Malware Analysis Report

2024-10-18 22:05

Sample ID 240616-t8hh4azfke
Target 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber
SHA256 0b0b1c81aa571bc75d537588798c410d9ba11c8fd2b3669f6445d084d575d2b9
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

0b0b1c81aa571bc75d537588798c410d9ba11c8fd2b3669f6445d084d575d2b9

Threat Level: Shows suspicious behavior

The file 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Writes to the Master Boot Record (MBR)

Checks for any installed AV software in registry

Executes dropped EXE

Loads dropped DLL

Checks processor information in registry

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-16 16:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 16:43

Reported

2024-06-16 16:46

Platform

win7-20240611-en

Max time kernel

118s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "96c0dcf9-92b2-4228-a5e8-6e7164b7fe98" C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "96c0dcf9-92b2-4228-a5e8-6e7164b7fe98" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "96c0dcf9-92b2-4228-a5e8-6e7164b7fe98" C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAXbzwj9XFyEmkcJ2mGkMFiQQAAAACAAAAAAAQZgAAAAEAACAAAAA737ztBx8DWUzdTE62Ia0oMQIJlUi3j8mSnYKooR7F5QAAAAAOgAAAAAIAACAAAAAdE0CNX0bYNhe2VTHTzSzW5iK9OtIy3dblvEyqR354dDAAAAA4C/jE/GRotcQsV1mJyCmZDwg8Yj1MPZ2hJ+5nIep1zEOU91pSHxhHOWbk/VWgUvVAAAAAFB66zaEx8QrmtS9vWQxgPXmKxp3qPxGfUAN+cLB7LM6DupO0Riqcq5ykduUq591jy4Nk7ncnc3hXvr43QAx0CQ==" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2136 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe
PID 2136 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe
PID 2136 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe
PID 2136 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe
PID 2792 wrote to memory of 2500 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe
PID 2792 wrote to memory of 2500 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe
PID 2792 wrote to memory of 2500 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe
PID 2792 wrote to memory of 1200 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe
PID 2792 wrote to memory of 1200 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe
PID 2792 wrote to memory of 1200 N/A C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\icarus-info.xml /install /sssid:2136

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe /sssid:2136 /er_master:master_ep_ca3619dc-b6e9-4e4e-9dd8-a521e1a509ce /er_ui:ui_ep_aba6db0a-f234-4fd1-833a-abb6b8fde9a4

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus.exe /sssid:2136 /er_master:master_ep_ca3619dc-b6e9-4e4e-9dd8-a521e1a509ce /er_ui:ui_ep_aba6db0a-f234-4fd1-833a-abb6b8fde9a4 /er_slave:avg-tu_slave_ep_43e0c415-4ed5-483e-8ade-a7105453af9b /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab84C.tmp

MD5 2d3dcf90f6c99f47e7593ea250c9e749
SHA1 51be82be4a272669983313565b4940d4b1385237
SHA256 8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA512 9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 d1ca94e73d54dfaeda71eebcb010d9d4
SHA1 48992924739ad633a2a45f96a719649e5c8b24d4
SHA256 de250fbd096215f130860035a3973a974ae5be5a114edcfcfeee71ef1ffb9892
SHA512 261347484d7bc1df4364fb6ddd2867fcc0b22c77fa8c8ef3954286b521b07cbf47c4c13c7ce1604315feb336bb08563b59fc753beaf85774acac337c7e68166d

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 b21e2390ca2a8418bde8bdc2d458243f
SHA1 950341ebc7ca1217d464faab507c2eb0da98ef9b
SHA256 e8647c083b2954f96f7e50c50097c9999ecc13f1324d21dd46a3c437458b4316
SHA512 fb5f0ea8507b0295557c95fa097a95e10560daca819285cbfebd3d8b5a0140dc993b5e4d489a9b41249bdbf06414a93f75fad28ecc104cba3ff34df3a6f1aad6

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\eref.edat

MD5 90393b99cbdbe0ff222a4987e3e20605
SHA1 75add246c8ad221099e753746050e492f55c45ea
SHA256 6e848b8564fe151cf4f8960dececbf6080cff79c885da3401c84680f9a13b933
SHA512 6f9d0a1b225377052fb65f988969aa0b8f0b67cfd5c1d11a9db2af53cb3205820ad01a2b469d13de7b9161d427791f8d7e80a1b3d0381284c4cccc1a9708706e

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\icarus-info.xml

MD5 2fc7795fd6cb2805b9948f3b4d0ff2ee
SHA1 2c4301f696313a9c49aaa36bee12027c68c217b3
SHA256 c7f1dc4b86245adf0bdd0e4d2e624a2d2ab2ef73c23af276e155f2b6c9bd18c6
SHA512 2bc1197ee2d42f0c43508c9b69d4fbcc605427c16c432cb61e6b078dc953f8d5c8459fd497869a2437744f96870bea5c63103edd6b6bcf1aa55bd735173c8588

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\ecoo.edat

MD5 24db7359a3bd3947b750594af0f959f6
SHA1 0d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256 fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512 eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

memory/2500-102-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 03d52c9a44c6d15a2510527a8158f50b
SHA1 80a1190c21e6bca75a79cca3d63ff603c0e60d7a
SHA256 3288769497eb2490089d7a8ac7eddfe92dce4a52edc0c1c211ccfe217ba039b3
SHA512 31b58f692459919b2e3d17feb60002749334abe60389b6cc1a1a25d5e680d9a46df6a246fc829c616a4bd0793fc5e61858d14a3b172bfe450402d397f17ea2bf

