Analysis

  • max time kernel
    311s
  • max time network
    310s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-09-2024 16:09

General

  • Target

    anti-porn-15.6.11.23-installer_vAup-U1.exe

  • Size

    1.7MB

  • MD5

    e125716935db5e7bdde6f3a5015d85d6

  • SHA1

    548200e6d77f8caf9838af2bbb1462be82775008

  • SHA256

    678e6579252aa7b3fd2363433015c553e0024ae15696e25ce36aad4fcae7782c

  • SHA512

    71851f6f6b1ed4d79c107456e58dc847d7a84daac0955da44e0065cd02aeab2ec8d06dc123307c6c17b059f61b0123659a59a8ba51f68d27128705239eaf081d

  • SSDEEP

    24576:h7FUDowAyrTVE3U5F/rLuHhCLGKNTv3HSxSip7+CB3GB5zoTiB:hBuZrEUEbmTPdip4fMTi

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Drops file in Drivers directory 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Modifies file permissions 1 TTPs 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies powershell logging option 1 TTPs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Executes dropped EXE 36 IoCs
  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 58 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 26 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\anti-porn-15.6.11.23-installer_vAup-U1.exe
    "C:\Users\Admin\AppData\Local\Temp\anti-porn-15.6.11.23-installer_vAup-U1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Users\Admin\AppData\Local\Temp\is-43T78.tmp\anti-porn-15.6.11.23-installer_vAup-U1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-43T78.tmp\anti-porn-15.6.11.23-installer_vAup-U1.tmp" /SL5="$90052,837598,832512,C:\Users\Admin\AppData\Local\Temp\anti-porn-15.6.11.23-installer_vAup-U1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component0.exe
        "C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component0.exe" -ip:"dui=98f325b1-1085-43b7-8e27-43d9cdb6ea3f&dit=20240917161052&is_silent=true&oc=ZB_RAV_Cross_Solo_Soft&p=fa70&a=100&b=&se=true" -i
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:644
        • C:\Users\Admin\AppData\Local\Temp\rh1cptou.exe
          "C:\Users\Admin\AppData\Local\Temp\rh1cptou.exe" /silent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\UnifiedStub-installer.exe
            .\UnifiedStub-installer.exe /silent
            5⤵
            • Drops file in Drivers directory
            • Drops file in Program Files directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
              "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:10
              6⤵
              • Executes dropped EXE
              PID:2184
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf
              6⤵
              • Adds Run key to start application
              PID:5884
              • C:\Windows\system32\runonce.exe
                "C:\Windows\system32\runonce.exe" -r
                7⤵
                • Checks processor information in registry
                PID:5780
                • C:\Windows\System32\grpconv.exe
                  "C:\Windows\System32\grpconv.exe" -o
                  8⤵
                    PID:5652
              • C:\Windows\system32\wevtutil.exe
                "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5532
              • C:\Windows\SYSTEM32\fltmc.exe
                "fltmc.exe" load rsKernelEngine
                6⤵
                • Suspicious behavior: LoadsDriver
                • Suspicious use of AdjustPrivilegeToken
                PID:5396
              • C:\Windows\system32\wevtutil.exe
                "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\elam\evntdrv.xml
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:6836
              • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                "C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:2880
              • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe" -i
                6⤵
                • Executes dropped EXE
                PID:6444
              • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe" -i
                6⤵
                • Drops file in Program Files directory
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:6792
              • C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe
                "C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe" -i
                6⤵
                • Drops file in Program Files directory
                • Executes dropped EXE
                PID:5620
        • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\saBSI.exe
          "C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:4632
          • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\installer.exe
            "C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
            4⤵
            • Drops file in Program Files directory
            • Executes dropped EXE
            PID:2364
            • C:\Program Files\McAfee\Temp507115529\installer.exe
              "C:\Program Files\McAfee\Temp507115529\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
              5⤵
              • Executes dropped EXE
              PID:5380
        • C:\Users\Admin\Downloads\anti-porn-15.6.11.23-installer.exe
          "C:\Users\Admin\Downloads\anti-porn-15.6.11.23-installer.exe"
          3⤵
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4036
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\control.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3932
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\control.swf" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1780
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\defsetup.ini" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3096
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\desktop.ini" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4284
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\eagleh.ini" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4304
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Flt.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1476
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleP.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1056
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EglSrv.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3396
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleR.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4876
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleRes.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1480
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Eagles.tdb" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4244
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleSvr.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:912
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleSvr.log" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2188
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleT.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4832
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Egllogin.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4424
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EglScrn.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4868
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Eglsetu1.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3056
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Forbid.htm" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4468
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\help.chm" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3588
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\gzip.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:292
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\logview.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:656
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Setup.ini" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4752
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\ssview.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4212
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\sxdomain.dat" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:368
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Update.dat" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4516
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\Update.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3584
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EglAgent.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5008
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\agent1.gif" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5104
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\agent2.gif" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4624
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\agent3.gif" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3820
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\agent4.gif" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3920
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\logo.jpg" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3016
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\egldrv.sys" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1764
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EglR.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4364
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\EagleObj.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4560
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\PngRes.dll" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4352
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\uninst.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4712
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles\eglabout.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4532
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Windows\NFCHS.exe" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2120
          • C:\Program Files (x86)\tuEagles\update.exe
            "C:\Program Files (x86)\tuEagles\update.exe" -C
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:7164
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Program Files (x86)\tuEagles" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:6688
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Windows\Eleathe.bmp" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:6548
          • C:\Windows\SysWOW64\cacls.exe
            cacls.exe "C:\Windows\Retafte.bmp" /g everyone:f /e
            4⤵
            • System Location Discovery: System Language Discovery
            PID:6436
          • C:\Windows\SysWOW64\Icacls.exe
            Icacls.exe "C:\Program Files (x86)\tuEagles\commend.ini" /SetIntegrityLevel Level:L
            4⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:6364
          • C:\Windows\SysWOW64\Icacls.exe
            Icacls.exe "C:\Program Files (x86)\tuEagles\Eagles.tdb" /SetIntegrityLevel Level:L
            4⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:6500
          • C:\Windows\SysWOW64\Icacls.exe
            Icacls.exe "C:\Program Files (x86)\tuEagles\Setup.ini" /SetIntegrityLevel Level:L
            4⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:6412
          • C:\Windows\SysWOW64\Icacls.exe
            Icacls.exe "C:\Program Files (x86)\tuEagles\sxdomain.dat" /SetIntegrityLevel Level:L
            4⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:6304
          • C:\Windows\SysWOW64\Icacls.exe
            Icacls.exe "C:\Program Files (x86)\tuEagles\eagleh.ini" /SetIntegrityLevel Level:L
            4⤵
            • Modifies file permissions
            • System Location Discovery: System Language Discovery
            PID:6268
          • C:\Program Files (x86)\tuEagles\eglsrv.exe
            "C:\Program Files (x86)\tuEagles\eglsrv.exe" /install /silent
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:6228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2160
          3⤵
          • Program crash
          PID:2368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2160
          3⤵
          • Program crash
          PID:5532
    • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
      "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:10
      1⤵
      • Executes dropped EXE
      PID:3236
    • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
      "C:\Program Files\ReasonLabs\EPP\rsWSC.exe"
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4260
    • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
      "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:6648
    • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
      "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"
      1⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6804
      • \??\c:\program files\reasonlabs\epp\rsHelper.exe
        "c:\program files\reasonlabs\epp\rsHelper.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:7024
      • \??\c:\program files\reasonlabs\EPP\ui\EPP.exe
        "c:\program files\reasonlabs\EPP\ui\EPP.exe" --minimized --first-run
        2⤵
        • Executes dropped EXE
        PID:6480
        • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
          "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" "c:\program files\reasonlabs\EPP\ui\app.asar" --engine-path="c:\program files\reasonlabs\EPP" --minimized --first-run
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:6492
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1676,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1668 /prefetch:2
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:6424
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --field-trial-handle=2476,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2368 /prefetch:3
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:6744
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2920,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2916 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5304
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3244,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3260 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:6640
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3656,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4532
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=2496,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4216
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.6.0\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=1100,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1128 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5512
          • C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe
            "C:\Program Files\ReasonLabs\Common\Client\v1.6.0\rsAppUI.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3624,i,6370762457339928113,16093867354522219541,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5744
      • C:\program files\reasonlabs\epp\rsLitmus.A.exe
        "C:\program files\reasonlabs\epp\rsLitmus.A.exe"
        2⤵
        • Executes dropped EXE
        PID:3188
    • C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe
      "C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"
      1⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Drops file in System32 directory
      • Checks system information in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:868
    • C:\Program Files (x86)\tuEagles\eglsrv.exe
      "C:\Program Files (x86)\tuEagles\eglsrv.exe"
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5284
      • C:\Program Files (x86)\tuEagles\eaglesvr.exe
        "C:\Program Files (x86)\tuEagles\\eaglesvr.exe"
        2⤵
        • Drops desktop.ini file(s)
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:5236
        • C:\Program Files (x86)\tuEagles\EglAbout.exe
          "C:\Program Files (x86)\tuEagles\EglAbout.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5852
          • C:\Program Files (x86)\tuEagles\EglR.exe
            "C:\Program Files (x86)\tuEagles\EglR.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:6232
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4648

