Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 22:40 UTC

General

  • Target

    Avira Phantom VPN Pro 2.44.1.19908.exe

  • Size

    5.2MB

  • MD5

    0fe5732c15e8150c8f107a0e73db4e45

  • SHA1

    a3b4e14d09b82d365dbf52480854e399b2672f34

  • SHA256

    940ec4012984218f6e314d793c995b3cb3c3366aabba0308fece77fe2ed7abb7

  • SHA512

    2cedc194be8ec37a7d035bcf4af42ea74a6a51fa220ea2d9edc406ae5a7b4dea022f1287c09a22f59a552e23a20730821184434cee2879371db0a78897d0e292

  • SSDEEP

    98304:w0FHAF/aUuvI2peNyoiOC+uWiOqXL6cY9J54jqrZwY8v:xFHAFdCpwy+PeOZ9J5v2YQ

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 62 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Avira Phantom VPN Pro 2.44.1.19908.exe
    "C:\Users\Admin\AppData\Local\Temp\Avira Phantom VPN Pro 2.44.1.19908.exe" @ECHO OFF Color 0B @cls echo. echo. echo. @echo ////////////////////////////////////////////////////////////// @echo / / @echo / Avira Phantom VPN Pro is installing... / @echo / / @echo / Please wait... / @echo / / @echo / Dont close this window / @echo / / @echo ////////////////////////////////////////////////////////////// @echo off FOR %%i IN ("Avira Phantom VPN Pro*.exe") DO Set FileName="%%i" %FileName% /VERYSILENT
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\is-7PGU8.tmp\Avira Phantom VPN Pro 2.44.1.19908.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7PGU8.tmp\Avira Phantom VPN Pro 2.44.1.19908.tmp" /SL5="$B01E2,4884611,248832,C:\Users\Admin\AppData\Local\Temp\Avira Phantom VPN Pro 2.44.1.19908.exe" @ECHO OFF Color 0B @cls echo. echo. echo. @echo ////////////////////////////////////////////////////////////// @echo / / @echo / Avira Phantom VPN Pro is installing... / @echo / / @echo / Please wait... / @echo / / @echo / Dont close this window / @echo / / @echo ////////////////////////////////////////////////////////////// @echo off FOR %%i IN ("Avira Phantom VPN Pro*.exe") DO Set FileName="%%i" %FileName% /VERYSILENT
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im Avira.WebAppHost.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im Avira.VPN.Notifier.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im Avira.NetworkBlocker.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4828
      • C:\Windows\SysWOW64\sc.exe
        "C:\Windows\System32\sc.exe" stop AviraPhantomVPN
        3⤵
        • Launches sc.exe
        PID:5096
      • C:\Program Files (x86)\Avira\VPN\OpenVpn\TAP\win10\amd64\tapinstall.exe
        "C:\Program Files (x86)\Avira\VPN\OpenVpn\TAP\win10\amd64\tapinstall.exe" install "C:\Program Files (x86)\Avira\VPN\OpenVpn\TAP\win10\amd64\OemVista.inf" "phantomtap"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
      • C:\Windows\SysWOW64\sc.exe
        "sc" create "AviraPhantomVPN" displayname= "Avira Phantom VPN" start= auto binPath= "C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe"
        3⤵
        • Launches sc.exe
        PID:620
      • C:\Windows\SysWOW64\sc.exe
        "C:\Windows\System32\sc.exe" start "AviraPhantomVPN"
        3⤵
        • Launches sc.exe
        PID:1112
      • C:\Windows\SysWOW64\sc.exe
        "sc" description "AviraPhantomVPN" "AviraPhantomVPN"
        3⤵
        • Launches sc.exe
        PID:2652
      • C:\Windows\SysWOW64\sc.exe
        "sc" failure AviraPhantomVPN reset= 86400 actions= restart/5000/restart/10000//1000
        3⤵
        • Launches sc.exe
        PID:4524
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall add rule dir=in action=allow program="C:\Program Files (x86)\Avira\VPN\OpenVpn\phantomvpn.exe" enable=yes profile=any name="Avira Phantom VPN"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:4900
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall add rule dir=out action=allow program="C:\Program Files (x86)\Avira\VPN\OpenVpn\phantomvpn.exe" enable=yes profile=any name="Avira Phantom VPN"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:2284
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C TIMEOUT 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3448
        • C:\Windows\SysWOW64\timeout.exe
          TIMEOUT 10
          4⤵
          • Delays execution with timeout.exe
          PID:3176
      • C:\Program Files (x86)\Avira\VPN\Avira.WebAppHost.exe
        "C:\Program Files (x86)\Avira\VPN\Avira.WebAppHost.exe" /migrateSettings
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{3f23bb9a-e83c-9d42-894b-7aee2ca91c2f}\oemvista.inf" "9" "457afe35b" "0000000000000144" "WinSta0\Default" "0000000000000160" "208" "c:\program files (x86)\avira\vpn\openvpn\tap\win10\amd64"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:216
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:phantomtap.ndi:9.24.2.601:phantomtap," "457afe35b" "0000000000000144"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1204
  • C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe
    "C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe"
    1⤵
    • Executes dropped EXE
    • Checks for any installed AV software in registry
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Program Files (x86)\Avira\VPN\Avira.NetworkBlocker.exe
      "C:\Program Files (x86)\Avira\VPN\Avira.NetworkBlocker.exe" delete
      2⤵
      • Executes dropped EXE
      PID:1652

