /edat_dir:C:\Windows\Temp\asw.4875309771f3138c2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exeC:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\icarus-info.xml /install /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:15403⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exeC:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da4204⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus.exeC:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da420 /er_slave:avg-av-vps_slave_ep_d9c93ef9-aa38-491c-97cd-ff3b509794b2 /slave:avg-av-vps4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus.exeC:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus.exe /cookie:mmm_bav_012_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-PPC-BRAND-ICARUS /edat_dir:C:\Windows\Temp\asw.4875309771f3138c /track-guid:01904e77-ebb1-43b3-888d-c551bbeaab6d /sssid:1540 /er_master:master_ep_a1b42d73-0be9-4724-9b55-d8e2729acfcb /er_ui:ui_ep_bea1db32-e281-4814-ae2d-5318471da420 /er_slave:avg-av_slave_ep_a3851a44-ba34-4dad-b44c-3cac325243eb /slave:avg-av4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe"C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe"C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
61KB
MD54519c605c52071ac7ea4cd81f73f7591
SHA1496a4fbf8e8b6ae81217aef847d495fa9f62818a
SHA25684fdade20ccd13e7a7b8be7c72208a10db73bb537d04417edfe9bd26e193d97b
SHA51205aa64a805a2142172918e1662d941d1f04ee0c4d3ede38323e790bf29fe45c4e2b6af1f3097cd7df9c11f5f70362397e7abe182925922fbe1cc963f319aa0b9
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
109KB
MD597dcfc7ed06dda41d62029d97ef0cdf9
SHA1e1fdde04f3eb57c6778214165d514167c69b5340
SHA2565c4a24cf2f51601441174c6d1cc63584bbeb54123ec3b295b2cefd62c0dfb44c
SHA512b18b3ad9c7a7cc0092701310a608fc024aecb99bc4af84bd5b7f3932f69234ea9a3ace91b64dfdb0cac1e7ae8a91e646a2f70e071c842073fbea19eb75bcc1fd
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
110KB
MD5b561d078b76210ee52574358024c5ff8
SHA1a129ee29f7e8813ece55b5fe50222610627e5fc6
SHA256982a16527e247ef76df4f7c4a603eeedf81359ec97cbb43cf6e686ea88d08aa8
SHA5126b140fa060d4db37e1f6490f784ad0a43fb41bac32491bd3986515ebaebf64e6f86b3e825777482cd9c344dd6ae9c53f38033dc7af44113e3b7ed7fc566a46f8
-
C:\ProgramData\AVG\Icarus\Logs\report.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\AVG\Icarus\Logs\sfx.logFilesize
13KB
MD5182cd05c2853f7ab5ea9deae12ed3b85
SHA16d0987ff4767520b7e7f1932981ae72036be818c
SHA25615c30aabfd4704529d87e2c789ba0a3f82155d202983ba1fdb85d36ecde4d0a7
SHA51215e1221ce45fb223ca73fe8d21a57041e83dc53d4d7b46fa64fe828bf33ff36dcd33e176751224aeb1eef561bcfa70e50cc91d5dd98fbc158a64ad526d15c775
-
C:\ProgramData\AVG\Icarus\Logs\sui.logFilesize
15KB
MD5bc130d43259119f8251e1730a7f6e948
SHA19d35860b30fa4e2a8a87b0a5e196830dbf8310be
SHA256abf82f96236764402abf6ee60eab8b3770b9c8bff23a863f2dfc50658df57cba
SHA512e4adf515678e517aaadb948f353bb3c33cb1590016bdc668ecfd8f8f84b5f72f0d6dded04da3f30803df896fc56477f15efdc1483909992f48bb104bfccf3255
-
C:\ProgramData\AVG\Icarus\Logs\sui.logFilesize
16KB
MD5794e8bcaaf46747e5bd2a600d5e12ec2
SHA190eee76b71cdf70db4a6a86fe08296d672ef4bac
SHA256331665b1c897d2574043cfb65c3dd9c3b40d212f9b4f5d3efa85e3e9cc6bfc41
SHA512db4b80c29a0f186099f15a52d2b0b0a5a560c89495d62cb208957f6ef8b960f0e18d523abd5dc014b50c9c1e1e1e15b00c53d14212899c796e8606311752cf26
-
C:\ProgramData\AVG\Icarus\settings\proxy.iniFilesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3Filesize
64B
MD5168f03c5c241049561d93853fa2304dc
SHA1ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179
-
C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0Filesize
72B
MD53f2af8673964469793e82fde02345d1f