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\tuEagles\EagleP.dll

        Filesize

        336KB

        MD5

        5afad5c13a01686523220afc4fbfe0a5

        SHA1

        388074e58e2c43b2942b6c143423f979f093b465

        SHA256

        e8fb948c9c1cfa53a0aa94c6e614db943e5b26664d0c6b7c4e662c677c6ef82e

        SHA512

        4d447c0244520f4f29c2a6cdf169cfb31419dbb722ac1bd4eb75cc423104d886957d12548b8ac0025d63ac73cab601fe937c3ab919ad37b9515499b19b07049b

      • C:\Program Files (x86)\tuEagles\EagleR.dll

        Filesize

        320KB

        MD5

        69bae2b394ac4c440844a9c7bf40c366

        SHA1

        1a5b8cb3e29d4f2749946ea5f61315f9b6b78c65

        SHA256

        21894dc1c8741ab9119e26c6f4dc5a04c4ae9969dfac6a0a3eb444f3e181f960

        SHA512

        b3e8055c796001822e5322c4734c99d13499fb0eecc7fd0faab85fe11ee8ee291786b4f5fe56c59c048f11fac3f80c26dbf4f31f850e6ae40e635cfac733ec46

      • C:\Program Files (x86)\tuEagles\EagleSvr.exe

        Filesize

        1.2MB

        MD5

        08c1b9a27532cb0afdba67450e92a29f

        SHA1

        f42f32fdc307742d67afde25be22b7a10aca86a4

        SHA256

        441607407d0341e0bc8bc901f56fb230a5f7b1248754b1358d193a6379f6129b

        SHA512

        bb8c44b79ccc3ae76a0344d1375ccb5281009ab00756c99964e7a3308773fd119b67f47c1b6130e086589d856e6c9ee4e40e84642016df6a45a9ac1e27fb95dd

      • C:\Program Files (x86)\tuEagles\EagleT.dll

        Filesize

        893KB

        MD5

        52a80816eb6875f17b428ec2f65c7839

        SHA1

        59643399869d93441c4633ec35898c953917da89

        SHA256

        dc5585a58708f807642e6eef986d6a3a702610801ffe875c98e207177c7b4141

        SHA512

        2151ea19d050deb6da86ab0a081169348bac8e5fe0aefb53daac87c12b71da9f5f3044e8a5bbd4290378356967e4134b5c119378b0afc026c83fde4977c38f90

      • C:\Program Files (x86)\tuEagles\Eagles.tdb

        Filesize

        39KB

        MD5

        5fda2cc20b6dbe7eb74fed7871c75474

        SHA1

        04daf6bf3dcc03713c835a607ae66d588fcb1fbb

        SHA256

        1d77c7a9c5bb65830ccb00ce153560c3e85b6af50b324dd1901efda51c1b4d98

        SHA512

        2c79cd1838ad5b67f398317b0e037c87f53dc94be5375bceb3f0fb19fb8cf5542b4b0b8c5bfa24edf5b779d8d4c310cca1f0ec241e6b3b26cecf227245bba6d0

      • C:\Program Files (x86)\tuEagles\EglAgent.exe

        Filesize

        865KB

        MD5

        12d203dfe3103f9582b7a9136e32df9c

        SHA1

        32887ae243c5d2b404e837365efc160302d9cb72

        SHA256

        dd6c6cd6368910bc54200d1211b06ade1260f7cb706d95d469a93b62e7347c4e

        SHA512

        8d0c6505146efc053d3366f7f6d67f901d713e6d231230dce78890ea371ad17f05d6b5124d98cc82ec83d6c00bc6b96dfc74412834009b3ebc9d76264fded486

      • C:\Program Files (x86)\tuEagles\EglR.exe

        Filesize

        432KB

        MD5

        20ef95c9d7469c7095e22555a318c8d4

        SHA1

        b800574dd64981ed6d34d1f732b8486037e79992

        SHA256

        2f32125f64d171728534ad70b8d0d869d4b7ab8f8f54891bfcabe8f8338efdf0

        SHA512

        acb915c744ded7a4cb46f3be17d603d690bd93b4741429f8aa5c60c421e7e5249b81f93678462567a544d8d7def46d10313bb8e91a4837c7a496ea3edd9c5e05

      • C:\Program Files (x86)\tuEagles\EglScrn.dll

        Filesize

        400KB

        MD5

        2b65d895b509af4b7052492bbc7c98ea

        SHA1

        a6df474524e4cd52de8c36c3f2b182062fa8bb26

        SHA256

        2ea58fe59b7fa19ed98d75e5d8a71c06edc4ffa51a910cdc7fd46c86af6cd566

        SHA512

        e75ce7b6045d32c20acc331a24e3a56fd71ebf3f028bc3b3fd436dea0c9fcf865f12e351958cea4b9e6d875738de9fae19a291aeb75530a5cbae4fe8befa0fac

      • C:\Program Files (x86)\tuEagles\EglSrv.exe

        Filesize

        331KB

        MD5

        5600db8fa19caa68eac425ca37d2c921

        SHA1

        33ea3ab0dfdab1fe6b278280cdc922287126d174

        SHA256

        72a34103235be5b6d0940f9876609e630823e4fcde41f53f99a484c2edae4e3d

        SHA512

        7c9d1d7da5212364cbc24b958d4b598682dfe4833670c8bc83c47517c551f10961b7a2e86bbc742936b59a5fc0dba275e7e153e8f9bf4fcea903c88f0160f78b

      • C:\Program Files (x86)\tuEagles\Egllogin.dll

        Filesize

        587KB

        MD5

        918d87206d41332427f8af0ad9ebfb56

        SHA1

        0e560cbfd7f3d8086ca31e918612adf2718e4a01

        SHA256

        fa0db2f44aa59903132dc0856c3f7bb482ffc10118bf4bda2488645dd402ef6d

        SHA512

        b03905f2fa6012c5c22a3fb18541273f481d77339a94a2d257fef8611e1b5978a1fafa30e43041e4fd3f1986e26331d1ca4830fb594c1c4d9d45e2efd56d8574

      • C:\Program Files (x86)\tuEagles\Eglsetu1.exe

        Filesize

        1.4MB

        MD5

        b33a00335c8e20ef8bb899c7170ab817

        SHA1

        bab4f90b2773b992cca752190c723da4f205564e

        SHA256

        76e8de19a76eae48425b6685370362cff3a02003e5863a3c5969932f6daff0c7

        SHA512

        872ba2406d9c16b7d99993d72f9732d21d8b1b72c26220e6673771d7cba32be1dc028996d0ed261644273eb2503e25119624d96bf4868c1678de6317d9e1da3f

      • C:\Program Files (x86)\tuEagles\Flt.dll

        Filesize

        635KB

        MD5

        e457babf1c7a899923fe947304a92fa4

        SHA1

        18295e890ade53bcc0c3e992ee34b5ad388316fe

        SHA256

        67b581a3fcaea7b4c6c8ee57a8fed4b98931f739fb592fa031555f249cf1fe0f

        SHA512

        559bafa24efc2365df8587b1dcb415ebe41640fe88f03c28819cd9a8db9b94dcad65096d53a4266de7210179ec1130a33609601de0bc19cd8941f7e8b393896e

      • C:\Program Files (x86)\tuEagles\Forbid.htm

        Filesize

        821B

        MD5

        1b34e471f131201a822d3979a9d9b374

        SHA1

        1d81c3b7908fed52f1ddb80738ed78e7696e1ba7

        SHA256

        4b395f60ecc531b15da29f5769ed94b5e761b2483f48d034ab604e39ede18732

        SHA512

        5760d4ea41343c101861f82d0de699ce03258f9ea88676c872d9a82a89ce8ad411330a8df5ed56d776ad0b390077f21739c6db6a97539e0fb713148ce1ff140b

      • C:\Program Files (x86)\tuEagles\Update.dat

        Filesize

        29B

        MD5

        b3e82a6f56dfebbede62e8a1c16e5c7d

        SHA1

        46ee8bdf8c5fbb2428cf26b4a18cedeef1e097b1

        SHA256

        2670ac4a558e9b5860fc0712283e84af1dbf3bb3f3d930f60400a1357bed6549

        SHA512

        36424d570eecc415b31f43c268548d135353a1b89c18bd4afe533b17c4081d1a66238fb9757b89be4bdfd1e722662d94b47e737b3abc612f9ab7a679563842e8

      • C:\Program Files (x86)\tuEagles\Update.exe

        Filesize

        423KB

        MD5

        f8ba89b56f824c306d5c7fe12c7dd33a

        SHA1

        ca5413316a8db89a77dd2088e98d2aa5e3fac81e

        SHA256

        4fe266d5d9022dd2ec387c5611edc5cd466952ccf4e0a50de6bb76c4b15d9bd2

        SHA512

        a238dc8ac886d3711557c96805f67357ac2233de65149a3b10db69bae42a930207c8d2066b3151d1dee3cca92af69b29cae6d79fb6e10b5df5a987d024dff673

