| URL: | https://www.avg.com/cs-cz/download-thank-you.php?product=FREEGSR |
| Full analysis: | https://app.any.run/tasks/2f589ed0-b5cb-4665-9e38-0d401a96b7f9 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | July 02, 2025, 11:49:05 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 1C44475200889F2651AEEEF88D8E895B |
| SHA1: | 1E3703E3969D5DB7A851B910B33165A94B861BC1 |
| SHA256: | B0F981A46ADE272AB2FC413386E857438132319075F1A76838B50195996FDE1E |
| SSDEEP: | 3:N8DSL72W3RNPnVWGYj3ggV3n:2OLyIPVnYLg23 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 524 | "C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1104,i,10509269214779822398,10342702116726936407,131072 /prefetch:8 | C:\Program Files\AVG\Browser\Application\AVGBROWSER.EXE | — | AVGBROWSER.EXE | |||||||||||
User: admin Company: AVG Technologies Integrity Level: LOW Description: AVG Secure Browser Exit code: 0 Version: 109.0.25992.121 Modules
| |||||||||||||||
| 580 | "C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\AVG\Browser\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\AVG\Browser\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\AVG\Browser\User Data" --url=fake_url --annotation=plat=Win32 --annotation=prod=AVG --annotation=ver=109.0.25992.121 --initial-client-data=0xcc,0xd0,0xd4,0xa0,0xd8,0x55b58b48,0x55b58b58,0x55b58b64 | C:\Program Files\AVG\Browser\Application\AVGBrowser.exe | — | AVGBrowser.exe | |||||||||||
User: admin Company: AVG Technologies Integrity Level: MEDIUM Description: AVG Secure Browser Version: 109.0.25992.121 Modules
| |||||||||||||||
| 656 | C:\Windows\Temp\asw-fc4f9037-72d5-45a3-aa6c-626626ece134\common\icarus_ui.exe /cookie:mmm_bav_998_999_000_m:dlid_FREEGSR /edat_dir:C:\Windows\Temp\asw.ddc401324e3aec1c /geo:NL /track-guid:22a3067c-89c9-49bc-94a1-9b8bd2206dd3 /sssid:2308 /er_master:master_ep_fce3affd-35b1-4dec-9e74-6a0a762004f6 /er_ui:ui_ep_e24fbd53-f5e2-4860-a237-3bc4ad4a2ef8 | C:\Windows\Temp\asw-fc4f9037-72d5-45a3-aa6c-626626ece134\common\icarus_ui.exe | icarus.exe | ||||||||||||
User: admin Company: Gen Digital Inc. Integrity Level: HIGH Description: AVG UI Version: 25.6.9397.0 Modules
| |||||||||||||||
| 820 | "C:\Program Files\AVG\Antivirus\AVGSvc.exe" /runassvc | C:\Program Files\AVG\Antivirus\AVGSvc.exe | services.exe | ||||||||||||
User: SYSTEM Company: Gen Digital Inc. Integrity Level: SYSTEM Description: AVG Service Version: 25.6.10221.0 Modules
xor-url(PID) Process(820) AVGSvc.exe Decrypted-URLs (2)http://dl.dropbox.com/ http://jabox.ru/ (PID) Process(820) AVGSvc.exe Decrypted-URLs (1)https://i.imgurn (PID) Process(820) AVGSvc.exe Decrypted-URLs (3)http://u.to/ http://www.pussy.com http://www.ultra.com (PID) Process(820) AVGSvc.exe Decrypted-URLs (90)http://aa.18dd.net/ww/new http://api.xxxxxxxxxxxx http://apis.googlestorge.ru/apis/ http://app2.tsmon.co.kr/filenmsbr/nmsbr http://buy.haote.com/? http://cmp.torrentsma http://ct.chameleontom.org/ http://data.down http://develsee.info/taveara?q= http://elongoogle.info/taveara?q=A http://errors.fullmanlock.com/utility.gif?report=fdata&f& http://errors.localkeymappeer.com/utility.gif?report=fda9l@ http://errors.localkeymappeer.com/utility.gifou_B http://errors.neomapobjectrack.com/utility.gif?report=fd http://errors.nodedomax.com/utility.gif?report=fd http://errors.staticclientstorage.com/utility.gif?report=fdata&f=]H http://errors.staticclientstorage.com/utility.gif?report=fdata&y http://errors.staticinputserv.com/utility.gif?re http://file.ietab.co.kr/dst/InsideTool_I http://file.ietab.co.kr/dst/InsideTool_IT http://get.dribbla.xyzK http://kcyber.info/pub/dsct.exe http://kkpic.net/ggg/adc/U~ http://livestatscounter.com/Generic/am.php?pr= http://logs.clientstaticserv.com/monetization.gif?event=3&ibi