SHA118437263403c433448df1e12a8081257ff2925b9
SHA256db4ebd456a95bf34880c1bea31560d05095faace705af02ecae446eb3b214bcc
SHA5129c396f5dcb6e464d621384fda9acd952673d49390f6e3d2924bc693f3d4aa5f656bf845642d8b39f2146ea086b33949626dc356ec9fbe95b38bd48d7843383c3
-
C:\Users\Public\Documents\gcapi.dllFilesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\bug_report.exeFilesize
4.8MB
MD551d5604dd0a85f5fa6586980e64d0785
SHA1cfc31d787dbf01e039971365a9c7a1b6affa1132
SHA2560bc7930fe347a5a4a0ad244f60122a4635baf0695ca30c9ac8df923f540013e6
SHA512247490f99e7f8343c00223c1cb2a596ed12584f76c0c3fff24d14859651dacc11ef5ecaa5785af063ee62965b6c8bc535e12d1b78fa43c2bb3f8b133b5af0bda
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\config.defFilesize
583B
MD588b8bbca6adfb658e9f64786290b1508
SHA1a7e19f0be671882e7c0de8d546482d20045139de
SHA256a98977649c4c1e25f732e3023515cac1cf5d54df88d58c170dde6f895bc695fc
SHA512b7329cac2951e04645771d207dc0c095fe81dfa17bd3df185f4da1e1cc4f726750a48921fd97345b6777638e212624d4f0d3824d39f363d9421bbbffd44f3968
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\dump_process.exeFilesize
3.4MB
MD521d84898683d48daa44ed5a2f0f3591b
SHA1d1a3d3755d2facb545e69578459f64bb7ddc736b
SHA256c109510846192f6f93efb0955a784c302b07858c98a8548e861209b353a31e71
SHA5125bb4a5e0039059f32ef77aa4d45a7661801f539fe341fd1ed667da5ca8b20dad6d5ca405260084f780af4b2ff8db93c3598f859fe9d5d88cbeeb7d9f6dd0d117
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\icarus_product.dllFilesize
851KB
MD5a4085f7f5bd1406f050995b529ed6640
SHA1d59acba50b5ca04eeb55a08dfa09c24445b2e722
SHA256d060cb6368bf7df914a5f6619a3bcc51430558909434f7e565dcea484778d852
SHA512bec6aeed862e12adda63689d806d331946c0b7d743712f1f1c3f11f76e6badfa7752323407ee73b82287f3335034f11014662014db382ad3a19a3c6825dfc6e4
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\product-def.xmlFilesize
57KB
MD579658c0c7aeeefe6821ae642f864772e
SHA12cfc73956be01440b9d7d17a3e129a2504d3bcfe
SHA256971e697d2e640b2be654c57ac1e1a523ff3b6b243157f26abfa276cd2b9d0bd8
SHA51241fc6322f183a51a545daa08b168c19d61e07daf82edd5f3070da9e77aa447ab358480b5caf0226ae0ccc7d77486ccd6e4d354ea0d83d8576fac26dc1d94d523
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av-vps\product-info.xmlFilesize
5KB
MD544f890102c5bc0cf48e4d586e0824c84
SHA1939f09d220caa71214024956bf5d7848f4bc9096
SHA2563a5a48c214c2759eb9a6b2f621ac0af16b564e5774d214db925629bbc7692af9
SHA5123977244dbba86d07eedfe29589ffd13c77e307936d59cb81d44659f67d219c8dc2d0973056aa2a038120f806b2acbf45443af3624c7fcc5596131024e6007e6d
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\aswOfferTool.exeFilesize
2.3MB
MD514ab1b335b1b9a39a7c3038626ef9d3d
SHA196608c4427861b524cea46ec47bd5185ea10815a
SHA25690364dd980f0c7a8b126d5fb65c7788921e13aba273ad8fb296b5eba59778f12
SHA512913188939451702639f34299145e4a1719ce5ee416aa9ef13fbdec868185a9b6ccbedd4b0fbc8212f72035b757780c368e6f7d44b93dfb46e3577be1c16ab1d5
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\config.defFilesize
757B
MD5264d61ef38e6f06891da07c11bf71436
SHA1e4a258aa41ce4aaacdfa7f5c0f6f11d4859fe1b2
SHA25696976bd5ecb653aded30321685e44a59886901652c031de101e3a13326d61387
SHA512c818737bcb76b4d50673c8007118320f0b6081108f4934016a04167d5a8f4835393274438769e05276c5db79c5d9f5e4e3748788a1439c974bdf16b3d5dd6890
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\config.def.edatFilesize
20KB
MD5934e4c0db2900855ec6b7bada158d464
SHA1095811d2cc7924bf2b4c0d88537de9eaca106eb3
SHA256b419fe15dd54882a70e9c1ff902467d2e1abfa8565a9cfd0770481ff0ac84e10
SHA5120d7a0c5a0c545e6dc35d14ec16486f146e89145c2ac7126780012723ebb57d968b46208c6fd379f1d01ca3af188afb68e5a4fd74c351f40134f40630c50ef7a8
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\edition.edatFilesize