      • C:\Program Files (x86)\tuEagles\agent1.gif

        Filesize

        36KB

        MD5

        97525fdd3b4d816178e8cff9538f1c36

        SHA1

        92b0ef3f1a1dd113f4f1c7e85c025a9998bd7167

        SHA256

        cd56b9adf36675d74f75864abac24f6e8c18d2febe2c38c9b7f7d212c7f16074

        SHA512

        6903d32ac0ff2846f24a2d03fee1675603fbfaad23c3c3083ee12ed9dcacc79a5b154f15dfc6f6b5f0f0101faade72a5525556520e5b1195b619ddd00c1cec04

      • C:\Program Files (x86)\tuEagles\agent2.gif

        Filesize

        26KB

        MD5

        17acc141adb2b68afbdc72a86d5aa33f

        SHA1

        3b4c66106a96c37c11f084c8725bbfb97bbdf2fb

        SHA256

        e40fc011e95f3afdbc848389006aceac162aa00e5b5d1f2047fd4386ca562976

        SHA512

        6267e2110852da5709fa56474c99fb06333ebfad039c4a5dde88f5dbe9a9f14cf808e627206fe8359b79f196b2a2eab3e692240c4826939e0c3e661823c76f7f

      • C:\Program Files (x86)\tuEagles\agent3.gif

        Filesize

        19KB

        MD5

        a679f6dd868164eb819c4dbf53277f16

        SHA1

        86ce6f845c12bf4e46d831b471ebee98e494c0a8

        SHA256

        2f5cf694517ed290735621172072f0488bd8d02bfc10951c0c5804d5f4163e54

        SHA512

        281f62539c8240dfb27e59adac10a788c3256d1eea3ecf251485b13107e77c3f59eb04d6d77caaaacb9afe1ccd2d7a9cee71e4b80aea85920d1bf70c4eac60cd

      • C:\Program Files (x86)\tuEagles\agent4.gif

        Filesize

        17KB

        MD5

        b21adc44b470a4b005d88649e0a66267

        SHA1

        c97a9e05d089049ab8da938e8ec03e7d6c755da1

        SHA256

        be1edcae182f83faec289c123074b94c9e08a35615ce9096f910504dc6103a7b

        SHA512

        ebda1b6ae66696d66496ac57fb3183b06d8f60f31949363549ecce082e3359ea041353aa06b80622765ecb2477736ddc781bc9189009cad5252f64f80e627aeb

      • C:\Program Files (x86)\tuEagles\control.exe

        Filesize

        391KB

        MD5

        dfc04b82086bb17bde361283ceeb97bb

        SHA1

        eeb17df803475db6297506aa18747aacc8055591

        SHA256

        2a2e901e6d4f862142bab7110caa7447ccaba5e9a22baff23c00fcd181b02acc

        SHA512

        2e699c69afaed6f4bac36e2bb610dae4a7750545d52dd19776b799346db8d23105cdb31d307909c54c5c9c82ca97a720318659c778d5b09bf6e1ed25cccfa630

      • C:\Program Files (x86)\tuEagles\control.swf

        Filesize

        240KB

        MD5

        c59adcc0b9cb30319b81c5ddac85c6f0

        SHA1

        e243762fe103d9c8672fae34e7a055805311c47a

        SHA256

        e71817f347d4bca93436da9188003fb2c9acaf519f91007c489d13db3b765986

        SHA512

        1d567eb26d5711f81597e9f6bef7fd4a8491660f2175bc4f3ab30738ffd55381b31334417c69dec5347eaead70e0bc2f75c9a932f2182d26babf7b22896614ab

      • C:\Program Files (x86)\tuEagles\defsetup.ini

        Filesize

        589B

        MD5

        9b98aa12754c641b9d490f369c62df40

        SHA1

        da5377a405f18184d8dae495cd6da93880352af4

        SHA256

        b7ce61f9fbd3b2c87d90599682a6e0c5dd8c72d239835f1026753863e3f87e63

        SHA512

        d7c55f1448c6311034b1f1d3753428e53db7d63f44793611ad7b3d0f5b19955838e8b67aa73cbad3efd5f2fbf8083874a279d8a8656335af867a2254954a0c79

      • C:\Program Files (x86)\tuEagles\desktop.ini

        Filesize

        19B

        MD5

        80703cbbaf2c35ddee3e882e5be37295

        SHA1

        b8431c1ff9f71fccaba3cdc9339e5d0ef7ccbc54

        SHA256

        fbb42629e41fd3f5f4c8fdd6b3a916a0e8307bc97f48de1e1fb3fc6a95f98346

        SHA512

        dae97e8f2770fc775aef2621430bece282b81ec06a3e4b9a12948d8e17501747d3d97db424137358560d5f7048cb2a76950f4eba196c15675f755c26d66e81c3

      • C:\Program Files (x86)\tuEagles\eagleh.ini

        Filesize

        39B

        MD5

        a288a8313e4977f5ffaba05ba2167e9e

        SHA1

        c5825669ed1c285154f1371681fd46f32374692c

        SHA256

        d5340aa90b989d20fc491e1af8e2e57fd2f8d3bfcc3abcea81a1691d60745709

        SHA512

        0580ef163334baa3ad48964a2284f2041610af0e0ed0d2367a0e50e613f00e2cf74d3bb80d28a9d6766fab5f7ac4205e32bba762f152047936d9188973e7faac

      • C:\Program Files (x86)\tuEagles\eagleh.ini

        Filesize

        37B

        MD5

        ea27f4d18eec4f35b264ef7477440c23

        SHA1

        af8a17faba292e91bbb0e75eb1e105e72f4b8ef1

        SHA256

        58e3657a0209b5af4bf8c444efcf99b39461b5b8030d798dab284f1e57f00383

        SHA512

        7708c178025c5b8e26cb4edfddf7a9ba0f3c048bda80ac3c42b5fbdecc0e7268d09bb3a84662e8c9a63114a70fad6f71f6d742f77d56db0db172d7f130176fc9

      • C:\Program Files (x86)\tuEagles\gzip.dll

        Filesize

        63KB

        MD5

        8656fa55e9f02027b1adfae7076717b5

        SHA1

        cdccdf9904b23d2ccfb99dec309bd7bb30b82b24

        SHA256

        66de65d3f716dce0a60c9bbca0762b1e45fbf13a73445de72ed2b663df564c55

        SHA512

        4a1ed1695443d4a184122417a5601495d2bb872da047b348b25f2ec921893c2982ca0b7fc2548d3230e3027c83c3a3b940cc3547bb1ddbcf48b91f06257d7d00

      • C:\Program Files (x86)\tuEagles\help.chm

        Filesize

        135KB

        MD5

        bcf0c6ef58321e0aeac7e9d5380a737e

        SHA1

        201edf929665a92c40a1a1ebaa952e5b071e4ad5

        SHA256

        8f5c186abf1e81709f426c1f26e0d1833d9ed7fa70450c38a83e51eb84bb4723

        SHA512

        3504f83851c722f5cee2e4958550c6f312cb8175969a802ce6d9d1873475a9eb264fe06fbf573f465356d4e0cf30d65452aa801a631f131bc24b0cfffaaae5fa

      • C:\Program Files (x86)\tuEagles\logo.jpg

        Filesize

        4KB

        MD5

        1c24786a409dbbe886e339032d4df217

        SHA1

        9b77811115eeb457d12359bcf4e4217aa6ecf2fb

        SHA256

        c738ba4f1476feba6c94c48351f337ffc17d2ada0e8b226b20545d035a1e2f9f

        SHA512

        75b588902b23c9849d6a0c0d0863ab08797ec5bc9935626c3db59c16e88ad25e32023631ea4814225b8b5ca6f989426af4a58d461325c0d27e3e7180895934d6

      • C:\Program Files (x86)\tuEagles\logview.exe

        Filesize

        674KB

        MD5

        7bdd7bcd18d465c7ab482460c6111daa

        SHA1

        c53ae26087267ee13f75bfa9d488c4239af4d1d7

        SHA256

        caa6772ec8d0272e2621736da0a83aa0f06a1e62c94acb17ef59a98da4e64266

        SHA512

        853de34afcedd1d6e455818b29c7f121d17214ced5907695fd88c4f8d217af12c01182a255e71b28edd125fa7de3d7c27d86b2bca96c808a7db553f2286d49a0

      • C:\Program Files (x86)\tuEagles\ssview.exe

        Filesize

        713KB

        MD5

        ad1082a59162096aa9023beb8f13f3a9

        SHA1

        510a29d6ed409e84d54f32bf4424045b7b9e9f64

        SHA256

        7f7355b5d216a53f00819de9abf1ae13a8392fae586880b84297bd71aa47097c

        SHA512

        0b47ffb5dad18f2b069736fa3c3d1bd45219377507eef752caed46cf6327218bb4060e04e31a481d9a38583d962bed151d14e8f2808849ce859ad3f80509b5b4