http://logs.datagenserv.com/monetization.gif?event=5&ibic= http://logs.democlientnet.com/monetization.gif?event= http://logs.demogensrv.com/monetization.gif?event=5&i http://logs.geninfocloud.com/monetization.gif?event=5&ibic= http://logs.genstatsnet.com/monetization.gif?event=5& http://logs.infodatacloud.com/monetization.gif?event= http://logs.infogenservice.com/monetization.gif?event= http://logs.infostatsserv.com/monetization.gif?event=4' http://logs.loadclientinputsrv.com/monetization.gif?evenA http://logs.localkeymappeer.com/monetization.gif?event=5 http://logs.neomapobjectrack.com/monetization.gif?eve http://logs.neomapobjectrack.com/monetization.gif?event= http://logs.neomapobjectrack.com/monetization.gif?event=Y http://logs.newclientonlinestorage.com/monetization.gif?event=5&ibic= http://logs.newdatastatsserv.com/monetization.gif?ev http://logs.newdatastatsserv.com/monetization.gif?event= http://logs.newdatastatsserv.com/monetization.gif?event=5&ibic= http://logs.newinfoclientstack.com/monetization.g http://logs.newstaticinputserv.com/monetization.gif?event=5&ibic= http://logs.newstatsd http://logs.ourstaticdatastorage.com/monetization.gif?ev http://logs.ourstatsstaticstack.com/monetization.gif?evea8r http://logs.staticclientstorage.com/monetization.gif?eveZ http://logs.staticclientstorage.com/monetization.gif?p http://logs.staticinputserv.com/monetization.gif?event= http://logs.staticinputserv.com/monetization.gif?event=5. http://logs.staticinputserv.com/monetization.gif?event=5= http://malta.pushmonkey.life/lv7.php?p=& http://malta.pushmonkey.life/lv7.php?p=&pid= http://mfd.malavida.org/ http://outware.info/taveara?q= http://pe-ento.com/launch_v3.php?p= http://pe-ento.com/start_v2.php?p=Y http://pe-mainin.com/launch.php?p=sevenzip&pid= http://pf.dlwvit.com/s/ http://pf.dlwvit.com/s/2/ http://powerdry.info/taveara?q= http://qvc.com/qic/ http://sd.dlwvit.com/s/ http://sd.dlwvit.com/s/1 http://sniff.su http://softvers.in/adobe.php?ver=93 http://speeddownload.co.uk/?sid= http://strong.girlsmist.online/lvx7.php?p=sevenzip&tid=:S http://strong.girlsmist.online/lvx7.php?p=sevenzip&tid=R http://tap.frip783.xyz/stats.php?bu= http://up.ic-upp.xyz/stats.php?[ http://up.ic-upp.xyz/stats.php?bu= http://update.vaccineclean.co.kr/inst http://www.bitcoinplus.com/generate?for= http://www.espejosescorts.com/ http://x.azjmp.com/c.php?o=10580& https://api-torrent.ru/api/offer2/get?s https://api-torrent.ru/api/offer2/get?st https://api-torrent.ru/api/offer?torrent_id= https://api-torrentzz.ru/api/offer2/get?st https://gosoftdl.mail.ru/switcher_pd_3_9.exe https://loderka.ru/api/offer?v= https://loderka.ru/api/offer?v=Z https://loderka.ru/api/soft/launch?torrent_id= https://loderka.ru/api/soft/open?torrent_id= https://moytorrent.ru/api/soft/launch?torrent_id= https://my-games-online.ru/site/?gid= https://torrent-apis.ru/api/offer?id= https://www.runonpc.com | |||||||||||||||
| 872 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3124 --field-trial-handle=1164,i,12210161467858944343,15603037487734219157,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Version: 109.0.5414.120 Modules
| |||||||||||||||
| 880 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2036 --field-trial-handle=1164,i,12210161467858944343,15603037487734219157,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 892 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1164,i,12210161467858944343,15603037487734219157,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1072 | "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /netservice:sw_avgNdis | C:\Program Files\AVG\Antivirus\SetupInf.exe | — | icarus.exe | |||||||||||
