Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe
Resource
win10v2004-20240611-en
General
-
Target
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe
-
Size
219KB
-
MD5
3203ff9950034bf43abfd92dc2de3af4
-
SHA1
7c516ae90177fc906094bcda2e9a450026b48b55
-
SHA256
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46
-
SHA512
43c626a450b18992ec814d08c0d907b7efc92b0f5dc56a8e1c1367af1d04f0a82a9c6cd711979f660f74c6f4151e23c981b342c6e3e38a139098436875add071
-
SSDEEP
3072:32RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhbK0K6:30KgGwHqwOOELha+sm2D2+UhngN5K4t1
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
avg_antivirus_free_online_setup.exeicarus.exeicarus_ui.exeicarus.exeicarus.exeaswOfferTool.exeaswOfferTool.exeaswOfferTool.exepid process 3408 avg_antivirus_free_online_setup.exe 3168 icarus.exe 3200 icarus_ui.exe 2680 icarus.exe 5008 icarus.exe 4456 aswOfferTool.exe 3712 aswOfferTool.exe 4368 aswOfferTool.exe -
Loads dropped DLL 6 IoCs
Processes:
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exeavg_antivirus_free_online_setup.exeicarus.exeicarus.exeaswOfferTool.exeaswOfferTool.exepid process 520 a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe 3408 avg_antivirus_free_online_setup.exe 2680 icarus.exe 5008 icarus.exe 3712 aswOfferTool.exe 4368 aswOfferTool.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
avg_antivirus_free_online_setup.exeicarus.exeicarus.exeicarus.exea620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exedescription ioc process File opened for modification \??\PhysicalDrive0 avg_antivirus_free_online_setup.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
icarus.exeicarus_ui.exeicarus.exeicarus.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe -
Modifies registry class 13 IoCs
Processes:
avg_antivirus_free_online_setup.exeicarus.exeicarus.exeicarus.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAATOEIXscvO0mvCPJCCBYe+QQAAAACAAAAAAAQZgAAAAEAACAAAADMqURAgdSQfN9dF0uMv1hkV/BPhtjB6TOoAdzwxEJHygAAAAAOgAAAAAIAACAAAAAoYhhTA0ydM6+2O+7waQMofFvYweFxZonqv996TJMhNDAAAABttSFWBmfTejdPTYc5Mnebgdj6GTwHLast8gg9WwT+r4xZ8JfEXnHXzs8kk9BwjtRAAAAAUrr9pLgWllW4gbkvsOvNb+fLaEJLAweg4uAQ2xK30/8M3qyyHnhx3SGIS6WpyhaLrfrHMsVPIbZodEJXlsnu+A==" avg_antivirus_free_online_setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b2830322-37b3-4cc6-a143-74da42414bc4" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b2830322-37b3-4cc6-a143-74da42414bc4" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F avg_antivirus_free_online_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b2830322-37b3-4cc6-a143-74da42414bc4" avg_antivirus_free_online_setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "b2830322-37b3-4cc6-a143-74da42414bc4" icarus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