      • C:\Program Files (x86)\tuEagles\sxdomain.dat

        Filesize

        18KB

        MD5

        51730db770462333548856cea7ddabf6

        SHA1

        91f874a62fa93e0fd6e819a2f579a23003c2f37c

        SHA256

        f46d57f8822258ea63e296304bd2756d45e09ce8e2c4c7829bca7936db29407b

        SHA512

        83d013abd6e2c46fe9863db72c5696609c72a314a03e15fa6ee6375a1640fe0a890fd5a1a019eaebf3c169d123c6123d2e467bb3c406f5b2bc7d64d6ebb2f222

      • C:\Program Files\McAfee\Temp507115529\installer.exe

        Filesize

        2.9MB

        MD5

        6908407fb5ea50408e55db7877f41f30

        SHA1

        1e46a4801ec4345e168d9902a0f85c56685e5e45

        SHA256

        c716dcd46f88edbf6d217f4740b79fe0a60530d68495959c41a3be82dcf8de4f

        SHA512

        c9528e0308847a6fd9f3fd29c7cdcca42189264b4a5233b4cca24cfeefa4f3b1ece1d1da62c7e158005195a158ecf83968b433a9129e534bcd55e8304103a8c4

      • C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallLog

        Filesize

        388B

        MD5

        1068bade1997666697dc1bd5b3481755

        SHA1

        4e530b9b09d01240d6800714640f45f8ec87a343

        SHA256

        3e9b9f8ed00c5197cb2c251eb0943013f58dca44e6219a1f9767d596b4aa2a51

        SHA512

        35dfd91771fd7930889ff466b45731404066c280c94494e1d51127cc60b342c638f333caa901429ad812e7ccee7530af15057e871ed5f1d3730454836337b329

      • C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallLog

        Filesize

        633B

        MD5

        6895e7ce1a11e92604b53b2f6503564e

        SHA1

        6a69c00679d2afdaf56fe50d50d6036ccb1e570f

        SHA256

        3c609771f2c736a7ce540fec633886378426f30f0ef4b51c20b57d46e201f177

        SHA512

        314d74972ef00635edfc82406b4514d7806e26cec36da9b617036df0e0c2448a9250b0239af33129e11a9a49455aab00407619ba56ea808b4539549fd86715a2

      • C:\Program Files\ReasonLabs\EDR\rsEDRSvc.InstallState

        Filesize

        7KB

        MD5

        362ce475f5d1e84641bad999c16727a0

        SHA1

        6b613c73acb58d259c6379bd820cca6f785cc812

        SHA256

        1f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899

        SHA512

        7630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b

      • C:\Program Files\ReasonLabs\EPP\InstallerLib.dll

        Filesize

        339KB

        MD5

        030ec41ba701ad46d99072c77866b287

        SHA1

        37bc437f07aa507572b738edc1e0c16a51e36747

        SHA256

        d5a78100ebbcd482b5be987eaa572b448015fb644287d25206a07da28eae58f8

        SHA512

        075417d0845eb54a559bd2dfd8c454a285f430c78822ebe945b38c8d363bc4ccced2c276c8a5dec47f58bb6065b2eac627131a7c60f5ded6e780a2f53d7d4bde

      • C:\Program Files\ReasonLabs\EPP\mc.dll

        Filesize

        1.1MB

        MD5

        e0f93d92ed9b38cab0e69bdbd067ea08

        SHA1

        065522092674a8192d33dac78578299e38fce206

        SHA256

        73ad69efeddd3f1e888102487a4e2dc1696ca222954a760297d45571f8d10d31

        SHA512

        eb8e3e8069ff847b9e8108ad1e9f7bd50aca541fc135fdd2ad440520439e5c856e8d413ea3ad8ba45dc6497ba20d8f881ed83a6b02d438f5d3940e5f47c4725c

      • C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dll

        Filesize

        348KB

        MD5

        41dd1b11942d8ba506cb0d684eb1c87b

        SHA1

        4913ed2f899c8c20964fb72d5b5d677e666f6c32

        SHA256

        bd72594711749a9e4f62baabfadfda5a434f7f38d199da6cc13ba774965f26f1

        SHA512

        3bb1a1362da1153184c7018cb17a24a58dab62b85a8453371625ce995a44f40b65c82523ef14c2198320220f36aafdade95c70eecf033dd095c3eada9dee5c34

      • C:\Program Files\ReasonLabs\EPP\rsEngine.config

        Filesize

        6KB

        MD5

        87ac4effc3172b757daf7d189584e50d

        SHA1

        9c55dd901e1c35d98f70898640436a246a43c5e4

        SHA256

        21b6f7f9ebb5fae8c5de6610524c28cbd6583ff973c3ca11a420485359177c86

        SHA512

        8dc5a43145271d0a196d87680007e9cec73054b0c3b8e92837723ce0b666a20019bf1f2029ed96cd45f3a02c688f88b5f97af3edc25e92174c38040ead59eefe

      • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLog

        Filesize

        257B

        MD5

        2afb72ff4eb694325bc55e2b0b2d5592

        SHA1

        ba1d4f70eaa44ce0e1856b9b43487279286f76c9

        SHA256

        41fb029d215775c361d561b02c482c485cc8fd220e6b62762bff15fd5f3fb91e

        SHA512

        5b5179b5495195e9988e0b48767e8781812292c207f8ae0551167976c630398433e8cc04fdbf0a57ef6a256e95db8715a0b89104d3ca343173812b233f078b6e

      • C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLog

        Filesize

        606B

        MD5

        43fbbd79c6a85b1dfb782c199ff1f0e7

        SHA1

        cad46a3de56cd064e32b79c07ced5abec6bc1543

        SHA256

        19537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0

        SHA512

        79b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea

      • C:\Program Files\ReasonLabs\EPP\ui\EPP.exe

        Filesize

        2.2MB

        MD5

        508e66e07e31905a64632a79c3cab783

        SHA1

        ad74dd749a2812b9057285ded1475a75219246fa

        SHA256

        3b156754e1717c8af7fe4c803bc65611c63e1793e4ca6c2f4092750cc406f8e9

        SHA512

        2976096580c714fb2eb7d35c9a331d03d86296aa4eb895d83b1d2f812adff28f476a32fca82c429edc8bf4bea9af3f3a305866f5a1ab3bbb4322edb73f9c8888

      • C:\Program Files\ReasonLabs\EPP\x64\elam\rsElam.sys

        Filesize

        19KB

        MD5

        8129c96d6ebdaebbe771ee034555bf8f

        SHA1

        9b41fb541a273086d3eef0ba4149f88022efbaff

        SHA256

        8bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51

        SHA512

        ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYF.dat

        Filesize

        197KB

        MD5

        b050b90b40b7ee4b585d0c3c1f19617b

        SHA1

        5333a8b7ba47fb8cbffe8b029523dd48fd104b1c

        SHA256

        858ae1f313d21b5c77682abf20914338c95d601dad1699cceb7318311fca3676

        SHA512

        4b9efb3045a44047904e170bf67451a5b6cc16784a9e7720e81ac76acdeb2363a61ea41b3fba4351571e4620e3846a9ce9b55e530c121e2811ddb5275d49cd1c

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYF.dat.tmp

        Filesize

        5.4MB

        MD5

        f04f4966c7e48c9b31abe276cf69fb0b

        SHA1

        fa49ba218dd2e3c1b7f2e82996895d968ee5e7ae

        SHA256

        53996b97e78c61db51ce4cfd7e07e6a2a618c1418c3c0d58fa5e7a0d441b9aaa

        SHA512

        7c8bb803cc4d71e659e7e142221be2aea421a6ef6907ff6df75ec18a6e086325478f79e67f1adcc9ce9fd96e913e2a306f5285bc8a7b47f24fb324fe07457547

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat

        Filesize

        131KB

        MD5

        8c9eae09192c0bbd53cf0bd9f4891b0c

        SHA1

        6dd2a82b985b82eb34c1b00af5213d6e9ecd0175

        SHA256

        d6aa2e414099fd7a3c083a478a0db12e314ff33cbae07564cedef5cec9e99628

        SHA512

        59cfc80a2017c2ca1b257662baea1012793bd554dac13e75e7caed0fea9c8a782584bbed970efd3fec196bd1dea7e0b004d6b53dc2874a969ff97617b407a18f

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp

        Filesize

        2.9MB

        MD5

        2a69f1e892a6be0114dfdc18aaae4462

        SHA1

        498899ee7240b21da358d9543f5c4df4c58a2c0d

        SHA256

        b667f411a38e36cebd06d7ef71fdc5a343c181d310e3af26a039f2106d134464

        SHA512

        021cc359ba4c59ec6b0ca1ea9394cfe4ce5e5ec0ba963171d07cdc281923fb5b026704eeab8453824854d11b758ac635826eccfa5bb1b4c7b079ad88ab38b346

