Malware Analysis Report

2024-09-23 11:50

Sample ID 240614-sfwdtawald
Target 2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber
SHA256 3eff0bb056823b4688a239ee372e22960ebbe9b5440310cf00ffecab88855715
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

3eff0bb056823b4688a239ee372e22960ebbe9b5440310cf00ffecab88855715

Threat Level: Shows suspicious behavior

The file 2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Checks for any installed AV software in registry

Writes to the Master Boot Record (MBR)

Executes dropped EXE

Loads dropped DLL

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies system certificate store

Checks processor information in registry

Suspicious use of FindShellTrayWindow

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 15:04

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 15:04

Reported

2024-06-14 15:07

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAOglKa4oP2k63xbMVktH1JAQAAAACAAAAAAAQZgAAAAEAACAAAACkM8b4Qlihu23+Yn3fS5t3vauzEe5mPWsQ0HiEanuldAAAAAAOgAAAAAIAACAAAACzGX6ggL4AqYP7HNvrlbc7NamWn+cbrrEl4TOnjfSr01AAAACxo/bcY06FVGuRTvOyxP6xXBxglJ88mvS6vd/mRd2Cx6lrhpfPgBro/6cdSmcmL6kbtohKicAmP7dQZmZtMFK1AWwR1+RDTW7WJviD5/+HZ0AAAACLGyjKcpYebzikBXsHfC7H1lmTSs65C1M39ea/PhN91nEsSHAvmCbGPNKCApL6fENBn0NEr87Muz6IiBnXT+iz" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "04442289-acdf-4377-b492-708ec287a74d" C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "04442289-acdf-4377-b492-708ec287a74d" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "04442289-acdf-4377-b492-708ec287a74d" C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe"

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\icarus-info.xml /install /sssid:5088

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe /sssid:5088 /er_master:master_ep_d2f29819-a8b5-4c38-81b2-8880ecd7898d /er_ui:ui_ep_c869c872-ce81-448b-abb0-a7d43a9c3afa

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus.exe /sssid:5088 /er_master:master_ep_d2f29819-a8b5-4c38-81b2-8880ecd7898d /er_ui:ui_ep_c869c872-ce81-448b-abb0-a7d43a9c3afa /er_slave:avg-tu_slave_ep_d5aa6071-8fa6-4344-a3e5-db45a408c291 /slave:avg-tu

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 223.223.117.34.in-addr.arpa udp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 23.34.233.8:443 honzik.avcdn.net tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 8.233.34.23.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 23.34.233.8:443 honzik.avcdn.net tcp
SE 23.34.233.8:443 honzik.avcdn.net tcp
US 8.8.8.8:53 28.176.160.34.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 203.33.253.131.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.187.202:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 136.71.105.51.in-addr.arpa udp

Files

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 6468eb97013b8afab9e2a1fc6e50ee92
SHA1 8c6df8e1d5901a81f3e238004ce8553a16b19e93
SHA256 65edd668ff90c35a76a55a6df539820c805e7d4da20d70e21e6e096949deab7d
SHA512 b6b98ed13bed76eb902e0cf25f5f17db5853457a73fca7714df4f3362922e2475f6b9fbff463e72787d3b397858b872aca2a0090634214d7f48b9fbef6ebd25e

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 15ed5083ad261056a815746d85580a7c
SHA1 a941c6731a90e02368d7c798522088c10671fcd8
SHA256 5737c57185b07c5474f7957b49803b74c3d85de9558fde4e6b06c548ab9fbe81
SHA512 6c406cbe6947d867ca8377b0351f1cbabff22cb5d4fd41f46980d34b098eadf9043fb88f708b17de340a64262e8664067bc22c129a580d69660cf6c1f4d1a5ac