icarus_ui.exepid process 3200 icarus_ui.exe 3200 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exeicarus.exeaswOfferTool.exedescription pid process Token: SeRestorePrivilege 3168 icarus.exe Token: SeTakeOwnershipPrivilege 3168 icarus.exe Token: SeRestorePrivilege 3168 icarus.exe Token: SeTakeOwnershipPrivilege 3168 icarus.exe Token: SeRestorePrivilege 3168 icarus.exe Token: SeTakeOwnershipPrivilege 3168 icarus.exe Token: SeRestorePrivilege 3168 icarus.exe Token: SeTakeOwnershipPrivilege 3168 icarus.exe Token: SeDebugPrivilege 3168 icarus.exe Token: SeDebugPrivilege 3200 icarus_ui.exe Token: SeRestorePrivilege 2680 icarus.exe Token: SeTakeOwnershipPrivilege 2680 icarus.exe Token: SeRestorePrivilege 2680 icarus.exe Token: SeTakeOwnershipPrivilege 2680 icarus.exe Token: SeRestorePrivilege 2680 icarus.exe Token: SeTakeOwnershipPrivilege 2680 icarus.exe Token: SeRestorePrivilege 2680 icarus.exe Token: SeTakeOwnershipPrivilege 2680 icarus.exe Token: SeRestorePrivilege 5008 icarus.exe Token: SeTakeOwnershipPrivilege 5008 icarus.exe Token: SeRestorePrivilege 5008 icarus.exe Token: SeTakeOwnershipPrivilege 5008 icarus.exe Token: SeRestorePrivilege 5008 icarus.exe Token: SeTakeOwnershipPrivilege 5008 icarus.exe Token: SeRestorePrivilege 5008 icarus.exe Token: SeTakeOwnershipPrivilege 5008 icarus.exe Token: SeDebugPrivilege 2680 icarus.exe Token: SeDebugPrivilege 5008 icarus.exe Token: SeDebugPrivilege 4456 aswOfferTool.exe Token: SeImpersonatePrivilege 4456 aswOfferTool.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
avg_antivirus_free_online_setup.exeicarus_ui.exepid process 3408 avg_antivirus_free_online_setup.exe 3200 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
icarus_ui.exepid process 3200 icarus_ui.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exeavg_antivirus_free_online_setup.exeicarus.exeicarus.exedescription pid process target process PID 520 wrote to memory of 3408 520 a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe avg_antivirus_free_online_setup.exe PID 520 wrote to memory of 3408 520 a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe avg_antivirus_free_online_setup.exe PID 520 wrote to memory of 3408 520 a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe avg_antivirus_free_online_setup.exe PID 3408 wrote to memory of 3168 3408 avg_antivirus_free_online_setup.exe icarus.exe PID 3408 wrote to memory of 3168 3408 avg_antivirus_free_online_setup.exe icarus.exe PID 3168 wrote to memory of 3200 3168 icarus.exe icarus_ui.exe PID 3168 wrote to memory of 3200 3168 icarus.exe icarus_ui.exe PID 3168 wrote to memory of 2680 3168 icarus.exe icarus.exe PID 3168 wrote to memory of 2680 3168 icarus.exe icarus.exe PID 3168 wrote to memory of 5008 3168 icarus.exe icarus.exe PID 3168 wrote to memory of 5008 3168 icarus.exe icarus.exe PID 5008 wrote to memory of 4456 5008 icarus.exe aswOfferTool.exe PID 5008 wrote to memory of 4456 5008 icarus.exe aswOfferTool.exe PID 5008 wrote to memory of 4456 5008 icarus.exe aswOfferTool.exe PID 5008 wrote to memory of 4368 5008 icarus.exe aswOfferTool.exe PID 5008 wrote to memory of 4368 5008 icarus.exe aswOfferTool.exe PID 5008 wrote to memory of 4368 5008 icarus.exe aswOfferTool.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe"C:\Users\Admin\AppData\Local\Temp\a620b3c0315c9909544a52a1daed8851b0fb505684a11d592db55c745add6e46.