Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 10:22

General

  • Target

    64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi

  • Size

    52.9MB

  • MD5

    dee1cb66fe01d38563456233fd99f84e

  • SHA1

    2dc8c5665574ca781d0deb31e9cfa326b4589340

  • SHA256

    64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5

  • SHA512

    04a731d29388c1bade0d9f3839588e15621d7ad2daa1db290ae1c1947a72ab2176dcbf5dfd79702e602eccb29a981a363eb64821fc586f468bda7cfe3130e1dc

  • SSDEEP

    1572864:cP0B9hWc38EJOa1xbi+823n84w96uSryj6ZgykS+VOT:A0ThnBJi+82384e6uSryml+IT

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Drops startup file 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\64aa1bf54917a57a946753e077a17fbe3e2a5957d21eaf47a808ac87bbfa77d5.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Users\Admin\AppData\Local\Temp\MSIAE3A.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSIAE3A.tmp"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Public\002.part01.exe
        "C:\Users\Public\002.part01.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Users\Public\Netstat\pivo.exe
          "C:\Users\Public\Netstat\pivo.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Users\Admin\AppData\Local\Temp\is-U8E7E.tmp\pivo.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-U8E7E.tmp\pivo.tmp" /SL5="$4020C,14420606,121344,C:\Users\Public\Netstat\pivo.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4976
            • C:\Users\Public\Netstat\pivo.exe
              "C:\Users\Public\Netstat\pivo.exe" /VERYSILENT
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4016
              • C:\Users\Admin\AppData\Local\Temp\is-UG7EM.tmp\pivo.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-UG7EM.tmp\pivo.tmp" /SL5="$90116,14420606,121344,C:\Users\Public\Netstat\pivo.exe" /VERYSILENT
                7⤵
                • Drops startup file
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:1472
                • C:\Users\Admin\AppData\Local\reclosable\flyvpn.exe
                  "C:\Users\Admin\AppData\Local\reclosable\flyvpn.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:3588
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:868
          • C:\Users\Public\Netstat\bild.exe
            C:\Users\Public\Netstat\bild.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            PID:3576
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E7A3CC3FB971CFCCE4EF6A9A6E1BDE29 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:512
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3540
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 1C2019C2C2F7AA550C87E05AA14729E9
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4408
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e583739.rbs

      Filesize

      23KB

      MD5

      95583cf9a8a925cfbe6cb516205a31d6

      SHA1

      bd42bcb841f15ec4146b9ac79f2bad88151da838

      SHA256

      836f349c77edf2956f58baccfd6bdbd30ad2d6349f1ec90bc51aefc529df11a6

      SHA512

      effa411eefbff54e92256ed26530346aeb3aff32fb03b393b25e7ee77b56d0cd3fc949fa069e61625f719288fb2ee998aefb654849a4aa87b97c3457f44b7b67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_A314C346F0ECEE163F4030DE4E8B5330

      Filesize

      1KB

      MD5

      569dfb8179e3950fbf77a4f272c9d352

      SHA1

      c8ea1d94ab85725d5d501a36d05614ef05d5a9f3

      SHA256

      16f0a80c2056ac47052a0c3e6e16fe9420fcf0d5e8fbf9bd80d28192a0eb1573

      SHA512

      3c0b9c676c192fff6c108363dec9fbfd618dcbacb53cd043341de3c984099aee63009d77fac157b838c92067544201785fbd6afc2481af700c1f1cb14e86120a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

      Filesize

      1KB

      MD5

      3249b0abf85ddfb0d6f93ee84ae2cf55

      SHA1

      8fb430f29e07a8ca6d19902b6430d8cb7422f4e6

      SHA256

      81d43deebe9848bf54d80848d03b9dfbfa6bb38f85c5e63e8f02f6643abfbd37

      SHA512

      3dfef4337cfba046e22e29f96a1f2c6afb42361b51094e054d363d4f4a4afdf033d9166883089ae4547d5e270aee471a45bdcd2d573fb1622490836275371eda

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_A314C346F0ECEE163F4030DE4E8B5330