User: admin Company: Gen Digital Inc. Integrity Level: HIGH Description: AVG Antivirus Installer Exit code: 0 Version: 25.6.10221.0 Modules
| |||||||||||||||
| 1120 | "C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /netservice:avgNdisFlt /catalog:avgNdisFlt.cat | C:\Program Files\AVG\Antivirus\SetupInf.exe | — | icarus.exe | |||||||||||
User: admin Company: Gen Digital Inc. Integrity Level: HIGH Description: AVG Antivirus Installer Exit code: 0 Version: 25.6.10221.0 Modules
| |||||||||||||||
| 1276 | "C:\Program Files\AVG\Browser\Application\AVGBrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3772 --field-trial-handle=1104,i,10509269214779822398,10342702116726936407,131072 /prefetch:8 | C:\Program Files\AVG\Browser\Application\AVGBrowser.exe | — | AVGBROWSER.EXE | |||||||||||
User: admin Company: AVG Technologies Integrity Level: LOW Description: AVG Secure Browser Exit code: 0 Version: 109.0.25992.121 Modules
| |||||||||||||||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics |
| Operation: | write | Name: | user_experience_metrics.stability.exited_cleanly |
Value: 0 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (2932) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF180c9d.TMP | — | |
MD5:— | SHA256:— | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat | binary | |
MD5:9C016064A1F864C8140915D77CF3389A | SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787 | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Variations | binary | |
MD5:961E3604F228B0D10541EBF921500C86 | SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF180d88.TMP | text | |
MD5:9AEF4FC2E5E6CB2A6B007C4E055E4E2B | SHA256:09690C7F1A6D998629F06D10A8BDA6F1270051DC9DACFFF4C486EEA27259B5C1 | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\f5c21504-55db-4a66-9f11-64077fe8812f.tmp | binary | |
MD5:5058F1AF8388633F609CADB75A75DC9D | SHA256:— | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old | text | |
MD5:BA7689060D5F63DFDFBA8C8E0F41F595 | SHA256:24EDAB7802B11854E0F0E84B88324BBCC89406A67108BE429ACD1B7E7F5C7935 | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:7834F0F4F84436FBA53DBD269A0EF489 | SHA256:13FAEF8B1666BE211F6A0FD9E8DF64B79AAC81C55C5F2FAAF913C82BADC9A060 | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF1810c4.TMP | — | |
MD5:— | SHA256:— | |||
| 2932 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1880 | avg_antivirus_free_setup.exe | POST | 200 | 142.250.186.78:80 | http://www.google-analytics.com/collect | unknown | — | — | whitelisted |
1880 | avg_antivirus_free_setup.exe | POST | 204 | 34.117.223.223:80 | http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi | unknown | — | — | whitelisted |
1880 | avg_antivirus_free_setup.exe | POST | 204 | 34.117.223.223:80 | http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi | unknown | — | — | whitelisted |
1880 | avg_antivirus_free_setup.exe | POST | 200 | 142.250.186.78:80 | http://www.google-analytics.com/collect | unknown | — | — | whitelisted |
656 | icarus_ui.exe | GET | 200 | 2.16.168.117:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?26accff6c9ce40d2 | unknown | — | — | whitelisted |
656 | icarus_ui.exe | GET | 200 | 216.58.206.67:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | unknown | — | — | whitelisted |
656 | icarus_ui.exe | GET | 200 | 216.58.206.67:80 | http://o.pki.goog/s/wr3/dY4/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEHWOSH6KlFk1Eq36xtAHpVc%3D | unknown | — | — | whitelisted |
860 | svchost.exe | HEAD | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx | unknown | — | — | whitelisted |
656 | icarus_ui.exe | GET | 200 | 142.250.185.163:80 | http://c.pki.goog/r/r1.crl | unknown | — | — | whitelisted |