Network

  • flag-us
    DNS
    69.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.dual-a-0034.a-msedge.net
    g-bing-com.dual-a-0034.a-msedge.net
    IN CNAME
    dual-a-0034.a-msedge.net
    dual-a-0034.a-msedge.net
    IN A
    13.107.21.237
    dual-a-0034.a-msedge.net
    IN A
    204.79.197.237
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=
    Remote address:
    13.107.21.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=08A7B5D5C1956CFC190DA16FC0B26D55; domain=.bing.com; expires=Wed, 06-Aug-2025 22:40:55 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 9D1BAA8045A34C5EA39E6F07DD0689E2 Ref B: LON04EDGE0719 Ref C: 2024-07-12T22:40:55Z
    date: Fri, 12 Jul 2024 22:40:55 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=
    Remote address:
    13.107.21.237:443
    Request
    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=08A7B5D5C1956CFC190DA16FC0B26D55
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=uMKNMA0Wb0rmsSfM5TQHpCl5obp9JRgPfTpaL2I7-gw; domain=.bing.com; expires=Wed, 06-Aug-2025 22:40:56 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: E0928184F63D4F998CF8D33407141D04 Ref B: LON04EDGE0719 Ref C: 2024-07-12T22:40:56Z
    date: Fri, 12 Jul 2024 22:40:55 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=
    Remote address:
    13.107.21.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=08A7B5D5C1956CFC190DA16FC0B26D55; MSPTC=uMKNMA0Wb0rmsSfM5TQHpCl5obp9JRgPfTpaL2I7-gw
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 50BCF9E0FE3A4F1E9D8FEAF6CD4381B8 Ref B: LON04EDGE0719 Ref C: 2024-07-12T22:40:56Z
    date: Fri, 12 Jul 2024 22:40:55 GMT
  • flag-us
    DNS
    237.21.107.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    237.21.107.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    crl.globalsign.com
    Remote address:
    8.8.8.8:53
    Request
    crl.globalsign.com
    IN A
    Response
    crl.globalsign.com
    IN CNAME
    global.prd.cdn.globalsign.com
    global.prd.cdn.globalsign.com
    IN CNAME
    prod.globalsign.map.fastly.net
    prod.globalsign.map.fastly.net
    IN A
    151.101.2.133
    prod.globalsign.map.fastly.net
    IN A
    151.101.66.133
    prod.globalsign.map.fastly.net
    IN A
    151.101.194.133
    prod.globalsign.map.fastly.net
    IN A
    151.101.130.133
  • flag-us
    GET
    http://crl.globalsign.com/gsextendcodesignsha2g3.crl
    Remote address:
    151.101.2.133:80
    Request
    GET /gsextendcodesignsha2g3.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: crl.globalsign.com
    Response
    HTTP/1.1 200 OK
    Connection: keep-alive
    Content-Length: 4594
    Server: nginx
    Content-Type: application/pkix-crl
    Last-Modified: Tue, 11 Jun 2024 06:00:00 GMT
    ETag: 078E
    Expires: Sat, 15 Jun 2024 00:00:00 GMT
    Cache-Control: public, no-transform, must-revalidate, s-maxage=3600
    Via: 1.1 varnish, 1.1 varnish
    Accept-Ranges: bytes
    Date: Fri, 12 Jul 2024 22:40:58 GMT
    Age: 1949
    X-Served-By: cache-qpg1280-QPG, cache-lon420144-LON
    X-Cache: HIT, HIT
    X-Cache-Hits: 5, 234
    X-Timer: S1720824058.428565,VS0,VE0
  • flag-us
    GET
    http://crl.globalsign.com/gsextendcodesignsha2g3.crl
    Remote address:
    151.101.2.133:80
    Request
    GET /gsextendcodesignsha2g3.crl HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Pragma: no-cache
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: crl.globalsign.com
    Response
    HTTP/1.1 200 OK
    Connection: keep-alive
    Content-Length: 4594
    Server: nginx
    Content-Type: application/pkix-crl
    Last-Modified: Tue, 11 Jun 2024 06:00:00 GMT
    ETag: 078E
    Expires: Sat, 15 Jun 2024 00:00:00 GMT
    Cache-Control: public, no-transform, must-revalidate, s-maxage=3600
    Via: 1.1 varnish, 1.1 varnish
    Accept-Ranges: bytes
    Date: Fri, 12 Jul 2024 22:40:58 GMT
    Age: 1949
    X-Served-By: cache-qpg1280-QPG, cache-lon420144-LON
    X-Cache: HIT, HIT
    X-Cache-Hits: 5, 235
    X-Timer: S1720824059.523480,VS0,VE0
  • flag-us
    DNS
    167.57.26.184.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.57.26.184.in-addr.arpa
    IN PTR
    Response
    167.57.26.184.in-addr.arpa
    IN PTR
    a184-26-57-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    133.66.101.151.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.66.101.151.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.2.101.151.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.2.101.151.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    api.phantom.avira-vpn.com
    Avira.VpnService.exe
    Remote address:
    8.8.8.8:53
    Request
    api.phantom.avira-vpn.com
    IN A
    Response
    api.phantom.avira-vpn.com
    IN CNAME
    api-eu.phantom.avira-vpn.com
    api-eu.phantom.avira-vpn.com
    IN CNAME
    prod-vpn-api-20220523-190101-eu-central-1.phantom.avira-vpn.com
    prod-vpn-api-20220523-190101-eu-central-1.phantom.avira-vpn.com
    IN CNAME
    prod-vpn-api-20220523-190101.eu-central-1.elasticbeanstalk.com
    prod-vpn-api-20220523-190101.eu-central-1.elasticbeanstalk.com
    IN A
    52.29.3.94
    prod-vpn-api-20220523-190101.eu-central-1.elasticbeanstalk.com
    IN A
    3.77.112.201
  • flag-de
    GET
    https://api.phantom.avira-vpn.com/v1/regions?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf&lang=en-US&region_ip=true
    Avira.VpnService.exe
    Remote address:
    52.29.3.94:443
    Request
    GET /v1/regions?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf&lang=en-US&region_ip=true HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2) Phantom/2.44.1
    Host: api.phantom.avira-vpn.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Fri, 12 Jul 2024 22:40:59 GMT
    Content-Type: application/json
    Content-Length: 5424
    Connection: keep-alive
    Server: nginx/1.20.0
    X-Request-ID: 5bb17115-7f02-4979-bd77-f577ba6d9d1b
  • flag-de
    GET
    https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    Avira.VpnService.exe
    Remote address:
    52.29.3.94:443
    Request
    GET /v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2) Phantom/2.44.1
    Host: api.phantom.avira-vpn.com
    Response
    HTTP/1.1 200 OK
    Date: Fri, 12 Jul 2024 22:40:59 GMT
    Content-Type: application/json
    Content-Length: 48
    Connection: keep-alive
    Server: nginx/1.20.0
    X-Request-ID: f6c4f6af-6543-4fac-9346-b164167a7fce
  • flag-de
    GET
    https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    Avira.VpnService.exe
    Remote address:
    52.29.3.94:443
    Request
    GET /v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2) Phantom/2.44.1
    Host: api.phantom.avira-vpn.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Fri, 12 Jul 2024 22:40:59 GMT
    Content-Type: application/json
    Content-Length: 48
    Connection: keep-alive
    Server: nginx/1.20.0
    X-Request-ID: 9f8467c7-67fd-4cae-aefa-d1e07372e52d
  • flag-us
    DNS