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\icarus-info.xml

MD5 948eb4747ab8867b2ea974b56e3d32cb
SHA1 cc18e8ffc0cfb9086ef1aa4dfe7d6cc1fc1966b6
SHA256 93beb4c641e84822c5df6f0748eb35380a16dbe3878012b6f3ad5bd65c86f904
SHA512 bce5e29b1c90785325e7ca3d2707f508de31caae98e30ef34e60415e1b54c3644d4c6471dd67f36989b20b62727d951c5fecb02d73f6d2f0a8e068ebe8b6395b

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 22417b5d5eb168147f2c237d658a7163
SHA1 6ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256 f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512 392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\ecoo.edat

MD5 3da0fdcf895dfb002643293e8e40b1ea
SHA1 067f947bb927c59cf8c9993e310b19dfd57bed70
SHA256 4e93560d4a928c950f1a07f2ba6aadd197848aec782c91ea8bca5e8f2014ff1d
SHA512 b8eb6ee8194b48ab2a2eddd55fb82dd79a103c5efb8e3a14bc99c39f35d02b6d84f10c936acdc00042ef1fa516584a624cb680aa1b99721fdf0c6a5ba5fe3b13

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 8e74d3a49982ece4537f86c23ae02ad9
SHA1 2ea61264c53d6f1516e87ce6d0ab0059cb1950d3
SHA256 e912e33df8c5b22121381a74f6935c88f29624c570535c7d671133df330ac758
SHA512 2dcca5d161674d57f8f1ce0feef2bc2b2f013cd8cc5f411597952fccf4d43b6c00460da3c77de075af4274272e7973aebbecdebb41165ece8720357c368ad923

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 b74f7b9d547fbbb4756c153d4efd461c
SHA1 ccc03d8e47d33c15fdee0f369c3fd1f2d7eb1bc4
SHA256 793ece09b8e04b6bff7251e6a3eb42d1a9b2961e5ff1907858a472fade2c5a51
SHA512 cad44ecafd1e70074e9e757f6e2ff2a79aae01c4dd94cc32ad6038d16c4cd9211ba3164a75bda864e97ace66acac3288ee89727cde4f5740aecb2acca9164ba1

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-4ef0333c-aa4c-44a4-b3c2-6a16b18c2dfb\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 15:04

Reported

2024-06-14 15:07

Platform

win7-20240611-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "14ff6761-d676-41f6-92b4-ae19cea90ddd" C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA9TdQ7MdVdUyefSRdUnZeNgQAAAACAAAAAAAQZgAAAAEAACAAAABvluwATxr+1NXh58o73ARR41a2slUbnwRfLwKtpv6CZgAAAAAOgAAAAAIAACAAAAAFhP5U41KH62C++m3rraogxW071BgfNgH8fGEimStsLDAAAACucvXrYujPJ19A0cy2pr5jqzFpRRDA3SjKUWcixZWDAnm+qvkOJ6Z1JkPB5FBRygVAAAAANRxYp5d5UBtN9jcZ9w23AwqmqeHbynKvruKrlgS8FdA8X22bPvNtR1qinVqjLucVTHoTsK6VEa0nqAolgmy23g==" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "14ff6761-d676-41f6-92b4-ae19cea90ddd" C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "14ff6761-d676-41f6-92b4-ae19cea90ddd" C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1760 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe
PID 1760 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe
PID 1760 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe
PID 1760 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe
PID 2664 wrote to memory of 2672 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe
PID 2664 wrote to memory of 2672 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe
PID 2664 wrote to memory of 2672 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe
PID 2664 wrote to memory of 1768 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe
PID 2664 wrote to memory of 1768 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe
PID 2664 wrote to memory of 1768 N/A C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-14_691ff9391a6a77725d6d5d9749aed321_magniber.exe"

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\icarus-info.xml /install /sssid:1760

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe /sssid:1760 /er_master:master_ep_b7966f56-da99-4034-a65c-1f11a8fccefa /er_ui:ui_ep_0bdf7d0d-7c6c-49e5-b488-b9b46dcf0fbe