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat

        Filesize

        29KB

        MD5

        298385f96578d6dfa04bc40cde21e1be

        SHA1

        ee7268b3d9c6f149c83c471948ed37c1c5bc46ab

        SHA256

        998e75d968f22b63f5c356d4b13036b3d497b223f57b48ca553ffa9f25464941

        SHA512

        e180987b311f7e72ff00b2f4520e848116e72fd5ea2cedf5af10cc78d9d7f2813dbd15704c88ce0f009c9959b2d1142a6bf4e2fba1b9c227c11724397d1e15ee

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat.tmp

        Filesize

        592KB

        MD5

        8b314905a6a3aa1927f801fd41622e23

        SHA1

        0e8f9580d916540bda59e0dceb719b26a8055ab8

        SHA256

        88dfaf386514c73356a2b92c35e41261cd7fe9aa37f0257bb39701c11ae64c99

        SHA512

        45450ae3f4a906c509998839704efdec8557933a24e4acaddef5a1e593eaf6f99cbfc2f85fb58ff2669d0c20362bb8345f091a43953e9a8a65ddcf1b5d4a7b8e

      • C:\ProgramData\ReasonLabs\EPP\SignaturesYSS.dat

        Filesize

        122KB

        MD5

        3d5a092f97ca28e990483f643d613891

        SHA1

        b7bc1c83bcfa801cbc60b597afe26172bd3bcd3e

        SHA256

        a7cf36e18a7c07e4390c7b4b5e163fb642442b07dd491535eca890f7b040ccdc

        SHA512

        6cdce0186a875acf5dcc6838477ef60396cb19cb0164d0884bab8456960c167a93043ff4d0d32b7d0afe8d83219b0fccf8e8c966266ae0a3fbc17e4cfb3c2e82

      • C:\ProgramData\ReasonLabs\EPP\com.reasonlabs.extension-chrome-manifest.json

        Filesize

        236B

        MD5

        f32eca6e96017ca82fdc13d3c1b5b0f4

        SHA1

        f3e1dca2b60a376a600c0b505c7dc64347ee74bd

        SHA256

        9f79e3b2668037ba1145f8c908b689c3d3b153a7e261aae4dbf9d359d39a788a

        SHA512

        6c0d3108408a410560e1aa492efdeffaec5402ec1e4c2f8dc0d0ce1a6fecac3492a17b4dd0ed3ae04988854e648cc8103c95df0eef89f3234db15b587961b68c

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\8f183449-b41f-4d41-b23b-b04b203927e9\UnifiedStub-installer.exe\assembly\dl3\2c53c52e\0a957044_1c09db01\rsServiceController.DLL

        Filesize

        183KB

        MD5

        4f7ae47df297d7516157cb5ad40db383

        SHA1

        c95ad80d0ee6d162b6ab8926e3ac73ac5bd859a3

        SHA256

        e916df4415ae33f57455e3ea4166fbb8fbe99eeb93a3b9dcab9fe1def45e56ed

        SHA512

        4398652b53b8d8c8bac584f83d5869985d32fa123f0e976ef92f789b1f7116572a15d0bb02be3fbc80ed326cfb18eea80fec03ee20ed261e95daa4e91e61c65e

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\8f183449-b41f-4d41-b23b-b04b203927e9\UnifiedStub-installer.exe\assembly\dl3\7012668c\66326e44_1c09db01\rsLogger.DLL

        Filesize

        183KB

        MD5

        54ff6dfafb1ee7d42f013834312eae41

        SHA1

        7f30c2ffb6c84725d90ce49ca07eb4e246f2b27b

        SHA256

        ef5ce90acf6eb5196b6ba4a24db00d17c83b4fbd4adfa1498b4df8ed3bf0bd0c

        SHA512

        271f1203ee1bacac805ab1ffa837cad3582c120cc2a1538610364d14ffb4704c7653f88a9f1cccf8d89a981caa90a866f9b95fb12ed9984a56310894e7aae2da

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\8f183449-b41f-4d41-b23b-b04b203927e9\UnifiedStub-installer.exe\assembly\dl3\9255f0f7\16825d44_1c09db01\rsAtom.DLL

        Filesize

        171KB

        MD5

        de22fe744074c51cf3cf1128fcd349cb

        SHA1

        f74ecb333920e8f2785e9686e1a7cce0110ab206

        SHA256

        469f983f68db369448aa6f81fd998e3bf19af8bec023564c2012b1fcc5c40e4b

        SHA512

        5d3671dab9d6d1f40a9f8d27aeea0a45563898055532f6e1b558100bed182c69e09f1dfd76574cb4ed36d7d3bb6786eff891d54245d3fab4f2ade3fe8f540e48

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\8f183449-b41f-4d41-b23b-b04b203927e9\UnifiedStub-installer.exe\assembly\dl3\af4f908f\66326e44_1c09db01\rsJSON.DLL

        Filesize

        221KB

        MD5

        e3a81be145cb1dc99bb1c1d6231359e8

        SHA1

        e58f83a32fe4b524694d54c5e9ace358da9c0301

        SHA256

        ee938d09bf75fc3c77529ccd73f750f513a75431f5c764eca39fdbbc52312437

        SHA512

        349802735355aac566a1b0c6c779d6e29dfd1dc0123c375a87e44153ff353c3bfc272e37277c990d0b7e24502d999804e5929ddc596b86e209e6965ffb52f33b

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\Microsoft.Win32.TaskScheduler.dll

        Filesize

        340KB

        MD5

        e6a31390a180646d510dbba52c5023e6

        SHA1

        2ac7bac9afda5de2194ca71ee4850c81d1dabeca

        SHA256

        cccc64ba9bbe3897c32f586b898f60ad0495b03a16ee3246478ee35e7f1063ec

        SHA512

        9fd39169769b70a6befc6056d34740629fcf680c9ba2b7d52090735703d9599455c033394f233178ba352199015a384989acf1a48e6a5b765b4b33c5f2971d42

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\Newtonsoft.Json.dll

        Filesize

        701KB

        MD5

        4f0f111120d0d8d4431974f70a1fdfe1

        SHA1

        b81833ac06afc6b76fb73c0857882f5f6d2a4326

        SHA256

        d043e6cde1f4d8396978cee2d41658b307be0ca4698c92333814505aa0ccab9a

        SHA512

        e123d2f9f707eb31741ef8615235e714a20c6d754a13a97d0414c46961c3676025633eb1f65881b2d6d808ec06a70459c860411d6dd300231847b01ed0ce9750

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\UnifiedStub-installer.exe

        Filesize

        1.0MB

        MD5

        493d5868e37861c6492f3ac509bed205

        SHA1

        1050a57cf1d2a375e78cc8da517439b57a408f09

        SHA256

        dc5bc92e51f06e9c66e3933d98dc8f8d217bc74b71f93d900e4d42b1fb5cc64f

        SHA512

        e7e37075a1c389e0cad24ce2c899e89c4970e52b3f465d372a7bc171587ed1ee7d4f0a6ba44ab40b18fdf0689f4e29dfdbccbabb07e0f004ef2f894cb20d995d

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\rsAtom.dll

        Filesize

        169KB

        MD5

        dc15f01282dc0c87b1525f8792eaf34e

        SHA1

        ad4fdf68a8cffedde6e81954473dcd4293553a94

        SHA256

        cc036bcf74911fe5afb8e9fcc0d52b3f08b4961bcda4e50851eda4159b1c9998

        SHA512

        54ee7b7a638d0defcff3a80f0c87705647b722d3d177bc11e80bfe6062a41f138ef99fc8e4c42337b61c0407469ef684b704f710b8ead92b83a14f609f0bc078

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\rsLogger.dll

        Filesize

        182KB

        MD5

        1cfc3fc56fe40842094c7506b165573a

        SHA1

        023b3b389fdfa7a9557623b2742f0f40e4784a5c

        SHA256

        187da6a5ab64c9b814ab8e1775554688ad3842c3f52f5f318291b9a37d846aa2

        SHA512

        6bd1ceaf12950d047a87fd2d9c1884c7ac6e45bd94f11be8df8144ddd3f71db096469d1c775cf1cb8bc7926f922e5a6676b759707053e2332aa66f86c951fbc0

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\rsStubLib.dll

        Filesize

        271KB

        MD5

        3bcbeaab001f5d111d1db20039238753

        SHA1

        4a9c0048bbbf04aa9fe3dfb9ce3b959da5d960f8

        SHA256

        897131dd2f9d1e08d66ae407fe25618c8affb99b6da54378521bf4403421b01a

        SHA512

        de6cde3ad47e6f3982e089700f6184e147a61926f33ead4e2ff5b00926cfc55eb28be6f63eea53f7d15f555fd820453dd3211f0ba766cb3e939c14bb5e0cfc4c

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\rsSyncSvc.exe

        Filesize

        798KB

        MD5

        f2738d0a3df39a5590c243025d9ecbda

        SHA1

        2c466f5307909fcb3e62106d99824898c33c7089

        SHA256

        6d61ac8384128e2cf3dcd451a33abafab4a77ed1dd3b5a313a8a3aaec2b86d21

        SHA512

        4b5ed5d80d224f9af1599e78b30c943827c947c3dc7ee18d07fe29b22c4e4ecdc87066392a03023a684c4f03adc8951bb5b6fb47de02fb7db380f13e48a7d872