    api.mixpanel.com
    Avira.VpnService.exe
    Remote address:
    8.8.8.8:53
    Request
    api.mixpanel.com
    IN A
    Response
    api.mixpanel.com
    IN A
    35.186.241.51
    api.mixpanel.com
    IN A
    35.190.25.25
    api.mixpanel.com
    IN A
    130.211.34.183
    api.mixpanel.com
    IN A
    107.178.240.159
  • flag-us
    GET
    https://api.mixpanel.com/track/?ip=1&data=ew0KICAicHJvcGVydGllcyI6IHsNCiAgICAidG9rZW4iOiAiZTc0ZTZjZTBhNTBhMjdlZWJiODQxNmVhOTg5YjBjMmIiLA0KICAgICJkaXN0aW5jdF9pZCI6ICIyMzE4ZDE5NDczY2I0NmIxOTdjYzE3MTk4NmU5NWFiZmUyMDVkYzI0IiwNCiAgICAiVlBOIENsaWVudCI6ICJXaW5EZXNrdG9wIiwNCiAgICAiT1MiOiAiV2luZG93cyIsDQogICAgIk9TIFZlcnNpb24iOiAiMTAuMC4xOTA0MSIsDQogICAgIlByb2R1Y3QgVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJWUE4gVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJMaWNlbnNlIFR5cGUiOiAiUHJvIiwNCiAgICAiU3Vic2NyaXB0aW9uIjogIkZhbHNlIiwNCiAgICAiU3Vic2NyaXB0aW9uIFR5cGUiOiAiWWVhcmx5IiwNCiAgICAiQXBwIElkIjogIiIsDQogICAgIkV2YWwgTGljZW5zZSI6ICJGYWxzZSIsDQogICAgIkxpY2VuY2UgRXhwaXJhdGlvbiBEYXRlIjogIjIxMDAtMDEtMDFUMDA6MDA6MDAiLA0KICAgICJDbGllbnQgTGFuZ3VhZ2UiOiAiZW4tVVMiLA0KICAgICJCdWNrZXRzIjogIiIsDQogICAgIkNhbXBhaWduIElkIjogIiIsDQogICAgIkRpc3BsYXlTZXR0aW5ncyI6ICJEYXJrVGhlbWUiLA0KICAgICJUaGVtZUNvbG9yIjogIkRhcmtUaGVtZSIsDQogICAgIlNwb3RsaWdodCBBY3RpdmUiOiAiRmFsc2UiLA0KICAgICJTcG90bGlnaHQgVnBuIEludGVncmF0ZWQiOiAiRmFsc2UiLA0KICAgICJWZXJzaW9uIjogIjIuNDQuMS4xOTkwOCIsDQogICAgIkZpcnN0IFNlZW4iOiAiMjAyMi0wOC0xNSAxNzo0MToyOFoiLA0KICAgICJPcGVyYXRpbmcgU3lzdGVtIjogIldpbmRvd3MiLA0KICAgICJPUyBBcmNoaXRlY3R1cmUiOiAieDY0IiwNCiAgICAiT1MgTGFuZ3VhZ2UiOiAiZW4tVVMiDQogIH0sDQogICJldmVudCI6ICJQaW5nIg0KfQ==
    Avira.VpnService.exe
    Remote address:
    35.186.241.51:443
    Request
    GET /track/?ip=1&data=ew0KICAicHJvcGVydGllcyI6IHsNCiAgICAidG9rZW4iOiAiZTc0ZTZjZTBhNTBhMjdlZWJiODQxNmVhOTg5YjBjMmIiLA0KICAgICJkaXN0aW5jdF9pZCI6ICIyMzE4ZDE5NDczY2I0NmIxOTdjYzE3MTk4NmU5NWFiZmUyMDVkYzI0IiwNCiAgICAiVlBOIENsaWVudCI6ICJXaW5EZXNrdG9wIiwNCiAgICAiT1MiOiAiV2luZG93cyIsDQogICAgIk9TIFZlcnNpb24iOiAiMTAuMC4xOTA0MSIsDQogICAgIlByb2R1Y3QgVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJWUE4gVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJMaWNlbnNlIFR5cGUiOiAiUHJvIiwNCiAgICAiU3Vic2NyaXB0aW9uIjogIkZhbHNlIiwNCiAgICAiU3Vic2NyaXB0aW9uIFR5cGUiOiAiWWVhcmx5IiwNCiAgICAiQXBwIElkIjogIiIsDQogICAgIkV2YWwgTGljZW5zZSI6ICJGYWxzZSIsDQogICAgIkxpY2VuY2UgRXhwaXJhdGlvbiBEYXRlIjogIjIxMDAtMDEtMDFUMDA6MDA6MDAiLA0KICAgICJDbGllbnQgTGFuZ3VhZ2UiOiAiZW4tVVMiLA0KICAgICJCdWNrZXRzIjogIiIsDQogICAgIkNhbXBhaWduIElkIjogIiIsDQogICAgIkRpc3BsYXlTZXR0aW5ncyI6ICJEYXJrVGhlbWUiLA0KICAgICJUaGVtZUNvbG9yIjogIkRhcmtUaGVtZSIsDQogICAgIlNwb3RsaWdodCBBY3RpdmUiOiAiRmFsc2UiLA0KICAgICJTcG90bGlnaHQgVnBuIEludGVncmF0ZWQiOiAiRmFsc2UiLA0KICAgICJWZXJzaW9uIjogIjIuNDQuMS4xOTkwOCIsDQogICAgIkZpcnN0IFNlZW4iOiAiMjAyMi0wOC0xNSAxNzo0MToyOFoiLA0KICAgICJPcGVyYXRpbmcgU3lzdGVtIjogIldpbmRvd3MiLA0KICAgICJPUyBBcmNoaXRlY3R1cmUiOiAieDY0IiwNCiAgICAiT1MgTGFuZ3VhZ2UiOiAiZW4tVVMiDQogIH0sDQogICJldmVudCI6ICJQaW5nIg0KfQ== HTTP/1.1
    Host: api.mixpanel.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Headers: X-Requested-With
    Access-Control-Allow-Methods: GET, POST, OPTIONS
    Access-Control-Allow-Origin: *
    Access-Control-Expose-Headers: X-MP-CE-Backoff
    Access-Control-Max-Age: 1728000
    Cache-Control: no-cache, no-store
    Content-Type: application/json
    Strict-Transport-Security: max-age=604800; includeSubDomains
    Date: Fri, 12 Jul 2024 22:40:59 GMT
    Content-Length: 1
    Via: 1.1 google
    Alt-Svc: clear
  • flag-us
    DNS
    94.3.29.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    94.3.29.52.in-addr.arpa
    IN PTR
    Response
    94.3.29.52.in-addr.arpa
    IN PTR
    ec2-52-29-3-94 eu-central-1compute amazonawscom
  • flag-us
    DNS
    51.241.186.35.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    51.241.186.35.in-addr.arpa
    IN PTR
    Response
    51.241.186.35.in-addr.arpa
    IN PTR
    5124118635bcgoogleusercontentcom
  • flag-de
    POST
    https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    Avira.VpnService.exe
    Remote address:
    52.29.3.94:443
    Request
    POST /v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf HTTP/1.1
    Content-Type: application/json; charset=utf-8
    Host: api.phantom.avira-vpn.com
    Content-Length: 320
    Response
    HTTP/1.1 200 OK
    Date: Fri, 12 Jul 2024 22:41:04 GMT
    Content-Type: application/json
    Content-Length: 29
    Connection: keep-alive
    Server: nginx/1.20.0
    X-Request-ID: 484f2e7b-efc1-4ae8-93e2-b0f7803fd673
  • flag-de
    POST
    https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    Avira.VpnService.exe
    Remote address:
    52.29.3.94:443
    Request
    POST /v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf HTTP/1.1
    Content-Type: application/json; charset=utf-8
    Host: api.phantom.avira-vpn.com
    Content-Length: 320
    Response
    HTTP/1.1 200 OK
    Date: Fri, 12 Jul 2024 22:41:19 GMT
    Content-Type: application/json
    Content-Length: 29
    Connection: keep-alive
    Server: nginx/1.20.0
    X-Request-ID: ea147469-d717-4b22-9d50-b4006ef2f4dd
  • flag-us
    DNS
    183.59.114.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    183.59.114.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    dispatch.avira-update.com
    Avira.VpnService.exe
    Remote address:
    8.8.8.8:53
    Request
    dispatch.avira-update.com
    IN A
    Response
    dispatch.avira-update.com
    IN CNAME
    prod.update-bridge.avira.net
    prod.update-bridge.avira.net
    IN CNAME
    eu-central-1.prod.update-bridge.avira.net
    eu-central-1.prod.update-bridge.avira.net
    IN A
    3.124.118.100
    eu-central-1.prod.update-bridge.avira.net
    IN A
    35.158.188.133
  • flag-de
    POST
    https://dispatch.avira-update.com/
    Avira.VpnService.exe
    Remote address:
    3.124.118.100:443
    Request
    POST / HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 6.2) Phantom/2.44.1
    Content-Type: text/json
    Host: dispatch.avira-update.com
    Content-Length: 170
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Content-Type: application/json
    Date: Fri, 12 Jul 2024 22:41:28 GMT
    Server: nginx
    Content-Length: 57
    Connection: keep-alive
  • flag-us
    DNS
    147.142.123.92.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    147.142.123.92.in-addr.arpa
    IN PTR
    Response
    147.142.123.92.in-addr.arpa
    IN PTR
    a92-123-142-147deploystaticakamaitechnologiescom
  • flag-us
    DNS
    100.118.124.3.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    100.118.124.3.in-addr.arpa
    IN PTR
    Response
    100.118.124.3.in-addr.arpa
    IN PTR
    ec2-3-124-118-100 eu-central-1compute amazonawscom
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • 13.107.21.237:443
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=
    tls, http2
    2.0kB
    9.3kB
    21
    19