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 795332dfb7848e8ca91b8e0b72a448fa
SHA1 74e3b4597c9046a2af5ec6852a08a5250a6ac2a3
SHA256 25c48b5670aeeb28b4f3a9a3a96443d98cd8bcb847275196b9de5fbc1c8c0116
SHA512 22979779de29816359567685fa7296adf2c7a4890a7e78077205c38d484559fc61e5269a087a5c7ad84c64930b048e0d0a7417feb88b26075f7f3b269d1ad98b

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-560490c1-1316-4e94-b4b5-e2328e6c423c\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 16:43

Reported

2024-06-16 16:46

Platform

win10v2004-20240226-en

Max time kernel

138s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAR4G/3BTRD02oLurJAKilegQAAAACAAAAAAAQZgAAAAEAACAAAAAkJjZ1mklRmCCnzURPxb7qpRUJoLTw3uW+ZjgYA8NE1QAAAAAOgAAAAAIAACAAAABTt/0htrAaH0EYb7Te1UkHJY7BKQxecYkSNoz0KwoqIFAAAACyjAUAx8Pq03lST1VqjlsyjHXh9GPGkWMBwOWlTznTYRbA5HwMoyOiseRvb+YkZ4npVh6sTi3Cxwag98vHO2dJeYOk1pezEVCMfiT5UkbUNEAAAABrLZnshSNx1yvG3jBvEfqyAmRu9SQUpR5bLvzuWZ356cDkiJEr0n498eX3AK/jlFzz7gkyieTGzalKgLzB1a+h" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\icarus-info.xml /install /sssid:4480

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe /sssid:4480 /er_master:master_ep_81aabd08-f636-4b9b-b946-fdd82956cb45 /er_ui:ui_ep_90dd5374-b9b2-4e42-98b0-523f04490179

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe /sssid:4480 /er_master:master_ep_81aabd08-f636-4b9b-b946-fdd82956cb45 /er_ui:ui_ep_90dd5374-b9b2-4e42-98b0-523f04490179 /er_slave:avg-tu_slave_ep_0ca3faac-d3dc-41a1-af51-e461a8b0770b /slave:avg-tu

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 223.223.117.34.in-addr.arpa udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 74.113.220.23.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 28.176.160.34.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 eb431903802b737554598817d4140f58
SHA1 0702c12855bdf6fe5181072b099971f2b6cd51ba
SHA256 5f10293a0b4473ec74d2f3eae4fe8814b03a4d05eeb935ccacc74e28b99f1bd6
SHA512 cb92375c2e246a59cab7d447c9743538553a0cb965447d07d79c2c9cea9cab8e9f6fbfa4dfecc730e6352410b9767b2307850a23daceed414c471f4304b80086

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 4bcc9c5eca1e19a47f74e21e7f875bb2
SHA1 1bbe42bace33e0494d533b68941d7ed7a37cc361
SHA256 497696e8a26918c886b5f3a6a8ef18a8f370b39c2fa177c77f0b1ee873644b90
SHA512 1109495c368581d20d25747c54c92e8337e723b5641ae84cf209765c8654331e35dea3ceef7d234f8e4d59429b8a42e05bb1bfd443cbeace36d653ca21e216f6

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\icarus-info.xml

MD5 d40f162e23b004cace86d1aa7d36c1a0
SHA1 8cb7f729dccef95017503e43f3c132f86ac78041
SHA256 10212c0ca7334cb218557e53241391d5e9ead1b2d4a2c9041b62e27b65e4ab77
SHA512 683bb3258200d8d25d2d64f1a7aa102f09b827c563277eff71c445624a39f5aef8036c1b4669a9559216822217bdcbd04a7795a2b751139ec9b5fd11b2a59501

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\eref.edat

MD5 90393b99cbdbe0ff222a4987e3e20605
SHA1 75add246c8ad221099e753746050e492f55c45ea
SHA256 6e848b8564fe151cf4f8960dececbf6080cff79c885da3401c84680f9a13b933
SHA512 6f9d0a1b225377052fb65f988969aa0b8f0b67cfd5c1d11a9db2af53cb3205820ad01a2b469d13de7b9161d427791f8d7e80a1b3d0381284c4cccc1a9708706e

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 22417b5d5eb168147f2c237d658a7163
SHA1 6ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256 f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512 392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\ecoo.edat

MD5 24db7359a3bd3947b750594af0f959f6
SHA1 0d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256 fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512 eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 1b57e784922e2f045e97288da45d9a8c
SHA1 883ec523b232e1365625f8911da428005a247197
SHA256 aeaf93a1f9fa7abb3384ed061703b0456483ac069d5fd207005e1e285455cfbc
SHA512 54a7e0839521b39df923cb35dbb42ea874a6b8a915052a3438716748a025c65684b2b74ebb769fc1bcafe7ba1b33501751e9002cf2496a8058648e04fafb32e6

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 ad88c29b430b97c0cd734d611052fb63
SHA1 339c608c56bd6ca54d99510a0f5fec6f64034535
SHA256 88ad6b849a4305993aec4e4fe5f7d8ad281a1f314002c4d8eb79b63371386186
SHA512 f6127547307871ffc11be7c99a1082b855ba36b29a5565495801ba3c94df5378edc96621214470a5ac8a3fa897125941477f30a8b0c9ff99aae913ce1e0d5446

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890