2B
MD59bf31c7ff062936a96d3c8bd1f8f2ff3
SHA1f1abd670358e036c31296e66b3b66c382ac00812
SHA256e629fa6598d732768f7c726b4b621285f9c3b85303900aa912017db7617d8bdb
SHA5129a6398cffc55ade35b39f1e41cf46c7c491744961853ff9571d09abb55a78976f72c34cd7a8787674efa1c226eaa2494dbd0a133169c9e4e2369a7d2d02de31a
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\avg-av\icarus_product.dllFilesize
6.0MB
MD548868d9172e27b4dab1e0608bebb79c0
SHA17680a1779631b10e76ce4b7ab5993cb438fa1add
SHA256dfdcaa2c3313544eeb19361a5fa343fe7e820a0ec6f37c6e6b866dd56f1e7c94
SHA512848e5565a8f8809acf4ca7be594dbadf95ace9f4806e25b6bad8075acd247d10d85dd295ea85f6c63c8b8ede149afd8866e3ec0879c581892064323b107f66a2
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus.exeFilesize
7.7MB
MD5392d142e6b814f42079d5ed9011758f4
SHA14111eb5a27f84c26f1a95cc8d577e5b3743dfebf
SHA256dfefb27fc9a96a2a7aab2059067d670178ede0f926215464d61c298e8e3f895f
SHA51211678c9857ced88d947779b10089a91abc1e80a43f6518289c4fea88353241767406a59a6e682bf300344a7a5aab34126b373aff33fad04d0fee4a78db01b58d
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_mod.dllFilesize
14KB
MD5ce33da043c6139937b48164733916798
SHA1578b88b7369d76aab8fc671dc9e75125d4006b07
SHA25641ed21bcc7c2e31bd5d7b40f2fdf6fb4a27e07e07ff454a560ab9563265c7786
SHA512ce2ef23cde2b5ee30cd3479ed20946f07055262b6d644fa4dc97c421f1e012a5acf5737dd69024771e2ac14d13742acd3a32a3cbb28c51d7e12b36b42c8185bb
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\icarus_ui.exeFilesize
11.7MB
MD593ac5443af08533a675113b0227705c0
SHA1cecc66d306ec3a4cfbe93abf51472385aa157795
SHA2563342f6600ce7e3a7f88d041ad8f4a27fe8f06dc549c371d28eb202e4ec7e8064
SHA5129de0fd990e88ec37655b7968623823c9cef7aa2444573d8f7863cb77d6b55622e41197612421a19f08f60b65bd59f8d656556d6254b16ed8fcfed0613ca73071
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\product-def.xmlFilesize
1.3MB
MD5bb399f3eb4cb55dc8f2467c1625535c6
SHA13b47ad5966bab7ad26b263e14a38c7792b9ee349
SHA25610bd70200dc8414774e02c8751d7f35e5d8ee80657db4c2efc54369e1da59d2f
SHA5127294a989592fae569f1066451f6dd7fd36c52ad20d956d6be20cf69e070ed812fdc9b6dd506c74b54d9fb35a31c5382b8353ca814207dd69b98f7963da7e6717
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\product-info.xmlFilesize
9KB
MD5ec1d45e035964aa35a3e34138de2eb0e
SHA172dcf5cc92f0ddd139aedd754a7dc22bcd49082e
SHA256dc5ad9f2d6c6cc5c43c1f2fbb44008997de8c7a6cfdb22b3bbf061b10075284a
SHA51238ad9991b9ec6601810413498decc740fb47130ac70093f9363c0fa17187ec100e89d45f8e798a47a8c8ad2fd64e6ba7d9b5d198d2986431ca08a85efd3e5816
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\common\setupui.contFilesize
381KB
MD5a55572f37fe1652b92e09b1f2a0d43bd
SHA14d1ffb01d15c8482607a8fcec2a4bcd905448946
SHA25679f91b261fede95ab25c4a2ed1d118221552a33ba3e13c9746b1f3200bdfc4ef
SHA5121da2fcfa34b72dc64e00f5907d59f68e23be20794884cccb838a41b6023683471dfcb1b0b5bf4695958879aa2e80e8f92385d1b081acde4d4c5002c8a1a468c6
-
C:\Windows\Temp\asw-5f0b49cd-73d8-43a9-8169-07bda2fd0fef\icarus-info.xmlFilesize
1KB
MD5d02d5948e5b7a8508f84330551c3c4e2
SHA13dc5b61412fe33accf607887aae3ba81871320e3
SHA256abd128f83ba42ed472288bbdf1d491773424d6b541594c845a575335cd019edc
SHA5127d565852dfc740fc35344514e2ef887f56fd72f7ef8e4efb9f27187e40e7b2df88475cfdc05a8a806485abfd937ff99a1f7cc97af6de20e0fab4d3bca070e2c4
-
C:\Windows\Temp\asw.4875309771f3138c\avg_antivirus_free_online_setup.exeFilesize
1.5MB
MD5532f95e90c93fedd7c1d3758bea1dda6
SHA1ecf90929ae1bcb1bf4247147b247363802ecb1cb
SHA25678d4d80014d4815cd798b44272dba55056b7955a22e29c66e96e2ff47f2bb9a8
SHA512865621304c0a2e993ee62e90c0915883d9e37d5c1ff329347692d32fe33c83366ef554891d61422fbbab6efd1ba3da59071860b5aaccca96ad6ce4d3835f5801