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c36007e454144a3c8ac876a80cc298c3&localId=w:5B67E6EF-EB19-3B8C-6273-F1B27270E62E&deviceId=6896204247044651&anid=

    HTTP Response

    204
  • 151.101.2.133:80
    http://crl.globalsign.com/gsextendcodesignsha2g3.crl
    http
    787 B
    10.8kB
    10
    14

    HTTP Request

    GET http://crl.globalsign.com/gsextendcodesignsha2g3.crl

    HTTP Response

    200

    HTTP Request

    GET http://crl.globalsign.com/gsextendcodesignsha2g3.crl

    HTTP Response

    200
  • 52.29.3.94:443
    https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    tls, http
    Avira.VpnService.exe
    1.4kB
    13.5kB
    14
    17

    HTTP Request

    GET https://api.phantom.avira-vpn.com/v1/regions?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf&lang=en-US&region_ip=true

    HTTP Response

    200

    HTTP Request

    GET https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf

    HTTP Response

    200
  • 52.29.3.94:443
    https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    tls, http
    Avira.VpnService.exe
    988 B
    7.6kB
    10
    12

    HTTP Request

    GET https://api.phantom.avira-vpn.com/v1/traffic?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf

    HTTP Response

    200
  • 35.186.241.51:443
    https://api.mixpanel.com/track/?ip=1&data=ew0KICAicHJvcGVydGllcyI6IHsNCiAgICAidG9rZW4iOiAiZTc0ZTZjZTBhNTBhMjdlZWJiODQxNmVhOTg5YjBjMmIiLA0KICAgICJkaXN0aW5jdF9pZCI6ICIyMzE4ZDE5NDczY2I0NmIxOTdjYzE3MTk4NmU5NWFiZmUyMDVkYzI0IiwNCiAgICAiVlBOIENsaWVudCI6ICJXaW5EZXNrdG9wIiwNCiAgICAiT1MiOiAiV2luZG93cyIsDQogICAgIk9TIFZlcnNpb24iOiAiMTAuMC4xOTA0MSIsDQogICAgIlByb2R1Y3QgVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJWUE4gVmVyc2lvbiI6ICIyLjQ0LjEuMTk5MDgiLA0KICAgICJMaWNlbnNlIFR5cGUiOiAiUHJvIiwNCiAgICAiU3Vic2NyaXB0aW9uIjogIkZhbHNlIiwNCiAgICAiU3Vic2NyaXB0aW9uIFR5cGUiOiAiWWVhcmx5IiwNCiAgICAiQXBwIElkIjogIiIsDQogICAgIkV2YWwgTGljZW5zZSI6ICJGYWxzZSIsDQogICAgIkxpY2VuY2UgRXhwaXJhdGlvbiBEYXRlIjogIjIxMDAtMDEtMDFUMDA6MDA6MDAiLA0KICAgICJDbGllbnQgTGFuZ3VhZ2UiOiAiZW4tVVMiLA0KICAgICJCdWNrZXRzIjogIiIsDQogICAgIkNhbXBhaWduIElkIjogIiIsDQogICAgIkRpc3BsYXlTZXR0aW5ncyI6ICJEYXJrVGhlbWUiLA0KICAgICJUaGVtZUNvbG9yIjogIkRhcmtUaGVtZSIsDQogICAgIlNwb3RsaWdodCBBY3RpdmUiOiAiRmFsc2UiLA0KICAgICJTcG90bGlnaHQgVnBuIEludGVncmF0ZWQiOiAiRmFsc2UiLA0KICAgICJWZXJzaW9uIjogIjIuNDQuMS4xOTkwOCIsDQogICAgIkZpcnN0IFNlZW4iOiAiMjAyMi0wOC0xNSAxNzo0MToyOFoiLA0KICAgICJPcGVyYXRpbmcgU3lzdGVtIjogIldpbmRvd3MiLA0KICAgICJPUyBBcmNoaXRlY3R1cmUiOiAieDY0IiwNCiAgICAiT1MgTGFuZ3VhZ2UiOiAiZW4tVVMiDQogIH0sDQogICJldmVudCI6ICJQaW5nIg0KfQ==
    tls, http
    Avira.VpnService.exe
    2.0kB
    4.4kB
    9
    10

    HTTP Request

    GET https://api.mixpanel.com/track/?ip=1&data=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

    HTTP Response

    200
  • 52.29.3.94:443
    https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    tls, http
    Avira.VpnService.exe
    1.3kB
    703 B
    7
    7

    HTTP Request

    POST https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf

    HTTP Response

    200
  • 52.29.3.94:443
    https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf
    tls, http
    Avira.VpnService.exe
    1.3kB
    703 B
    7
    7

    HTTP Request

    POST https://api.phantom.avira-vpn.com/v1/features?device_id=0151-a47578f5d4ea4c6485af32eea420ef4ec5b78bdf

    HTTP Response

    200
  • 3.124.118.100:443
    https://dispatch.avira-update.com/
    tls, http
    Avira.VpnService.exe
    1.3kB
    7.1kB
    13
    14

    HTTP Request

    POST https://dispatch.avira-update.com/

    HTTP Response

    200
  • 8.8.8.8:53
    69.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    69.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    151 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    13.107.21.237
    204.79.197.237

  • 8.8.8.8:53
    237.21.107.13.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    237.21.107.13.in-addr.arpa

  • 8.8.8.8:53
    88.156.103.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    88.156.103.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    crl.globalsign.com
    dns
    64 B
    201 B
    1
    1

    DNS Request

    crl.globalsign.com

    DNS Response

    151.101.2.133
    151.101.66.133
    151.101.194.133
    151.101.130.133

  • 8.8.8.8:53
    167.57.26.184.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    167.57.26.184.in-addr.arpa

  • 8.8.8.8:53
    133.66.101.151.in-addr.arpa
    dns
    73 B
    133 B
    1
    1

    DNS Request

    133.66.101.151.in-addr.arpa

  • 8.8.8.8:53
    133.2.101.151.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    133.2.101.151.in-addr.arpa

  • 8.8.8.8:53
    api.phantom.avira-vpn.com
    dns
    Avira.VpnService.exe
    71 B
    253 B
    1
    1

    DNS Request

    api.phantom.avira-vpn.com

    DNS Response

    52.29.3.94
    3.77.112.201

  • 8.8.8.8:53
    api.mixpanel.com
    dns
    Avira.VpnService.exe
    62 B
    126 B
    1
    1

    DNS Request

    api.mixpanel.com

    DNS Response

    35.186.241.51
    35.190.25.25
    130.211.34.183
    107.178.240.159

  • 8.8.8.8:53
    94.3.29.52.in-addr.arpa
    dns
    69 B
    132 B
    1
    1

    DNS Request

    94.3.29.52.in-addr.arpa

  • 8.8.8.8:53
    51.241.186.35.in-addr.arpa
    dns
    72 B
    124 B
    1
    1

    DNS Request

    51.241.186.35.in-addr.arpa

  • 8.8.8.8:53
    183.59.114.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    183.59.114.20.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    dispatch.avira-update.com
    dns
    Avira.VpnService.exe
    71 B
    172 B
    1
    1