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw.232aebfb8310ef33\avg_antivirus_free_online_setup.exe"C:\Windows\Temp\asw.232aebfb8310ef33\avg_antivirus_free_online_setup.exe" /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-FAD-ICARUS /ga_clientid:972ae458-c12b-4114-a477-f7f5d017613c /edat_dir:C:\Windows\Temp\asw.232aebfb8310ef332⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus.exeC:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\icarus-info.xml /install /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-FAD-ICARUS /edat_dir:C:\Windows\Temp\asw.232aebfb8310ef33 /track-guid:972ae458-c12b-4114-a477-f7f5d017613c /sssid:34083⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus_ui.exeC:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus_ui.exe /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-FAD-ICARUS /edat_dir:C:\Windows\Temp\asw.232aebfb8310ef33 /track-guid:972ae458-c12b-4114-a477-f7f5d017613c /sssid:3408 /er_master:master_ep_cb364dc9-8c27-4adf-af83-a12842301023 /er_ui:ui_ep_4f003571-8e07-4507-9264-910ab8d2987c4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\icarus.exeC:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\icarus.exe /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-FAD-ICARUS /edat_dir:C:\Windows\Temp\asw.232aebfb8310ef33 /track-guid:972ae458-c12b-4114-a477-f7f5d017613c /sssid:3408 /er_master:master_ep_cb364dc9-8c27-4adf-af83-a12842301023 /er_ui:ui_ep_4f003571-8e07-4507-9264-910ab8d2987c /er_slave:avg-av-vps_slave_ep_9af267a9-725a-4638-8219-4b0f0e7ac547 /slave:avg-av-vps4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\icarus.exeC:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\icarus.exe /cookie:mmm_bav_003_999_a7f_m:dlid_FREEGSR-GLOWEB-7453-FAD-ICARUS /edat_dir:C:\Windows\Temp\asw.232aebfb8310ef33 /track-guid:972ae458-c12b-4114-a477-f7f5d017613c /sssid:3408 /er_master:master_ep_cb364dc9-8c27-4adf-af83-a12842301023 /er_ui:ui_ep_4f003571-8e07-4507-9264-910ab8d2987c /er_slave:avg-av_slave_ep_a62c9511-4e96-40bd-9d14-29ab41ea5b32 /slave:avg-av4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\aswOfferTool.exe"C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFC5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFC6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\aswOfferTool.exe"C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
61KB
MD578bfd1ba26f357c1933d0dd5ea7aecb8
SHA1647d4ec1f0de9baf55ac4fe089673cf27a11d864
SHA2560cce7ca689cc17a53508ae715970f12494d88fc8b2cccfd4b060ee3b439b4cd4
SHA512d606e84e4d2ca416237361efe39092126e9fc210ac27182c135e4e821e1d02ab2d1488709966a5a3828f0480a74006e3ba40998bd1caec8da4b5b10c5002f4c3
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
67KB
MD527067525887a0a22c6cd4d2ee15c1c38
SHA1f038d9bba5106c58a25db0d9c0193775f426f4ce
SHA256fa3e30d7ee5d65c9bb81681de9b905db4d73baa0b9496a38cba04b57f1ce5d1b
SHA5124e1ae883b83cc2d4c89f68d61e3f8a79e07ca52fd25641967466612e81d897965ca9c7db20eb6cc43c24c83095ed4f24f08183894dad9dd24135e2ad64e3e103
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
68KB
MD51235502dc25cd7351ef361614a95c135
SHA131bff894b2a44574394427be8e67851f79f4ef5a
SHA2562e3e77feb7b1ea8d4a50b62d1bb70d761a8f498993abe72aa9d2ba77754de947
SHA512af0d9907abc590f0ddd6284ffa3893af7c4ce1b4e9d34b703b2d3746a7a63a635377a8d92271f8dc6f292419cd083baa2428558f5c074786bae117bf87512c06
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
76KB
MD5d52ef35c226f7a4bb6d99f4d56697c06
SHA112ebb982edfab5660b54c0521ab49b9b0502999a