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\uninstall-epp.exe

        Filesize

        319KB

        MD5

        79638251b5204aa3929b8d379fa296bb

        SHA1

        9348e842ba18570d919f62fe0ed595ee7df3a975

        SHA256

        5bedfd5630ddcd6ab6cc6b2a4904224a3cb4f4d4ff0a59985e34eea5cd8cf79d

        SHA512

        ab234d5815b48555ddebc772fae5fa78a64a50053bdf08cc3db21c5f7d0e3154e0726dacfc3ea793a28765aea50c7a73011f880363cbc8d39a1c62e5ed20c5a9

      • C:\Users\Admin\AppData\Local\Temp\7zS87C8D9D7\x64\Reason.ArchiveUtility-x64.dll

        Filesize

        154KB

        MD5

        366231ab413d0ce3ad65b38b4ab3e4a6

        SHA1

        f52e1886563137a4124d3096d7ede5ce1cd1e578

        SHA256

        ed349b2e11a4c6ada76a72f2462e84551d5451088212a6e0d6fbf4904c8cc19d

        SHA512

        55b7e9ecab6893331f9cc045a4d60b971fb208ca6f2c12592de98f91389413f9bd5f50460f06507a9cff650b4cec73c61a633f30d1ba869b2ecc93c5a3aaaca6

      • C:\Users\Admin\AppData\Local\Temp\is-43T78.tmp\anti-porn-15.6.11.23-installer_vAup-U1.tmp

        Filesize

        3.1MB

        MD5

        f3c1c6e03cff1cc2f24d71cbddb19a02

        SHA1

        30fc4ad113ffaeab2eb987b37a5b236b8f8b2c0a

        SHA256

        25ea25a99bd9eff2526e9c1493443c20d8d08a568e46a42252e0059940bb7ea8

        SHA512

        ca6c9f53a894f90dd70c6af73f34c39b25356c660262d4be7005f1be55ed182fe5f8f2dfc981db2d3d44545944107aeeef63ca3861fb6a443bbe2b8035dd830b

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\100.png

        Filesize

        56KB

        MD5

        4167c79312b27c8002cbeea023fe8cb5

        SHA1

        fda8a34c9eba906993a336d01557801a68ac6681

        SHA256

        c3bf350627b842bed55e6a72ab53da15719b4f33c267a6a132cb99ff6afe3cd8

        SHA512

        4815746e5e30cbef626228601f957d993752a3d45130feeda335690b7d21ed3d6d6a6dc0ad68a1d5ba584b05791053a4fc7e9ac7b64abd47feaa8d3b919353bb

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\101.png

        Filesize

        46KB

        MD5

        5fd73821f3f097d177009d88dfd33605

        SHA1

        1bacbbfe59727fa26ffa261fb8002f4b70a7e653

        SHA256

        a6ecce54116936ca27d4be9797e32bf2f3cfc7e41519a23032992970fbd9d3ba

        SHA512

        1769a6dfaa30aac5997f8d37f1df3ed4aab5bbee2abbcb30bde4230afed02e1ea9e81720b60f093a4c7fb15e22ee15a3a71ff7b84f052f6759640734af976e02

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\Y.png

        Filesize

        1KB

        MD5

        c199687e52f7393c941a143b45d78207

        SHA1

        5aedbdffea28ef6af64101d9244140519f18c463

        SHA256

        0eb767424750b6f8c22ae5ebb105c5c37b3a047eed986ffa6deba53efdc2142e

        SHA512

        51ef05c620d0bc4179189ca081e6bd63c49dad5f4aff7d273f0cdb9603cb6ebbcb4101e110c3fe769439ea1fc717ea7d56679fc776d2582643a18ab48cbdfeff

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component0.exe

        Filesize

        32KB

        MD5

        b543fe2f0ec269e2bf23250370025212

        SHA1

        52a83e77b7048047fcaa6123fbf908202473886a

        SHA256

        5961c15b70699423049357060cb89522d9f7405aa5ebdea9a46445b9e1d32e8a

        SHA512

        bad34a10d3fd67e5f0434ea728db13f5bd9e333536a9365568b7fa44c8ef860b00e60b9e52806e2d0ed6094ac9ac1fd9dfe0bbe716f2dc222e7cb71d20388415

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1.zip

        Filesize

        515KB

        MD5

        f68008b70822bd28c82d13a289deb418

        SHA1

        06abbe109ba6dfd4153d76cd65bfffae129c41d8

        SHA256

        cc6f4faf4e8a9f4d2269d1d69a69ea326f789620fb98078cc98597f3cb998589

        SHA512

        fa482942e32e14011ae3c6762c638ccb0a0e8ec0055d2327c3acc381dddf1400de79e4e9321a39a418800d072e59c36b94b13b7eb62751d3aec990fb38ce9253

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\installer.exe

        Filesize

        24.4MB

        MD5

        4a547fd0a6622b640dad0d83ca63bd37

        SHA1

        6dd7b59010cc73581952bd5f1924dca3d6e7bea5

        SHA256

        a5be5403eb217883643adba57c83b7c4b0db34faf503cc1167b2c73ce54919d5

        SHA512

        dd1c6d7410d9fca5ce3d0be0eb90b87a811c7f07cba93e2c5d6855c692caec63feec6b8385e79baa4f503cac955e5331fac99936aa1668c127f3fc1ffccb3b37

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\component1_extract\saBSI.exe

        Filesize

        1.1MB

        MD5

        143255618462a577de27286a272584e1

        SHA1

        efc032a6822bc57bcd0c9662a6a062be45f11acb

        SHA256

        f5aa950381fbcea7d730aa794974ca9e3310384a95d6cf4d015fbdbd9797b3e4

        SHA512

        c0a084d5c0b645e6a6479b234fa73c405f56310119dd7c8b061334544c47622fdd5139db9781b339bb3d3e17ac59fddb7d7860834ecfe8aad6d2ae8c869e1cb9

      • C:\Users\Admin\AppData\Local\Temp\is-NFBR9.tmp\image.png

        Filesize

        37KB

        MD5

        19dbcf5c197f532a5e0a59e4a8d21f80

        SHA1

        6b149eb7b62df4026f9e7d9ff496ba60d5656969

        SHA256

        7bd450fb25858f42f283a7740901fc5d3249c40e1285b7c5a9db66bade97ac43

        SHA512

        7edbdebd1bd246de0234631cc4fa8d3e562e39259ad0ea7f138938cb35cd5185f01b5ab2b4db85aa6ab266a28d299cf69290b3ad138ae9417c85bda32226b28c

      • C:\Users\Admin\AppData\Local\Temp\rh1cptou.exe

        Filesize

        2.4MB

        MD5

        e22f8baeae92d006de46964e3dd3a719

        SHA1

        0c8019927d1139f7fe8825e28a59bd8f1d23f4a3

        SHA256

        a05e1975795ff2577efd57fbeb40403f327625fd66967d63532fe25052796c84

        SHA512

        dd138c996d6df4803e7e668211a6ff2dd7ea217c0ebada8ad9f4d264b2b09a7b0aa8d5cf4b32094aa7a62b10aad1b4287805564a30ea831a705e895aaffd643c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\RAV Endpoint Protection.lnk

        Filesize

        1KB

        MD5

        4cc72bd71cae3303a53430a7bf5277ed

        SHA1

        e1459bf32e9a8f20ad0c548f0663b1e8f8f218fa

        SHA256

        8b6d28b762d15d88d951fc8e295cd52832b051f4f2ca61e117f13f14bda3b021

        SHA512

        f9e81cea901862ae8617f18fd959a055a9acbdcc4d937971d970985ee635c81c36df884435190942c493abba5790b29ce0bf5c345cfa61a747bef2cf7125e994

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Code Cache\js\index-dir\the-real-index

        Filesize

        864B

        MD5

        d3c5b33984eb0b8250ffa4957c5f153a

        SHA1

        fd8a221de4679a88df0b9a5407126819a54cc3d5

        SHA256

        64dc51e506b4ace3cc453ce0b0e17568e1ec6a9dcb16adb948a22b633b5517b4

        SHA512

        b841992c5da259d9fa77a43abadc9250fa83623ed9f0f30d40e9c0e3219e85a90e97f32878f0a56debbac6389d16b2c12ce38d20657b5d6dfb3e85f77ad128b4

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Cache\Cache_Data\data_0

        Filesize

        8KB

        MD5

        cf89d16bb9107c631daabf0c0ee58efb

        SHA1

        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

        SHA256

        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

        SHA512

        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Cache\Cache_Data\data_1

        Filesize

        264KB

        MD5

        d0d388f3865d0523e451d6ba0be34cc4

        SHA1

        8571c6a52aacc2747c048e3419e5657b74612995

        SHA256

        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

        SHA512

        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Cache\Cache_Data\data_2

        Filesize

        8KB

        MD5

        0962291d6d367570bee5454721c17e11

        SHA1

        59d10a893ef321a706a9255176761366115bedcb

        SHA256

        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

        SHA512

        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Code Cache\js\index

        Filesize

        24B

        MD5

        54cb446f628b2ea4a5bce5769910512e

        SHA1

        c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

        SHA256

        fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

        SHA512

        8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\GPUCache\data_3

        Filesize

        8KB

        MD5

        41876349cb12d6db992f1309f22df3f0

        SHA1

        5cf26b3420fc0302cd0a71e8d029739b8765be27

        SHA256

        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

        SHA512

        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Local Storage\leveldb\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Network\Network Persistent State