    DNS Request

    dispatch.avira-update.com

    DNS Response

    3.124.118.100
    35.158.188.133

  • 8.8.8.8:53
    147.142.123.92.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    147.142.123.92.in-addr.arpa

  • 8.8.8.8:53
    100.118.124.3.in-addr.arpa
    dns
    72 B
    138 B
    1
    1

    DNS Request

    100.118.124.3.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Avira\VPN\App\images\png\regions\is-GG4JT.tmp

    Filesize

    743B

    MD5

    d3b58f803a9a01a59210dd673998a229

    SHA1

    6caddb6c8e749e9c5b786a3984bb7bdbba2bafc5

    SHA256

    3cf52e677d7f7be201cbf6e3ec56ed1f48b95c47e5969ef2c2510e270133c4f0

    SHA512

    88aade4affd629926e473df3d26ecca5ba49c4b77da9343e58729cf3a2b1cd0b9d27d9e019018455bffd18b7a7570a5c14d918eff46deecc5821903f76094988

  • C:\Program Files (x86)\Avira\VPN\Avira.Acp.Common.dll

    Filesize

    14KB

    MD5

    271d473a99869a462e0200e1776b093c

    SHA1

    050bd3a95fc3c1a66a9fa11a7649afe95b48e5ca

    SHA256

    793dc8d33fd8190c6d87c39a860ae4d67c6f02a19b573087831b18202f8e413e

    SHA512

    8df6120445f10fd3a62b72a33f86b1969a42eae85d97154d5f030bebf68d579263be50ba4e0a9758bd9a8698e9680277d1491bebc1b2c91722d0ebab04275510

  • C:\Program Files (x86)\Avira\VPN\Avira.Acp.Resources.dll

    Filesize

    54KB

    MD5

    318f261f2875d1b6ad27afd9aebce1da

    SHA1

    6230901e4b145e7ea66160e9726951931a00b7de

    SHA256

    839942ba4c0e36ad27355f65acf6520bbd6fa0967bfd3d9d6ddec520ca4fc3c9

    SHA512

    379c89f2d165a1551c459984f3aeec556499c2cc7346f4a346d5b651f5a729c44b0f84c68b48f120f8c5ddaba0bfa2895421acb7261f266dd5743ce8fa6a6c80

  • C:\Program Files (x86)\Avira\VPN\Avira.Acp.dll

    Filesize

    151KB

    MD5

    93b9f3f908fd317f6400044ace1426b8

    SHA1

    28a81a9e705837007143c1933a436941bc0e3e73

    SHA256

    4c20af4eb824f54308a3d0fcb1e0c02705e36f4066a96d3187ff61cbd324bfbf

    SHA512

    6b32af4a9e63320ca20daea161c655ad58a4bcaffa8c0ecbe40cf2f41599a09bdc3306916e87777259ade6b120e2eb193e79ca4345268a49786159779d2aead1

  • C:\Program Files (x86)\Avira\VPN\Avira.Common.Acp.AppClient.dll

    Filesize

    43KB

    MD5

    223b514db361069dbe4e56983113092a

    SHA1

    13a71fb55e6cda7db64df764b4073fd59ea6dce7

    SHA256

    c09d32229c51eb1f4bfb7132002e68acc61883fda68365fcd274439eda332af7

    SHA512

    2010806d2a3f60e9714e98e856fab7d651e0cd7f93bdf146ab2870c4a5581dc3809483fd045c40bbeaf1652e0bbb1d06539876d7173a03ee4a71024a2f29e7ee

  • C:\Program Files (x86)\Avira\VPN\Avira.Common.Core.dll

    Filesize

    67KB

    MD5

    12cc33847b511eaab85d42a62bd7770e

    SHA1

    240a3ec390e8271d24687de2d24e221483d7d4dd

    SHA256

    48d0e13ee24af3fe5bd666b410b59f6a12dceca0fabb3038cf29779cbede835a

    SHA512

    94b22e8e0dcac61480213e1292a2e0d93b58d19e5ab7168ed6954a21a67cdd2c33521164d351cdb45d9621a7b21ad979c1f4f013b4f09d53fb98d338838f0e73

  • C:\Program Files (x86)\Avira\VPN\Avira.Messaging.dll

    Filesize

    46KB

    MD5

    f59d38fa0dc7bafff65f9ea5bb88490b

    SHA1

    a0b3da5df01e851f5880934183bf6fd0b3882657

    SHA256

    58d3cc5b59d8f9eb3a187de1377cd40ebf38852944b6d7d59abae64be5416cb0

    SHA512

    b22ec4b48f052bb049cc2c5e285efbbd2dbad1adf77f3c18b832a7bf60872984464ab2fcded4f4e7734d91fd0e671f6d2b56660d277c64b18594c6f21e6f6f81

  • C:\Program Files (x86)\Avira\VPN\Avira.NetworkBlocker.exe

    Filesize

    236KB

    MD5

    01fbb420b06ddc49ed8194292b387425

    SHA1

    203404e993901ba47a166938ea62ea52fabdd2b4

    SHA256

    f9e95d2d3760b2b56f70daad4db65781b090ff014029c6b4e2b7897d0e685cf8

    SHA512

    b488e8d2348e7efa39cf052007421e90fa83724b40f3599444c8dc57cdfa36e2a765d3c377cfcbc45262662844792ebc49f0f4bcf2fa6cdcaa3f3337daef6912

  • C:\Program Files (x86)\Avira\VPN\Avira.VPN.Acp.dll

    Filesize

    31KB

    MD5

    e8cdcbb79fc2efa8b55a79ae427482d3

    SHA1

    a25f319970661010d9e50948786832f89f493e01

    SHA256

    4f1da0dff5d32ef6150a6de7e37907d810f55f4f5e2aa870c4225488af2a3c3d

    SHA512

    df51a2d0d360618517bb8a4deaaa967d78b3c8417a5c78058516db26031bb450e626ef7c0748baa6d7cefa4fa8f9c74c32b17a761bc5b79f331c517131aa9f63

  • C:\Program Files (x86)\Avira\VPN\Avira.VPN.Core.dll

    Filesize

    143KB

    MD5

    43e6727daed1d298b448ab2ce52a2cad

    SHA1

    ec25e38127a76399669c34742b6d449f8bf3c784

    SHA256

    fb7c8fa2243822e609f44e3a0de1f7c6fb03e4c9325d1065f44302ffac494eff

    SHA512

    2afd6f036a8120da5dac5722b8d53764fbb40ff39024b4f03dd7aa531b474ee024a8a569750cb1888b6f1adfdfc6bb0a5bb47f035f0da415639d18b773c89e8f

  • C:\Program Files (x86)\Avira\VPN\Avira.VPN.NotifierClient.dll

    Filesize

    27KB

    MD5

    191011e0325600c321c13a5d642dce8c

    SHA1

    630384ab0c3dcff33964ca8869dd31510ecb8d8d

    SHA256

    b267d1b02da761ff4b2ab2cc72904eab942692929155da7c09e7368492646b89

    SHA512

    8d015e9c706386b47f46f51959ed28169c05b6215442eb3dab2987fd1547dbbc68903ad6667f96c37088eb933dd17bf6ed16d8da678fd44ec3ccb43d5a2be651