SHA256c5f23dd16ecaf5df60f52d8dbab8a82a484ff08b9818d1f4e41dce0cbb2ad188
SHA5127297dd809c559e9458fb72d39a1f5f3f0cde20afadb9f5f5bd14b4204ea224ae952e907b10081d84fa692e5e787fb6b88dd15bf2faaf7324143738dbe4204d2e
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
124KB
MD595f7178c9ef49b6b10aada89a02edf82
SHA1709d3dda492d350a4e3c9b491e16014112daa9fc
SHA25613f35639479f636adfcb85b2a4fc295a254975cd375ca5b5cc88a8cd14a1a9aa
SHA512f6d96eb82c0f1f8ff6f9727100f889cd8ccc00ca15690c779379a6d728983794d292afa3710f95bfe068a42f53eab2db320ec6007dbc8f1293bf8c5e8eca60b5
-
C:\ProgramData\AVG\Icarus\Logs\report.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\AVG\Icarus\Logs\sfx.logFilesize
13KB
MD5b74656b9d036e3344fbb011e33e5453b
SHA1db888fe12f6dfae41a0537feb3661f8e77e84ead
SHA2565b5604373971021271fa2d8e74e2dffa8cdfe7c7f8c122ae6effa374eb7e5dc7
SHA512ff1320099bfa7c7a375d34b6f4c10ccb9d37aeeaab26e5446b8a689208369a61032d181b1af30e00acf8e86842b644f98115d2e07415f59768b286e76c14117b
-
C:\ProgramData\AVG\Icarus\Logs\sui.logFilesize
17KB
MD5e9b06454c8f998da193734da1f756891
SHA1cb45301540f834fb0433b6cc8d7a41188a4354fa
SHA2562f426417e3de48b5b5d211a178e23d07ae199127cf00017a9b07c89efdee6edb
SHA5129d119ef84914f1456efbd4d740c2f4e5f2f17666f8c98f606a9b437ed0a4fe41d0a4cb9fccfaa99fd8c4c3aac4181b336d7adb445e577f00e27de4a1e33248d5
-
C:\ProgramData\AVG\Icarus\Logs\sui.logFilesize
18KB
MD536d4c08b381b5f4d5c7a0488596349f1
SHA12804c9b9a2aa88d65c5189b4e93c0fc698638fef
SHA256e503aff99339d41191677fb629f56dd13d72189590adb63843e0d8fe7a267806
SHA5126814a2550727d28269668b5c5e94daad8e5baae96106bb19b21879b5eef8d4c23b613049c089a8a6e79173a978e9e51fa1c97c2ecec57de96b6c43c0c613b8ae
-
C:\ProgramData\AVG\Icarus\settings\proxy.iniFilesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3Filesize
64B
MD5168f03c5c241049561d93853fa2304dc
SHA1ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179
-
C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0Filesize
72B
MD57a5efccc5239cf7b604a5aec2e397eba
SHA1783b51dcce701cb3ebd44ef42a01a8708d76a2b7
SHA2564721bccfdb862ac7f70293d47be8a6d390cc9385231d32ae10cb41ab0e83a3cf
SHA512afb509446c7f2de70b2aba0798dec473919e00f99d73a54e6a8ba1a27dc898f8996a8ec9f597da5843beb3838dbd9838629f0c62f79fe4da97b00468de237863
-
C:\Users\Public\Documents\gcapi.dllFilesize
867KB
MD53ead47f44293e18d66fb32259904197a
SHA1e61e88bd81c05d4678aeb2d62c75dee35a25d16b
SHA256e0d08b9da7e502ad8c75f8be52e9a08a6bcd0c5f98d360704173be33777e4905
SHA512927a134bdaec1c7c13d11e4044b30f7c45bbb23d5caf1756c2beada6507a69df0a2e6252ec28a913861e4924d1c766704f1036d7fc39c6ddb22e5eb81f3007f0
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\config.defFilesize
583B
MD588b8bbca6adfb658e9f64786290b1508
SHA1a7e19f0be671882e7c0de8d546482d20045139de
SHA256a98977649c4c1e25f732e3023515cac1cf5d54df88d58c170dde6f895bc695fc
SHA512b7329cac2951e04645771d207dc0c095fe81dfa17bd3df185f4da1e1cc4f726750a48921fd97345b6777638e212624d4f0d3824d39f363d9421bbbffd44f3968
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\dump_process.exeFilesize
3.4MB
MD521d84898683d48daa44ed5a2f0f3591b
SHA1d1a3d3755d2facb545e69578459f64bb7ddc736b
SHA256c109510846192f6f93efb0955a784c302b07858c98a8548e861209b353a31e71