      Filesize

      540B

      MD5

      f1847a9492ed4ee0348f5246094c129e

      SHA1

      d5e4cdce155418c79837c7cea1ef38d1fd2dcb77

      SHA256

      4f399cae5f1dc43da4944d079252d1f8863f8bb1ba5137581b31dca78f922416

      SHA512

      ae5864072384c19015aef534a972ff23e9551ae1d9222cdb08301d53b3e87d141e739a6869b15b9d075d38c5875df854fd297ea621c2ae8675873848cc9651f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

      Filesize

      536B

      MD5

      c8483074de318508133ab39bb2e22e2b

      SHA1

      044603e05f066ffff98c4b7e89b70109a386cdf4

      SHA256

      984b79556fc7376b35a450bbd277655586ae016065f949290da0815092f25bbd

      SHA512

      5285335c077cbf0814c3c27947a2934a1bb8155d0e2ac6231ee610eb9686091f4c639e8bfbd64ef00da44b7a27843c3bce06c3334ab04e7d08e8c3f6e8a67808

    • C:\Users\Admin\AppData\Local\Temp\MSIA875.tmp

      Filesize

      1001KB

      MD5

      de574f7f5256f98f356a2d620c4a2288

      SHA1

      1d57d182bb748170f5cefb7ecf594b4998e113b8

      SHA256

      e831a5aebc7bd941fa815a9441e552a0ba699f9bd5454036a68ccbb42200353a

      SHA512

      431f3ea61d23028e1c538af3c808e7213d629615e3cb22b41d44715ff805323da82880c35bc90fffe95621132dad96eab5bfcc395863f167664a5666369d0d5b

    • C:\Users\Admin\AppData\Local\Temp\MSIADAB.tmp

      Filesize

      1.1MB

      MD5

      dd194cab81ba0394a9300fac3290fd22

      SHA1

      3ef676605e239b53bec63310e14b7df75e0d42f8

      SHA256

      1b21039c84e860b0619a17d9f1508e5e622a1d4834b86e1b8eeffafe5d59f683

      SHA512

      14bc3815b0367830759ca3e48edbe7061423ca72cea5ed0b2070674ee3acd7c17e8f3ce7dc6b9f83b9215507402daa0b162d68afd809b76612009fa73831f8dc

    • C:\Users\Admin\AppData\Local\Temp\MSIAE3A.tmp

      Filesize

      47.8MB

      MD5

      ee9067c3b73857ebb79a31b64cf6ef21

      SHA1

      e24146e0302bb9a12fe522fa21ebdae0a1454e27

      SHA256

      5a9cdecdf8a798789f44e8e650c05f6dca9fa2d8925d327d3a6c790eb093eabe

      SHA512

      e3348df0b6bc4268bbeb14639ddda83a0fd689cf69b4eb51757885054dc872f5868ad029cf737e33b873bb475b6f55d2056b72444221c25aee434236b24fcb97

    • C:\Users\Admin\AppData\Local\Temp\is-ESPVB.tmp\_isetup\_isdecmp.dll

      Filesize

      29KB

      MD5

      fd4743e2a51dd8e0d44f96eae1853226

      SHA1

      646cef384e949aaf61e6d0b243d8d84ab04e79b7

      SHA256

      6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

      SHA512

      4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

    • C:\Users\Admin\AppData\Local\Temp\is-U8E7E.tmp\pivo.tmp

      Filesize

      1.1MB

      MD5

      90fc739c83cd19766acb562c66a7d0e2

      SHA1

      451f385a53d5fed15e7649e7891e05f231ef549a

      SHA256

      821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

      SHA512

      4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

    • C:\Users\Admin\AppData\Local\Temp\tmp1849.tmp

      Filesize

      20KB

      MD5

      49693267e0adbcd119f9f5e02adf3a80

      SHA1

      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

      SHA256

      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

      SHA512

      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

    • C:\Users\Admin\AppData\Local\reclosable\flyvpn.exe

      Filesize

      13.9MB

      MD5

      4d8e624f384094c048f779b9bb94a3bb

      SHA1

      d81dca9f8165c915d88c9cc4c645f296198dc95e

      SHA256

      1d40788ce56c4cafdd19ae5f2b567e51234a32fa179ec8fba45452dd46b4fab1

      SHA512

      ae0294b02a073cff03d0272c74da2157807305d38993b91285a29b7ae000600324ae822fe6ee1e5986a87fdd7838979d84eda9d6b2499b28000f5d7586d34c47