        Filesize

        300B

        MD5

        206b3a7000fd15c909c90905cd567fc4

        SHA1

        4765f68ee4d4f3b4fe3b4da60d12054b93c50505

        SHA256

        ad76c59bf571f69e2dc6d5783963c5f4beeda83b2617f933106b57455d15754f

        SHA512

        7ae89773a1365eb46fc02740bf61ce1311bf67b8726d71e439be272365ae8933457225c635f4792713d5b23d847362196390c80f818c54072d1096a93e52b786

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.40.1\Shared Dictionary\cache\index-dir\temp-index

        Filesize

        48B

        MD5

        9afceff39853d9c1741d35c211ebdd17

        SHA1

        f2671f611753b1036d1c34e645a7fdd7c424ee5f

        SHA256

        29ac9f8937d90ea589152f701b05ba1aab70d792e1eb513dc72c94ba18b51fff

        SHA512

        60476adba15989136790a7dc0c260e6e87d9a49c1604b6ff51b18680ee6c5a6bafe01440dc44d6bf3f108bf887d709745440ad881e4263c51795b61272b4b68e

      • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Session Storage\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\Downloads\anti-porn-15.6.11.23-installer.exe

        Filesize

        3.2MB

        MD5

        4fa694e5458c4dc7cf400293d15219d1

        SHA1

        e697cefcdf9eabed986491bd88d460a19893a825

        SHA256

        8c3ce8553832e732e374f1d159e54eec00ac0206f2caa3657b0ef61de4bdc494

        SHA512

        86931cea545d4f7f4a3716fc1308b4b21081fbcb100b031eb129db40b22e2611057b40dd164222085fa18a1e19677ed70961535a94c060be98b2f77cc464306a

      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_D9A5E0330B9D7558F4A0668272CA6C30

        Filesize

        5B

        MD5

        5bfa51f3a417b98e7443eca90fc94703

        SHA1

        8c015d80b8a23f780bdd215dc842b0f5551f63bd

        SHA256

        bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

        SHA512

        4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_D9A5E0330B9D7558F4A0668272CA6C30

        Filesize

        400B

        MD5

        ec6774181e70ecf78f075718144d3714

        SHA1

        8ee7a50d341cde8a562080bb191f33db5f793fcd

        SHA256

        7f6b2a0bc55468bd45ba4423ee8a78ff365843621673533c901b15438683a091

        SHA512

        0625a1e04fe774ecb57e48347be4e4a7ec42c3c052924c9b00229d190c0755c4f41b0965329089c1322eabe3df383d34a0db24823e71238ea44d8feff4138529

      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_D9A5E0330B9D7558F4A0668272CA6C30

        Filesize

        400B

        MD5

        7b30bd8f825c5b5b5255ed5e267d8019

        SHA1

        64acc4c3ab20de4dc81a3f9237580859d6fdbd02

        SHA256

        e0e825664cecb1e83ac25fbc62fcbcaf75eaf218f3d779780e3092edba06fee9

        SHA512

        c4aeea7894909ac3452ea8c7f9d6b47f99bfb2c184a83c702f08ec967f4b33d3c51cae25b3decc196c2461f0b88464d090f36af846141f904d06f76cf05def23

      • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_D9A5E0330B9D7558F4A0668272CA6C30

        Filesize

        400B

        MD5

        f2a712edfceb5d4ba5c2bfa828a75d6b

        SHA1

        d3316e4677a209b203cf54b855d54871289ec24e

        SHA256

        1c2a1d3acd8ab343ad9b2347d9a2c73001bfb1cae8811766499096b37e378682

        SHA512

        f03a9b5ad4c8048f7f1c566495e697fea1c61a03b81cf9aca55e5c938172d10141bebf4d0b76087e17fe72364a9a302769db0a8bf51d4f93a5ffcd70840ecece

      • \Windows\Temp\Eagleres.dll

        Filesize

        364KB

        MD5

        35d2266be373d4a6b22182cc44c33718

        SHA1

        270a9b6fa4beb4c87d32974cbf7e518340c239b6

        SHA256

        5f39fd2c44519b7c4e0c6e234d9b821f151b533aa43f57ccaf4599d7ceff8449

        SHA512

        94a32f1e5cb07d4a5dd3231b67ebce3561d0f8cfb67ccef95ea48b4bbac4db15dba866e4b60fff9cc4c70b5bbe414f98b9289e44de45919a54193d6cd8720ddd

      • memory/588-0-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/588-1110-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/588-2-0x0000000000401000-0x00000000004B7000-memory.dmp

        Filesize

        728KB

      • memory/588-21-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/644-47-0x00007FFE32143000-0x00007FFE32144000-memory.dmp

        Filesize

        4KB

      • memory/644-48-0x000001A22F4D0000-0x000001A22F4D8000-memory.dmp

        Filesize

        32KB

      • memory/644-49-0x000001A249EF0000-0x000001A24A416000-memory.dmp

        Filesize

        5.1MB

      • memory/868-3153-0x00000251795A0000-0x00000251795FE000-memory.dmp

        Filesize

        376KB

      • memory/868-3209-0x000002517A960000-0x000002517A968000-memory.dmp

        Filesize

        32KB

      • memory/868-3159-0x00000251796C0000-0x00000251796CA000-memory.dmp

        Filesize

        40KB

      • memory/868-3150-0x0000025179830000-0x0000025179B20000-memory.dmp

        Filesize

        2.9MB

      • memory/868-3110-0x0000025179350000-0x0000025179402000-memory.dmp

        Filesize

        712KB

      • memory/868-3106-0x00000251603B0000-0x00000251603DE000-memory.dmp

        Filesize

        184KB

      • memory/868-3157-0x00000251796A0000-0x00000251796B6000-memory.dmp

        Filesize

        88KB

      • memory/868-3210-0x000002517A9B0000-0x000002517A9BA000-memory.dmp

        Filesize

        40KB

      • memory/2880-2877-0x0000029942600000-0x000002994262E000-memory.dmp

        Filesize

        184KB

      • memory/2880-2876-0x0000029942600000-0x000002994262E000-memory.dmp

        Filesize

        184KB

      • memory/2880-2890-0x00000299441B0000-0x00000299441C2000-memory.dmp

        Filesize

        72KB

      • memory/2880-2891-0x0000029944240000-0x000002994427E000-memory.dmp

        Filesize

        248KB

      • memory/4036-588-0x00000000048F0000-0x0000000004987000-memory.dmp

        Filesize

        604KB

      • memory/4036-589-0x0000000004AA0000-0x0000000004ABC000-memory.dmp

        Filesize

        112KB

      • memory/4036-464-0x00000000048F0000-0x0000000004987000-memory.dmp

        Filesize

        604KB

      • memory/4036-590-0x0000000000400000-0x000000000049C000-memory.dmp

        Filesize

        624KB

      • memory/4036-252-0x0000000000400000-0x000000000049C000-memory.dmp

        Filesize

        624KB

      • memory/4036-467-0x0000000004AA0000-0x0000000004ABC000-memory.dmp

        Filesize

        112KB

      • memory/4036-257-0x0000000000860000-0x000000000087C000-memory.dmp

        Filesize

        112KB

      • memory/4036-587-0x0000000000860000-0x000000000087C000-memory.dmp

        Filesize

        112KB

      • memory/4036-3313-0x0000000000400000-0x000000000049C000-memory.dmp

        Filesize

        624KB

      • memory/4260-2913-0x00000192FB750000-0x00000192FB8CA000-memory.dmp

        Filesize

        1.5MB

      • memory/4260-2915-0x00000192FB450000-0x00000192FB472000-memory.dmp

        Filesize

        136KB

      • memory/4260-2914-0x00000192FAD20000-0x00000192FAD3A000-memory.dmp

        Filesize

        104KB

      • memory/4260-2912-0x00000192FBEB0000-0x00000192FC214000-memory.dmp

        Filesize

        3.4MB

      • memory/4260-2911-0x00000192FB980000-0x00000192FBEAA000-memory.dmp

        Filesize

        5.2MB

      • memory/4848-1139-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1104-0x000001C76AE00000-0x000001C76AE50000-memory.dmp

        Filesize

        320KB

      • memory/4848-2837-0x000001C76AF50000-0x000001C76AF7E000-memory.dmp

        Filesize

        184KB

      • memory/4848-2827-0x000001C76AF50000-0x000001C76AF80000-memory.dmp

        Filesize

        192KB

      • memory/4848-2816-0x000001C76B050000-0x000001C76B08A000-memory.dmp

        Filesize

        232KB

      • memory/4848-1140-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1152-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1142-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1144-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1168-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1170-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1162-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1160-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1146-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1172-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1174-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1176-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1178-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-199-0x000001C7681A0000-0x000001C7682AC000-memory.dmp