SHA5125bb4a5e0039059f32ef77aa4d45a7661801f539fe341fd1ed667da5ca8b20dad6d5ca405260084f780af4b2ff8db93c3598f859fe9d5d88cbeeb7d9f6dd0d117
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\icarus_product.dllFilesize
851KB
MD5a4085f7f5bd1406f050995b529ed6640
SHA1d59acba50b5ca04eeb55a08dfa09c24445b2e722
SHA256d060cb6368bf7df914a5f6619a3bcc51430558909434f7e565dcea484778d852
SHA512bec6aeed862e12adda63689d806d331946c0b7d743712f1f1c3f11f76e6badfa7752323407ee73b82287f3335034f11014662014db382ad3a19a3c6825dfc6e4
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\product-def.xmlFilesize
57KB
MD579658c0c7aeeefe6821ae642f864772e
SHA12cfc73956be01440b9d7d17a3e129a2504d3bcfe
SHA256971e697d2e640b2be654c57ac1e1a523ff3b6b243157f26abfa276cd2b9d0bd8
SHA51241fc6322f183a51a545daa08b168c19d61e07daf82edd5f3070da9e77aa447ab358480b5caf0226ae0ccc7d77486ccd6e4d354ea0d83d8576fac26dc1d94d523
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av-vps\product-info.xmlFilesize
5KB
MD544f890102c5bc0cf48e4d586e0824c84
SHA1939f09d220caa71214024956bf5d7848f4bc9096
SHA2563a5a48c214c2759eb9a6b2f621ac0af16b564e5774d214db925629bbc7692af9
SHA5123977244dbba86d07eedfe29589ffd13c77e307936d59cb81d44659f67d219c8dc2d0973056aa2a038120f806b2acbf45443af3624c7fcc5596131024e6007e6d
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\aswOfferTool.exeFilesize
2.3MB
MD514ab1b335b1b9a39a7c3038626ef9d3d
SHA196608c4427861b524cea46ec47bd5185ea10815a
SHA25690364dd980f0c7a8b126d5fb65c7788921e13aba273ad8fb296b5eba59778f12
SHA512913188939451702639f34299145e4a1719ce5ee416aa9ef13fbdec868185a9b6ccbedd4b0fbc8212f72035b757780c368e6f7d44b93dfb46e3577be1c16ab1d5
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\config.defFilesize
757B
MD5264d61ef38e6f06891da07c11bf71436
SHA1e4a258aa41ce4aaacdfa7f5c0f6f11d4859fe1b2
SHA25696976bd5ecb653aded30321685e44a59886901652c031de101e3a13326d61387
SHA512c818737bcb76b4d50673c8007118320f0b6081108f4934016a04167d5a8f4835393274438769e05276c5db79c5d9f5e4e3748788a1439c974bdf16b3d5dd6890
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\config.def.edatFilesize
20KB
MD5934e4c0db2900855ec6b7bada158d464
SHA1095811d2cc7924bf2b4c0d88537de9eaca106eb3
SHA256b419fe15dd54882a70e9c1ff902467d2e1abfa8565a9cfd0770481ff0ac84e10
SHA5120d7a0c5a0c545e6dc35d14ec16486f146e89145c2ac7126780012723ebb57d968b46208c6fd379f1d01ca3af188afb68e5a4fd74c351f40134f40630c50ef7a8
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\edition.edatFilesize
2B
MD59bf31c7ff062936a96d3c8bd1f8f2ff3
SHA1f1abd670358e036c31296e66b3b66c382ac00812
SHA256e629fa6598d732768f7c726b4b621285f9c3b85303900aa912017db7617d8bdb
SHA5129a6398cffc55ade35b39f1e41cf46c7c491744961853ff9571d09abb55a78976f72c34cd7a8787674efa1c226eaa2494dbd0a133169c9e4e2369a7d2d02de31a
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\avg-av\icarus_product.dllFilesize
6.0MB
MD548868d9172e27b4dab1e0608bebb79c0
SHA17680a1779631b10e76ce4b7ab5993cb438fa1add
SHA256dfdcaa2c3313544eeb19361a5fa343fe7e820a0ec6f37c6e6b866dd56f1e7c94
SHA512848e5565a8f8809acf4ca7be594dbadf95ace9f4806e25b6bad8075acd247d10d85dd295ea85f6c63c8b8ede149afd8866e3ec0879c581892064323b107f66a2
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\bug_report.exeFilesize
4.8MB
MD551d5604dd0a85f5fa6586980e64d0785