    • C:\Users\Public\002.part01.exe

      Filesize

      5.0MB

      MD5

      da581ace6f9bb55a9a0a093fdd452053

      SHA1

      f03e07c725c17728774741a8b7a7d5987a476479

      SHA256

      af29953f9d537a2535e26f00b095db8d3eff4b6ae5b9503eb2a4bb2100d610fc

      SHA512

      a082920c27d548bd83a4090aac23877f70191b6720893a648e2a4037f5b07e704d8fa9b3d29a038f1d23753bc96f0ea6f3820baed0eedafb21e6c2970da24bd3

    • C:\Users\Public\002.part02.rar

      Filesize

      5.0MB

      MD5

      a032cae481945bd6d8bb1350f20875ed

      SHA1

      7ff52d98f070751c30b937841f8c374f91f1d24e

      SHA256

      e38dd67843219eee7158d4d2735bbab121e7491763ff4271b1fa4b815b161b17

      SHA512

      03d1aa0552a8776fb108772d44cd08f7f57a6725e254f39e92d1840125d8d7dfa54677fef533026fb76cf195c6f7375b6876c7d7bd1e33ef1f0fab5d078fb644

    • C:\Users\Public\002.part03.rar

      Filesize

      5.0MB

      MD5

      af912318ddcec51cacc5f43acbbbf9bc

      SHA1

      f36e54a0031cb4f3546f560fe5f6a8fb51cbc24d

      SHA256

      0a3af047215cd3109e6c1830135a486a68718f9117cfa8bb7317a64d85bed83a

      SHA512

      d225b59fe6e65720e7498268b0fd61e25db880e80324f163239df51cd7b1e3a0c0734d3058d3713128290beb5a357c51fcccfa1e8af4545297325778e5c95651

    • C:\Users\Public\002.part04.rar

      Filesize

      5.0MB

      MD5

      4e7d683e050b2751b690575827df0a9c

      SHA1

      6e33822b3cb97128042a266160636cfd5e64c00f

      SHA256

      71f798e8d550a8b8279188f0a8b208bd4ddad9dd03adb4b766ac8fd90e283112

      SHA512

      0d449c5d78026090af2983f37994aff9522376e10a2ee5d405c23b15fbb88b8c61ac68da84dc5037767d364f366db668a6ef093d37801400a8d78ef92ffa420c

    • C:\Users\Public\002.part05.rar

      Filesize

      5.0MB

      MD5

      36df99888eadca5e370dc26b6dc8294c

      SHA1

      e7f48fc5bf9de6b1a13a5ab02dff7653614ad3d7

      SHA256

      983241b9c9446cc740069d9d00cbaaaf0c9a7e8dee29ce2a35394111d8eff308

      SHA512

      89e24472ffccaf61484e1132810cbb579230044f25d83e59b130b0376fec2bb5eb7250f471d2e78ff4fd0a166c1d4453df78867ba849fa4050f766b3bc99c17c

    • C:\Users\Public\002.part06.rar

      Filesize

      5.0MB

      MD5

      f663adb2092a2e88fa5213e9a5177700

      SHA1

      e1e1878735388b033c14ea9378da334affd359b3

      SHA256

      20491f1a14d9e583cf74993f752d28c85eb6e73df0c0a469d89947f13a1c17c0

      SHA512

      b74a72670d78613b02a8de72815ccd802ea378e08e01cfdc7053e4c2c300b6f7a17d1de096e7be6aa58a774dbb5bb45863a0a7d34fd7abaebd78ab3ca76078dc

    • C:\Users\Public\002.part07.rar

      Filesize

      5.0MB

      MD5

      4f0d053acc8d21b9335af65cdf8cb123

      SHA1

      d2177d99d378b9736e50b0c3304ed78733162fb4

      SHA256

      48d128d05b695806e558b5d76b3b8aedbab458b73c6d9c5e9bce89371a6542e3

      SHA512

      81520f85b9f2b1dc3eee5c70ce48a53c71dee8377e369f0da235f92ac9b8b429ddaac819edb17f0dfaa61c72d62c44f2760e4baf25f360bdf41491f5e5dafa86