  • C:\Program Files (x86)\Avira\VPN\Avira.VPN.OeConnector.dll

    Filesize

    40KB

    MD5

    a382bb982dac18b9b2bee6ab353827be

    SHA1

    5a88ae7ff1d42ce4979e2ac6f6f4d82ea12ec6fd

    SHA256

    b818007801ca7f12c18695aafb18475898f692c0c76a352b49167c57095999b4

    SHA512

    c5eb76520798a284988e084171d5c996e6cf52b94fdb8b3620aeecce5a20111b4020eb2a9f1f8fb59ecaeede97564b853088ca04237ba0fc3be32d76a5e3fd60

  • C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe

    Filesize

    380KB

    MD5

    909650ffdd67f61b1bacdadf30cef13e

    SHA1

    9c1827d1ad678d6c0eed6f110fcc7ce477435598

    SHA256

    dea6fa4e7ccb8f10846c14500d88d17f2a0a678ae0648ae768965f18450b6aa9

    SHA512

    5a726fcc0535ca4e63eef08a6ff4e3b1054048aa3895843c550a6d1ea456503e541ebb5c8fb086f3d45058c7297add85a29c18377f3e8cca12b76c47a91b4753

  • C:\Program Files (x86)\Avira\VPN\Avira.VpnService.exe.config

    Filesize

    8KB

    MD5

    4527b654464acc681c7f1899b2b910ff

    SHA1

    93f86fc08801952bd79a16786ad688496d459368

    SHA256

    05210b2ddc6846c10a95b1f0874240930771c0f4383b60478fbf9585b3a67c61

    SHA512

    288da0f4ad7af467650e5fffb034c1676cf802272d53e21594b2eb1f560ca16a0e977bf4eeda409be88606fc15d052d2b41b808fa99a0c251a810839e889baee

  • C:\Program Files (x86)\Avira\VPN\Avira.WebAppHost.exe

    Filesize

    815KB

    MD5

    ea069f7019a7b305cff275aed802a2ca

    SHA1

    d2b955656a234b507e8fe9d41395fbb97701ba43

    SHA256

    0a2d4aaab11291d99542e74689bc6265bb2a7922d8870167bdcc3210f0627273

    SHA512

    3980747d2acad456b3c5fb6ad3550c9f1520bc54c5ff68d0137d8e2682632e85f26ccd3703aab6c394bfd43f05e5699bc07240ab23e2492358363487bb68cfa5

  • C:\Program Files (x86)\Avira\VPN\Avira.WebAppHost.exe.config

    Filesize

    3KB

    MD5

    0d46bdc17f97e662981fd6ac11888307

    SHA1

    a0c99f49febe776dc8cbee1f7ba9f31cf24d7059

    SHA256

    a2b68cd7ad5e1158d182d59131488a0aa84c106f142ab62451bc284c72218216

    SHA512

    3582ed4c1a001209ff4cb938020b65886e0a95b8466f91074aa3b2b7df57d5c1278c10105e696a2ac7a0453bd9ea26742042bd5f51fee20461d151300050e8a0

  • C:\Program Files (x86)\Avira\VPN\Defaults\ProductSettings.json

    Filesize

    1KB

    MD5

    f9eb282786f0c1d27f9f6ae8b448d4d1

    SHA1

    df4f115df8a7dc8ffc2d7dbdd9953170cb0f8b32

    SHA256

    7e84e38c4b147fa13e871249a9986c4621176ed0afc88c999901e354f603d096

    SHA512

    db8a15d8b7b830dd63819eea73aa160accee27dca61a4b9b76d30f9b4161d28307c47d1f412faad9f92d2b77c17832226c16e8db0bb1d413444de1e918692753

  • C:\Program Files (x86)\Avira\VPN\Messaging.dll

    Filesize

    36KB

    MD5

    198703a2aa65565b3c6232add7d9d22d

    SHA1

    b161ab7056be4892ca92bea1d3ce21d228c4641f

    SHA256

    304c76f16380cdfbe2a1adbbd36f3a9e3a9bcd8c6901a400f0add66027f885b7

    SHA512

    603594e89f1e23d5f649a65d8cb8fbf25bdbc7be4213b436c9bc14518fe81d2eed9393c051f1b97ccb6725ed62bee811b88f9c70262d03f5015b3aebc951f591

  • C:\Program Files (x86)\Avira\VPN\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    a358964e94bf3cb71172d6776f28fc3d

    SHA1

    9f16e876559759cdb52a0cb05db6528dd8f1951c

    SHA256

    cdf68de50fc05055120968d89dfa40f0dcd0a052fe381de1daa312e84b6e41f4

    SHA512

    5de2c65e1e14443ebcff3f09bc7639c7bf9f1033b11533229df610480c9149292cc3336902102c9983368914e92a49a76edfae493b0378e7212e69e3e808c6ca

  • C:\Program Files (x86)\Avira\VPN\OpenVpn\TAP\win10\amd64\OemVista.inf

    Filesize

    7KB

    MD5

    66b9dec2074c3425e6ee6382aa3600c1

    SHA1

    372b2b314cfa40450303c52c52ab1b24516abca6

    SHA256

    427f9551921202143ba72f8d3abec45ad7c887a827fac2864a501551ce309685

    SHA512

    a9c64b8686f750700fe63fa214e4f0780918edc365e8ed8dda4d0305aaf90d74280a47e0c3c688ec1ca6a7b7fd270e24446fcf33c7343b292ea83279d23b85a8

  • C:\Program Files (x86)\Avira\VPN\OpenVpn\TAP\win10\amd64\tapinstall.exe

    Filesize

    482KB

    MD5

    2b1bddf7f9d3190ff73563a41bcb72be

    SHA1

    8a522e9cb1007b922cec9e5ed2b70f01ff12cf0d

    SHA256

    85ab4bbb77ab248956d0da02ace1a2bc58ce6c6db9f421808ef03ed31bbcf3b6

    SHA512

    6a42ac53262c6bafc8d7a5ff225acb07754af8cf044f0135251d4b3cf983a53494d755052296cf49627b3bbe6acead3aa9bacc33b51d222a1d2a0fe6d2bb4f93

  • C:\Program Files (x86)\Avira\VPN\Serilog.Sinks.File.dll

    Filesize

    35KB

    MD5

    97f20eb6f1c67873802f0851859e2aed

    SHA1

    45e83bdbc9c6d992df5bb7233e9a0f8f661c38b2

    SHA256

    d1a929b7aa1b1cfa330a33b3c1f238fb1fcf73c7bd9d43bc3579ad8a9625d824

    SHA512

    0180e31bf95e1ecc6cffc90cbab5b736c61d86bd5b0ac23ae9f3ac7f7602e2b63a0e6f579ff7105f891547deb9beb8bd86fd16995cea4b62b80439a56f7cb761

  • C:\Program Files (x86)\Avira\VPN\Serilog.dll

    Filesize

    150KB

    MD5

    a4cb9f0cd0a7f720cadb28c07542d3de

    SHA1

    39d5a8fc0474224211db95fa80c6c7d12864c8a8

    SHA256

    f14f61e815adbb6403ff70941c7d98f1836792dcd4cdf1fbc77f9164694fc932

    SHA512

    1044a204a3ba81739cb3d937571d9f70fa92e45c754341b35fbbdd5d604ccf8c005b7c92877437f9a827b8ab478627a08c3dca6bf5fa0bc9df72ce2f02f200ca