        Filesize

        1.0MB

      • memory/4848-201-0x000001C76A680000-0x000001C76A6C6000-memory.dmp

        Filesize

        280KB

      • memory/4848-203-0x000001C769F40000-0x000001C769F70000-memory.dmp

        Filesize

        192KB

      • memory/4848-1158-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-213-0x000001C76A8C0000-0x000001C76A972000-memory.dmp

        Filesize

        712KB

      • memory/4848-214-0x000001C76A6D0000-0x000001C76A6F2000-memory.dmp

        Filesize

        136KB

      • memory/4848-1166-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-217-0x000001C76A770000-0x000001C76A79E000-memory.dmp

        Filesize

        184KB

      • memory/4848-2848-0x000001C76B100000-0x000001C76B130000-memory.dmp

        Filesize

        192KB

      • memory/4848-1148-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-222-0x000001C76AC20000-0x000001C76AC78000-memory.dmp

        Filesize

        352KB

      • memory/4848-1138-0x000001C76AFF0000-0x000001C76B048000-memory.dmp

        Filesize

        352KB

      • memory/4848-1150-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1154-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1164-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/4848-1156-0x000001C76AFF0000-0x000001C76B045000-memory.dmp

        Filesize

        340KB

      • memory/5048-384-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-238-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-215-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-211-0x0000000004A00000-0x0000000004B40000-memory.dmp

        Filesize

        1.2MB

      • memory/5048-33-0x0000000004A00000-0x0000000004B40000-memory.dmp

        Filesize

        1.2MB

      • memory/5048-34-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-28-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-29-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-26-0x0000000004A00000-0x0000000004B40000-memory.dmp

        Filesize

        1.2MB

      • memory/5048-20-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5048-19-0x0000000004A00000-0x0000000004B40000-memory.dmp

        Filesize

        1.2MB

      • memory/5048-6-0x0000000000400000-0x000000000071C000-memory.dmp

        Filesize

        3.1MB

      • memory/5620-3077-0x00000298D6870000-0x00000298D689A000-memory.dmp

        Filesize

        168KB

      • memory/5620-3075-0x00000298F0E80000-0x00000298F1040000-memory.dmp

        Filesize

        1.8MB

      • memory/5620-3073-0x00000298D6870000-0x00000298D689A000-memory.dmp

        Filesize

        168KB

      • memory/6792-2917-0x0000018324280000-0x00000183242CA000-memory.dmp

        Filesize

        296KB

      • memory/6792-2918-0x0000018325EA0000-0x0000018325EFA000-memory.dmp

        Filesize

        360KB

      • memory/6792-2919-0x0000018325E70000-0x0000018325E98000-memory.dmp

        Filesize

        160KB

      • memory/6792-2920-0x0000018324280000-0x00000183242CA000-memory.dmp

        Filesize

        296KB

      • memory/6792-2930-0x000001833E860000-0x000001833E8A4000-memory.dmp

        Filesize

        272KB

      • memory/6792-2944-0x000001833ED30000-0x000001833EF88000-memory.dmp

        Filesize

        2.3MB

      • memory/6804-3373-0x00000208FB1D0000-0x00000208FB1D8000-memory.dmp

        Filesize

        32KB

      • memory/6804-2976-0x00000208FA3A0000-0x00000208FA3D2000-memory.dmp

        Filesize

        200KB

      • memory/6804-3146-0x00000208FBCA0000-0x00000208FBF2C000-memory.dmp

        Filesize

        2.5MB

      • memory/6804-3109-0x00000208FB180000-0x00000208FB1CF000-memory.dmp

        Filesize

        316KB

      • memory/6804-3372-0x00000208FBF80000-0x00000208FBFB2000-memory.dmp

        Filesize

        200KB

      • memory/6804-3158-0x00000208FB320000-0x00000208FB34A000-memory.dmp

        Filesize

        168KB

      • memory/6804-3374-0x00000208FBFC0000-0x00000208FBFE6000-memory.dmp

        Filesize

        152KB

      • memory/6804-3375-0x00000208FC0B0000-0x00000208FC0D8000-memory.dmp

        Filesize

        160KB

      • memory/6804-3376-0x00000208FCEE0000-0x00000208FCF12000-memory.dmp

        Filesize

        200KB

      • memory/6804-3377-0x00000208FD290000-0x00000208FD2BC000-memory.dmp

        Filesize

        176KB

      • memory/6804-3378-0x00000208FD330000-0x00000208FD398000-memory.dmp

        Filesize

        416KB

      • memory/6804-3379-0x00000208FDC10000-0x00000208FDC90000-memory.dmp

        Filesize

        512KB

      • memory/6804-3380-0x00000208FDC90000-0x00000208FDD06000-memory.dmp

        Filesize

        472KB

      • memory/6804-3381-0x00000208FDB90000-0x00000208FDBE4000-memory.dmp

        Filesize

        336KB

      • memory/6804-3382-0x00000208FD2C0000-0x00000208FD2EA000-memory.dmp

        Filesize

        168KB

      • memory/6804-3383-0x00000208FDD10000-0x00000208FDD44000-memory.dmp

        Filesize

        208KB

      • memory/6804-3384-0x00000208FD2F0000-0x00000208FD31C000-memory.dmp

        Filesize

        176KB

      • memory/6804-3385-0x00000208FDED0000-0x00000208FE046000-memory.dmp

        Filesize

        1.5MB

      • memory/6804-3386-0x00000208FDD50000-0x00000208FDD7A000-memory.dmp

        Filesize

        168KB

      • memory/6804-3387-0x00000208FE050000-0x00000208FE152000-memory.dmp

        Filesize

        1.0MB

      • memory/6804-3390-0x00000208FDDE0000-0x00000208FDE34000-memory.dmp

        Filesize

        336KB

      • memory/6804-3392-0x00000208FDDB0000-0x00000208FDDD8000-memory.dmp

        Filesize

        160KB

      • memory/6804-3393-0x00000208FDE40000-0x00000208FDE68000-memory.dmp

        Filesize

        160KB

      • memory/6804-3154-0x00000208FBFF0000-0x00000208FC0A2000-memory.dmp

        Filesize

        712KB

      • memory/6804-3107-0x00000208FB1E0000-0x00000208FB23E000-memory.dmp

        Filesize

        376KB

      • memory/6804-3108-0x00000208FB6A0000-0x00000208FBA05000-memory.dmp

        Filesize

        3.4MB

      • memory/6804-3105-0x00000208E1A60000-0x00000208E1A90000-memory.dmp

        Filesize

        192KB

      • memory/6804-3091-0x00000208FB3F0000-0x00000208FB698000-memory.dmp

        Filesize

        2.7MB

      • memory/6804-3090-0x00000208FB0B0000-0x00000208FB0D6000-memory.dmp

        Filesize

        152KB

      • memory/6804-3076-0x00000208FA640000-0x00000208FA664000-memory.dmp

        Filesize

        144KB

      • memory/6804-3314-0x00000208FD410000-0x00000208FD690000-memory.dmp

        Filesize

        2.5MB

      • memory/6804-3074-0x00000208FA3E0000-0x00000208FA408000-memory.dmp

        Filesize

        160KB

      • memory/6804-3309-0x00000208FBF30000-0x00000208FBF72000-memory.dmp

        Filesize

        264KB

      • memory/6804-3071-0x00000208FA360000-0x00000208FA38E000-memory.dmp

        Filesize

        184KB

      • memory/6804-3147-0x00000208FB2B0000-0x00000208FB314000-memory.dmp

        Filesize

        400KB

      • memory/6804-2951-0x00000208FB030000-0x00000208FB0A8000-memory.dmp

        Filesize

        480KB

      • memory/6804-2950-0x00000208FA2E0000-0x00000208FA30A000-memory.dmp

        Filesize

        168KB

      • memory/6804-2949-0x00000208FA5B0000-0x00000208FA638000-memory.dmp

        Filesize

        544KB

      • memory/6804-2948-0x00000208FA320000-0x00000208FA358000-memory.dmp

        Filesize

        224KB

      • memory/6804-3151-0x00000208FB360000-0x00000208FB39A000-memory.dmp

        Filesize

        232KB

      • memory/6804-3211-0x00000208FD690000-0x00000208FDB8E000-memory.dmp

        Filesize

        5.0MB

      • memory/6804-3152-0x00000208FB0E0000-0x00000208FB105000-memory.dmp

        Filesize

        148KB

      • memory/6804-3155-0x00000208FBC10000-0x00000208FBC44000-memory.dmp

        Filesize

        208KB

      • memory/6804-3208-0x00000208FCCD0000-0x00000208FCD36000-memory.dmp

        Filesize

        408KB

      • memory/7024-3394-0x000001F047C10000-0x000001F047C36000-memory.dmp

        Filesize

        152KB