SHA1cfc31d787dbf01e039971365a9c7a1b6affa1132
SHA2560bc7930fe347a5a4a0ad244f60122a4635baf0695ca30c9ac8df923f540013e6
SHA512247490f99e7f8343c00223c1cb2a596ed12584f76c0c3fff24d14859651dacc11ef5ecaa5785af063ee62965b6c8bc535e12d1b78fa43c2bb3f8b133b5af0bda
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus.exeFilesize
7.7MB
MD5392d142e6b814f42079d5ed9011758f4
SHA14111eb5a27f84c26f1a95cc8d577e5b3743dfebf
SHA256dfefb27fc9a96a2a7aab2059067d670178ede0f926215464d61c298e8e3f895f
SHA51211678c9857ced88d947779b10089a91abc1e80a43f6518289c4fea88353241767406a59a6e682bf300344a7a5aab34126b373aff33fad04d0fee4a78db01b58d
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus_mod.dllFilesize
14KB
MD5ce33da043c6139937b48164733916798
SHA1578b88b7369d76aab8fc671dc9e75125d4006b07
SHA25641ed21bcc7c2e31bd5d7b40f2fdf6fb4a27e07e07ff454a560ab9563265c7786
SHA512ce2ef23cde2b5ee30cd3479ed20946f07055262b6d644fa4dc97c421f1e012a5acf5737dd69024771e2ac14d13742acd3a32a3cbb28c51d7e12b36b42c8185bb
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\icarus_ui.exeFilesize
11.7MB
MD593ac5443af08533a675113b0227705c0
SHA1cecc66d306ec3a4cfbe93abf51472385aa157795
SHA2563342f6600ce7e3a7f88d041ad8f4a27fe8f06dc549c371d28eb202e4ec7e8064
SHA5129de0fd990e88ec37655b7968623823c9cef7aa2444573d8f7863cb77d6b55622e41197612421a19f08f60b65bd59f8d656556d6254b16ed8fcfed0613ca73071
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\product-def.xmlFilesize
1.3MB
MD5bb399f3eb4cb55dc8f2467c1625535c6
SHA13b47ad5966bab7ad26b263e14a38c7792b9ee349
SHA25610bd70200dc8414774e02c8751d7f35e5d8ee80657db4c2efc54369e1da59d2f
SHA5127294a989592fae569f1066451f6dd7fd36c52ad20d956d6be20cf69e070ed812fdc9b6dd506c74b54d9fb35a31c5382b8353ca814207dd69b98f7963da7e6717
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\product-info.xmlFilesize
9KB
MD5ec1d45e035964aa35a3e34138de2eb0e
SHA172dcf5cc92f0ddd139aedd754a7dc22bcd49082e
SHA256dc5ad9f2d6c6cc5c43c1f2fbb44008997de8c7a6cfdb22b3bbf061b10075284a
SHA51238ad9991b9ec6601810413498decc740fb47130ac70093f9363c0fa17187ec100e89d45f8e798a47a8c8ad2fd64e6ba7d9b5d198d2986431ca08a85efd3e5816
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\common\setupui.contFilesize
381KB
MD5a55572f37fe1652b92e09b1f2a0d43bd
SHA14d1ffb01d15c8482607a8fcec2a4bcd905448946
SHA25679f91b261fede95ab25c4a2ed1d118221552a33ba3e13c9746b1f3200bdfc4ef
SHA5121da2fcfa34b72dc64e00f5907d59f68e23be20794884cccb838a41b6023683471dfcb1b0b5bf4695958879aa2e80e8f92385d1b081acde4d4c5002c8a1a468c6
-
C:\Windows\Temp\asw-cb95ae2a-37b8-4293-b23f-366ed12ae6e4\icarus-info.xmlFilesize
1KB
MD53e81abcd92a1071cb7c1575efcf67b6a
SHA1e8c40626ab9ca45245bb66e1a0e2052e860ee0cd
SHA25669e4d4e3cb536fddd3fdeeebc77e6200fd5e7b999d2bd63039ea1e87ea1ca87f
SHA5121dafaeb673dd04ef097b2bab1df1537f77ab4e1692e82688050e5eeab61a31231fade837ad9777786e21a815486c2a74fbfbd21bb5ee58664f724223362d78a2
-
C:\Windows\Temp\asw.232aebfb8310ef33\avg_antivirus_free_online_setup.exeFilesize
1.5MB
MD5532f95e90c93fedd7c1d3758bea1dda6
SHA1ecf90929ae1bcb1bf4247147b247363802ecb1cb
SHA25678d4d80014d4815cd798b44272dba55056b7955a22e29c66e96e2ff47f2bb9a8
SHA512865621304c0a2e993ee62e90c0915883d9e37d5c1ff329347692d32fe33c83366ef554891d61422fbbab6efd1ba3da59071860b5aaccca96ad6ce4d3835f5801