  • C:\Program Files (x86)\Avira\VPN\ServiceStack.Text.dll

    Filesize

    199KB

    MD5

    537b82928ce015be0594e07587267e41

    SHA1

    4203b59a6563832db4c012e62e09a66501f8ee62

    SHA256

    93003778ab63e158cc18b86066e8fbb2c0104cae570dc3f53aa56b38faf41817

    SHA512

    a073f4b23a1ade5cd27972996fd1b1feeb50c0a04a1c6640124b62cfc2b8b911e793bdbd673147cd89d8ef67b87eaa51668e540f287bdf4d7bb33092aa9d1fd4

  • C:\Program Files (x86)\Avira\VPN\SharpRaven.dll

    Filesize

    100KB

    MD5

    e66983a1cceb2c7cd3f7e3448957d9f6

    SHA1

    b97981265121322034e04f567faf39cbdbd19679

    SHA256

    5521dc13a0264e2f178e205b2fbf76c57ed34ef650bd7508348cba0c9f6b2dd6

    SHA512

    455fe9b542faca8f4add763de2df1fdb4c8b5371e3cdd8df9fda6d743e9c59c22f45a13097159aa92e6fe4d75c2c62aa1192d029368fd4ae58ce4d3f0a2052f2

  • C:\Program Files (x86)\Avira\VPN\System.Diagnostics.DiagnosticSource.dll

    Filesize

    169KB

    MD5

    8a260507f7fe8815fdfd66b97678ddaf

    SHA1

    2d0893fd0b2cc6c4e83d90ac8ef114bdf229d3e7

    SHA256

    30fbf5b1aa8736badeebb85a2e630dc44b65659564d6e8399a71a887e2244b98

    SHA512

    379adb0692dfa46e399e28fe2ea9a0f0a2106f6b5c6b74456f376726d921f3e44cee3c9489fc774ed4b1dad5cbc24247b5e1c2ad2d6efe9cbff469f9eaa44024

  • C:\Program Files (x86)\Avira\VPN\VPN.Core.dll

    Filesize

    179KB

    MD5

    ea3cfd2c4256b3045d7a812c12023feb

    SHA1

    2b3a99ca1876c0f34a7d771227cc35d779077c02

    SHA256

    13db96190d32798a2a1224b309991a69300424f5345d83684ed13c074371dd67

    SHA512

    fc04f26847cd34201fc7e3e2060487a72dac9afc29df849731f311c93f5422cd79031ebc1d28dc2190cee7ceeb66b33a0550ee866981d0646ad9f48a1cd42292

  • C:\Program Files (x86)\Avira\VPN\en-US\Avira.VpnService.resources.dll

    Filesize

    21KB

    MD5

    05d0d2f37e6b683e59cdfd05bcb3b08a

    SHA1

    b21b207367d0b5dba10d67e9bcc5c29175aa6ab9

    SHA256

    57b7256eec2eb64deb1f52ecc3ea529c061b99ae009e4a28f70ad76ce565cbc4

    SHA512

    4c1fa9a21599cc86d4de858d4adb870135be706394a009241425d166c417b9216393ec721ac9f4e2e6659f1d39036672d582a11265a57c715b592f60f5399070

  • C:\ProgramData\Avira\VPN\VpnPrivateSettings.backup

    Filesize

    6KB

    MD5

    d0a82d1f6812d69aab47854a72db915c

    SHA1

    d0c7eee94f5e20351b4f411898669be86be5836f

    SHA256

    8cd642c39ec85d454ff8a598279fff07e10c7b59fa5802118146ef6bb261850b

    SHA512

    4dda2f2bc580772edee950af469ae222e9e5b57d007f5c092fb35e8ebc283e8a8ba911ce54c23082b7124ac1f44b5ef330d0f35f2aea9dc26be5480606bbfa69

  • C:\ProgramData\Avira\VPN\VpnPrivateSettings.backup

    Filesize

    5KB

    MD5

    3ff7097b68d488902cb7b896e654c578

    SHA1

    670f59ba147750607499db3108c7acf6f6421ea1

    SHA256

    ffffcf6237d21ba89ce975f59372079fc01fd85e205e88151f9794183454f1db

    SHA512

    8cd618c43a71029e3cd2af8d41b7a0d01a56bddd65d4fcbba1e1eca5b7f20beebe6e5f5aa5600cf3a9b1e5c555d1b78cbeab44f385581cbe819b3f46ea3befdc

  • C:\ProgramData\Avira\VPN\VpnPrivateSettings.config

    Filesize

    6KB

    MD5

    c260750ef073ff5f47f56ba1115eb25d

    SHA1

    37e52aac332a5ec71c78f9059b910117fe923222

    SHA256

    2fde44bd25894e3a626297de734fe83736bd4d970a86895c59a330a19dcb3d5f

    SHA512

    2229f2bf94f26b7e032b71b2eee05c8cbee938eac0c9a32405e9736e62a47585b54b66fb379af0e343b7ce487b09cb28158b7a21de02bfab29a003327aa0f9e0

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    d7cd5bc483cf692ec7ea5cc75c9154fb

    SHA1

    919b5feb84a489b9ba04fbb22d21b72296bbf108

    SHA256

    647e9c20b459b939edb722c992a344a3d4921d75d0bf4039b626ec318f55407a

    SHA512

    e6f84bbe439c63768f938da50121a5814cf07d650c58dc4b3d9dc37be763d495b590d93ba1db75df15953ed60e37e997b38ffbcc18e12c509fcfa754c5076e64

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    efc1184db0506551856f130aae498902

    SHA1

    16f2e3e4085935e50f4ce99be18eb033f098ab7d

    SHA256

    49b606c2483ca38912548871e26e00e9cba4cbe9b9c0df51bb35ca7c73a57691

    SHA512

    686a0247a140f1df847f17751bac0a10e327bb973042674282689feefa9e022896046a1ac62396cd50f18ca1a0650b131be0b9c74aca3c17191fd29a72bafd5e

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    0884e49a46825963df9f41fe63456a88

    SHA1

    76b875cec2a39e7ae332e75985229d3f34a9a8fd

    SHA256

    c8e167aabcf662a403b81a56f85435022475323c36d13abefa8a151f72883a31

    SHA512

    31fbb83bf632fc0732f081b7b269c649f6f34b118b4015a2ada6c3b1a32ee2c7292dac2e5011cec0904817ce0874da3fe2544d31966722be7ac05f3b71aa5027

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    318ff3ae6a8939b629c95ddd8fab6cd7

    SHA1

    b92a56954c655f5941057ce5552ad201549173a8

    SHA256

    d7606c6870f1db2f4e62d03d7992e67c85ed6979915ce5f53b18aa501c51bd40

    SHA512

    720bcd01e15beb29f0de499f14d8bfcf39d3c587637b3cb5818377cd816f8d61e0991fd1fa43f87ccef095566c99d52e9a9022baec92edbecdd8db274e80bcfc

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    76bb21a82dd1c89cc0366947dbb30a14

    SHA1

    7b3b7c0d9608bc820d68867a5650721fe69f2dd8

    SHA256

    a7d438d2594ab94ec868875bd7708e92862f30a8b04bf844fb2f4b80f6aa144d

    SHA512

    5b92f0ee94e31126a9029aa8b27c5c9ef508ad68339360e583b7a08336c528d9828457a756340849166e07acfe5dabea2f8d8fdbea8a7d9ef3aa35ce9ae13d09