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus.exe /sssid:1760 /er_master:master_ep_b7966f56-da99-4034-a65c-1f11a8fccefa /er_ui:ui_ep_0bdf7d0d-7c6c-49e5-b488-b9b46dcf0fbe /er_slave:avg-tu_slave_ep_60f12800-07f9-486b-a872-078ecf499e53 /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 23.34.233.8:443 honzik.avcdn.net tcp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
SE 23.34.233.8:443 honzik.avcdn.net tcp
SE 23.34.233.8:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp

Files

\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 94a987c222830ddc4bc007ea7c05e518
SHA1 89d9941abec56d6f452a39ac4d8b90e4982eb6be
SHA256 06d1c104c05139e4ba819cd0e6e93997667dfd14706ef1d1d872b9fc078cd6bf
SHA512 359bdaf0d53331c80b268404723cd216b412162150ed52c9636424db24c757d4b61a68e5160f90f35b05392c91c3c2de3eefbcad13d219f5212cad346002c55c

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 8427347f0ce38aadbfc59e804da2a8b9
SHA1 77ef2e86e09391bf44101bac8be15913213f2bfd
SHA256 e7b3c6801b52ecf46de3ad1a4e1b1fc10d5163c156979458171bce16dd564f0f
SHA512 8dcc46a2450d028531f8857cb6909c405d4b68a5bf26d0943234652112562b946d6e683deb78ac21a76d21186db41855d237b6e91e6839b4624140d941649792

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\icarus-info.xml

MD5 e72f372d019d38f7abb7aba96b6bfba5
SHA1 702aefbd80e3f74ce5aec1986e0ac413451b067d
SHA256 613a91da58ce5fc4cc1c9d0f090057fc0c3daf5ded9c3fc8d4fade2fd6c3f1f8
SHA512 fbdcc517e9a95b6b5dd3e1c5fd2fe888677b048dbfadec5f265bb1c2d50c472aa8999685a6536d5cd4bf572c0a23fb4583507c80a435b69b0d06dceaa7a7db34

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\ecoo.edat

MD5 3da0fdcf895dfb002643293e8e40b1ea
SHA1 067f947bb927c59cf8c9993e310b19dfd57bed70
SHA256 4e93560d4a928c950f1a07f2ba6aadd197848aec782c91ea8bca5e8f2014ff1d
SHA512 b8eb6ee8194b48ab2a2eddd55fb82dd79a103c5efb8e3a14bc99c39f35d02b6d84f10c936acdc00042ef1fa516584a624cb680aa1b99721fdf0c6a5ba5fe3b13

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

memory/2672-69-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 95f29f816f1fc0c363e04a8889f09685
SHA1 068e1c6e3210324a7f3ca10e46e37f2193f671d2
SHA256 569505ef425273f5625016269f856b10d43cb1471ae2844d09e577101a598529
SHA512 5e9ad302429a04cac34d406ea6935ee70ac576c2edad4e6ea0a1b69f06a8875fed19808b53e070d3b1f9dc362d8c5d570d4e736d1659a81c2ea70a055ca867db

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 31c04ee2aa67566f24ac37cb01458171
SHA1 67b4600259153a72d28526c6f742df34fc8b237d
SHA256 d44611c76e6b7a7ee578064968b911c5d8a13583c744f01cdf664bb47e97fb64
SHA512 cb76a3f6a77d739700fb2a71f4bd8ccbfb9db72ff2af1127216f557fbcaa4f57118408c0506cb047c606645d395e135d44c07f97b4d59597850f943eef99bbf7

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 2692d1d2ddad16aae309983a20c8357a
SHA1 58a80cb8373241093c42c82ff8db0846989734be
SHA256 f64f6175fb99aa3ff110040a37ea2dab9030e4e46b9534a74b0c2cddae7c8d7d
SHA512 9ee1e6949f4b457ddcb0f50b429715ad8ee323eb3783d2c9fedf69a97a1c2d7ae19fe04c3f341ab6458138bfdedecd50ea1b375ddba6619da8c452f75ba7654c

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

C:\Windows\Temp\asw-645a0e3e-9249-41aa-bb65-d7d68f2da28e\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052