656 | icarus_ui.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2856 | chrome.exe | 23.212.219.226:443 | www.avg.com | AKAMAI-AS | AU | whitelisted |
2932 | chrome.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2856 | chrome.exe | 142.250.102.84:443 | accounts.google.com | GOOGLE | US | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
2856 | chrome.exe | 104.18.87.42:443 | cdn.cookielaw.org | CLOUDFLARENET | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2856 | chrome.exe | 69.192.160.133:443 | s.go-mpulse.net | AKAMAI-AS | DE | whitelisted |
2856 | chrome.exe | 23.35.236.237:443 | assets.adobedtm.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
accounts.google.com |
| whitelisted |
www.avg.com |
| whitelisted |
cdn.cookielaw.org |
| whitelisted |
static2.avg.com |
| whitelisted |
s.go-mpulse.net |
| whitelisted |
assets.adobedtm.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
geolocation.onetrust.com |
| whitelisted |
dpm.demdex.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2856 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com) |
2856 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com) |
2856 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com) |
2856 | chrome.exe | Not Suspicious Traffic | INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com) |
1080 | svchost.exe | Misc activity | ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com) |
1880 | avg_antivirus_free_setup.exe | Misc activity | ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI |
1080 | svchost.exe | Misc activity | ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com) |
3408 | AvEmUpdate.exe | Misc activity | ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI |
3408 | AvEmUpdate.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
1080 | svchost.exe | Misc activity | ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com) |
Process | Message |
|---|---|
afwServ.exe | [2025-07-02 11:52:04.252] [error ] [afwAnen ] [ 3352: 4060] [47CF5B:3557] Setting NLA supress registry failed with error: {}
Exception: Insufficient registry permissions: Cannot create registry key (on path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\NetworkLocationWizard)
Code: 0x00000005 (5)
|
AVGSvc.exe | [2025-07-02 11:52:04.971] [error ] [events_rep ] [ 820: 3428] [244FEC: 49] asw::burger_event::regular_burger_event_reporter_holder::start_all : starting of class asw::burger_event::data_sharing_preference_report failed with an exception : Identity of Burger client was not set.
|
AVGSvc.exe | [2025-07-02 11:52:08.096] [error ] [dnsdoh ] [ 820: 3484] [4D6837: 73] failed to restore usage statistics
Exception: corrupted file
|
AVGSvc.exe | [2025-07-02 11:52:09.565] [info ] [nsf_urlinfo] [ 820: 3484] [C22399: 39] Initialize UrlInfoMgr
|
AVGSvc.exe | [2025-07-02 11:52:09.565] [info ] [nsf_urlinfo] [ 820: 3484] [BA6D43: 46] Starting UrlInfo
|
AVGSvc.exe | [2025-07-02 11:52:09.581] [info ] [nsf_urlinfo] [ 820: 3484] [C22399: 72] UrlInfoMgr initialized
|
AVGSvc.exe | [2025-07-02 11:52:09.737] [error ] [av_pp_prov ] [ 820: 1324] [FAB8CB: 268] p_pcage: failed to get bios date
|
AVGSvc.exe | [2025-07-02 11:52:09.737] [error ] [av_pp_prov ] [ 820: 3424] [FAB8CB: 268] p_pcage: failed to get bios date
|
AVGSvc.exe | [2025-07-02 11:52:09.768] [error ] [av_pp_prov ] [ 820: 1376] [FAB8CB: 268] p_pcage: failed to get bios date
|
AVGSvc.exe | [2025-07-02 11:52:10.284] [error ] [AlphaClient] [ 820: 1324] [C005A1: 13] ~sqNfYYjPFZXV/7ITvx1wybS3IHCU3imMj/u0I70OXNaCpgtn0uQVuI/soziBD0rIsosTep+VP4nA/7IpsA8Bw7y9E3aYlXjRmb/1eepeGZ39jxphjuQugtLo/G6wBHDJtLcafY/eaMvC5Kg4uxNbn6+gC0yOzz6T/uqwE7ICTPq+vBpwl5U6lc7ooz+tNF3RqfoeZZDSJ7jU+6ITvR5d14K4FnDS1SWLyOjoK7sfcMG4uRBMkNIpydTlpziqDkHBgA==
|