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.backup

    Filesize

    1KB

    MD5

    6ea05cdd1ea6888d59ba054106d72d92

    SHA1

    f3846a3640e360762de9412986098cf500d12ef1

    SHA256

    3f0b5665c895f3bf32883bb2bb2980bf36350ba18842859257d4ba12c0f28953

    SHA512

    a2a022825d69a0fe0e9b65f663c2e2bfef66b9cf74fcd588443220e20410a05d802d69091ec5c68a96a31a903ff7968de55090483123d6679744097f3a468d91

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.config

    Filesize

    1KB

    MD5

    15d329e42c82e88d24a101df3a20b5b9

    SHA1

    c8227ba9ce6892c532e8e43a8b1c9d94183a0ce6

    SHA256

    abd246496373cd49bfcd63bc2d740874dde83c11598137526e9ff75056cfb58f

    SHA512

    06d5a641fab000037d2c84f9e1f33920eccec1ae1e3145525b537eaa5ce7db605bcb0b5cbec7b63d1d370c64a0db9267f708b3b10bc354fa24739fa1e4d13c1f

  • C:\ProgramData\Avira\VPN\VpnSharedSettings.config

    Filesize

    1KB

    MD5

    408347e969743abb7ab69949d9d970ff

    SHA1

    4dd1b19930d5cab70e1a183cc8f8829ef6ab662f

    SHA256

    b27522fe75254f5345f7228ac08c8815cd6209e478e97d50290e2873fd458155

    SHA512

    fadfafe74d2c6fda63d343ca8e44936f1fcacd6a56f60637b5b9689749f4dee20f01a65946526a1679f68b1f8153436b6b79def62d5c9c36bddf232b5309794e

  • C:\ProgramData\Avira\VPN\vpndbg.log

    Filesize

    4KB

    MD5

    fdb0b6e88a6e0db64cb7f75c7c8ca8ff

    SHA1

    4cd1409faa23210827758dfd25c5463ea6ee334a

    SHA256

    8e169e44886bd0f5be92f7ab62c0d6b9f921fc87d7ab3e9ea2a059de99645e8c

    SHA512

    021543d5a74c98600136afef2090eb1fa22b038d37cac79c8279dd0f995f0f93d1201f8fa8521e5c88d1277eef6591dfe1a78e6807323b96029964c5f5c32629

  • C:\Users\Admin\AppData\Local\Temp\is-7PGU8.tmp\Avira Phantom VPN Pro 2.44.1.19908.tmp

    Filesize

    1.5MB

    MD5

    0c1c8eb89026af3bc48b56d10759c400

    SHA1

    46052ea988389f440ebbf5ff2fe3cc4570f2131c

    SHA256

    02febfffcac96296e9cbad84cccf0153a11c051e0f2421e86360eccfc21f7f4d

    SHA512

    5c85df79f85c31557cb9d5d5974314fddd71ddaf66427c5d673b5db887b752a31e2dd510b2ab0bc5953751037c97e436c6bfa149a22ae7a8031a24e92c319d20

  • \??\c:\PROGRA~2\avira\vpn\openvpn\tap\win10\amd64\PHANTO~1.SYS

    Filesize

    49KB

    MD5

    7513d18baafa3384276f74ae45d19d40

    SHA1

    d3f898d2cb8a0267c6e9c38a408d35f1c6220de0

    SHA256

    2f7801552ae07f3c3d1ed3ea62a3eb3f7ddeda1cee20123eadc4e416a4550e3d

    SHA512

    5f0b7fca6c1858f73e77c3301037c1144c7a03031001b4be712683a1cd93f5909b28824ee56c6b8fb2bb45f1ce248f6d73b8d921498323bc30817068afba76bc

  • \??\c:\program files (x86)\avira\vpn\openvpn\tap\win10\amd64\phantomtap.cat

    Filesize

    10KB

    MD5

    6fc419f92374da0a876cf3d8a3225572

    SHA1

    46df79f2ad14be1b3c7cce9c901dd24d2e61641d

    SHA256

    c0de7a55d22d85605e2342e63f35e774d5c35dbeccaef4ade98e0be8482077cc

    SHA512

    050c3dd0129e60a802d299dbcf4f59a519b306d0e3062e8e160195910b72926389b4235ef91f66622de3548e0eabc86fe419226b878da7eea46054ec5a165df4

  • memory/1936-1092-0x0000023E6F010000-0x0000023E6F0DE000-memory.dmp

    Filesize

    824KB

  • memory/2680-1118-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2680-1088-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2680-6-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-1119-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2844-0-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2844-1083-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2844-2-0x0000000000401000-0x0000000000417000-memory.dmp

    Filesize

    88KB

  • memory/3912-996-0x000001C625830000-0x000001C625894000-memory.dmp

    Filesize

    400KB

  • memory/3912-1000-0x000001C626270000-0x000001C6262A4000-memory.dmp

    Filesize

    208KB

  • memory/3912-1026-0x000001C6262C0000-0x000001C6262D0000-memory.dmp

    Filesize

    64KB

  • memory/3912-1044-0x000001C63EB70000-0x000001C63EB7E000-memory.dmp

    Filesize

    56KB

  • memory/3912-1054-0x000001C63F970000-0x000001C63F9A6000-memory.dmp

    Filesize

    216KB

  • memory/3912-1056-0x000001C63F8B0000-0x000001C63F8B8000-memory.dmp

    Filesize

    32KB

  • memory/3912-1048-0x000001C63F8E0000-0x000001C63F90A000-memory.dmp

    Filesize

    168KB

  • memory/3912-1057-0x000001C63FA60000-0x000001C63FB0A000-memory.dmp

    Filesize

    680KB

  • memory/3912-1059-0x000001C63F8C0000-0x000001C63F8CA000-memory.dmp

    Filesize

    40KB

  • memory/3912-1050-0x000001C63F910000-0x000001C63F922000-memory.dmp

    Filesize

    72KB

  • memory/3912-1052-0x000001C63EB90000-0x000001C63EB9E000-memory.dmp

    Filesize

    56KB

  • memory/3912-1002-0x000001C626110000-0x000001C62613A000-memory.dmp

    Filesize

    168KB

  • memory/3912-1082-0x000001C63FD60000-0x000001C63FDAA000-memory.dmp

    Filesize

    296KB

  • memory/3912-1004-0x000001C63EAA0000-0x000001C63EB52000-memory.dmp

    Filesize

    712KB

  • memory/3912-1006-0x000001C6262E0000-0x000001C626302000-memory.dmp

    Filesize

    136KB

  • memory/3912-1046-0x000001C63EB80000-0x000001C63EB8C000-memory.dmp

    Filesize

    48KB

  • memory/3912-1038-0x000001C63EB60000-0x000001C63EB6A000-memory.dmp

    Filesize

    40KB

  • memory/3912-1036-0x000001C63EA90000-0x000001C63EA9E000-memory.dmp

    Filesize

    56KB

  • memory/3912-998-0x000001C6260E0000-0x000001C62610A000-memory.dmp

    Filesize

    168KB

  • memory/3912-1008-0x000001C6260D0000-0x000001C6260DC000-memory.dmp

    Filesize

    48KB

  • memory/3912-1010-0x000001C63E9E0000-0x000001C63E9F4000-memory.dmp

    Filesize

    80KB

  • memory/3912-1029-0x000001C63EA40000-0x000001C63EA48000-memory.dmp

    Filesize

    32KB

  • memory/3912-1028-0x000001C63EA50000-0x000001C63EA7E000-memory.dmp

    Filesize

    184KB

  • memory/3912-1024-0x000001C63EA00000-0x000001C63EA1C000-memory.dmp

    Filesize

    112KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.