    • C:\Users\Public\002.part08.rar

      Filesize

      5.0MB

      MD5

      a2278c3910dcdcfd6067121cb622b6df

      SHA1

      ecf0b15987a0ce4e128c1bf096c5f81b739925d3

      SHA256

      ad48f4e08f20455610bfc0cc73fea6c926fd2558b4fd66dc66aad9454e1e52fd

      SHA512

      9bc75c1e2d61e3a9927e6f310456e9a0ceba55dd9cbd0123e25f3cc6be11b16b90d1e2f455ded54efe04a1eca255523221448b2350826b45cee8e3a4eb66ed9a

    • C:\Users\Public\002.part09.rar

      Filesize

      5.0MB

      MD5

      e3b9aaf563ac406db859dbf53906cf2c

      SHA1

      0bb93a105568b53d70bcab341d350f1aa72f6bd9

      SHA256

      d3940dfb44bd59391a545c2aeb5520960c082edf70c2ee7464f175f51753ba90

      SHA512

      6c133c2f15e9064777468af9abbab3541aeb133c273982fb62ece5e131bfe1c8c1562b9dbc00e81847a4caf2b495a129b70e7fb6f23c7220b0aab9126004d22e

    • C:\Users\Public\002.part10.rar

      Filesize

      2.7MB

      MD5

      573ecbb420b82b2f6f49272286ca9393

      SHA1

      a1ef52c42939d24e34ecee2619baf4a80994d4fb

      SHA256

      b5bce1d49744f35bb215c142aabf4652bab6dc4ce65b974dcb52e21b816e7472

      SHA512

      88faeb91fe7e0facb86361270b4de00d04b322791f183fbf19ed05834d11d6984de7d2de4ffacb9374dd51af1b0a679207c3f0828f27f67ae83cbc1866d284da

    • C:\Users\Public\Netstat\HTCTL32.DLL

      Filesize

      320KB

      MD5

      2d3b207c8a48148296156e5725426c7f

      SHA1

      ad464eb7cf5c19c8a443ab5b590440b32dbc618f

      SHA256

      edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

      SHA512

      55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

    • C:\Users\Public\Netstat\MSVCR100.dll

      Filesize

      755KB

      MD5

      0e37fbfa79d349d672456923ec5fbbe3

      SHA1

      4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

      SHA256

      8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

      SHA512

      2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

    • C:\Users\Public\Netstat\NSM.LIC

      Filesize

      257B

      MD5

      7067af414215ee4c50bfcd3ea43c84f0

      SHA1

      c331d410672477844a4ca87f43a14e643c863af9

      SHA256

      2050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12

      SHA512

      17b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f

    • C:\Users\Public\Netstat\PCICHEK.DLL

      Filesize

      18KB

      MD5

      a0b9388c5f18e27266a31f8c5765b263

      SHA1

      906f7e94f841d464d4da144f7c858fa2160e36db

      SHA256

      313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

      SHA512

      6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

    • C:\Users\Public\Netstat\PCICL32.dll

      Filesize

      3.6MB

      MD5

      00587238d16012152c2e951a087f2cc9

      SHA1

      c4e27a43075ce993ff6bb033360af386b2fc58ff

      SHA256

      63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8

      SHA512

      637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226

    • C:\Users\Public\Netstat\bild.exe

      Filesize

      103KB

      MD5

      8d9709ff7d9c83bd376e01912c734f0a

      SHA1

      e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294

      SHA256

      49a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3

      SHA512

      042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee

    • C:\Users\Public\Netstat\client32.ini

      Filesize

      702B

      MD5

      a4aa9219becdeec09159270bb041bb35

      SHA1

      2d08305017efb0a1ff7defdf66db80191ed9ccf8

      SHA256

      277b9bcb5778cd5dc167ed75528818b06ed12f3fd427339f3085f4db8a39ed2e

      SHA512

      4f7ce001da009fcba0c5beab572a16306d56fd91253c45d5196892142da78ec805982a4e1c136ad61471b5a951697eed76f9ee63d8b94eb64024a11e0fd0de42

    • C:\Users\Public\Netstat\netsup.bat

      Filesize

      161B

      MD5

      bb8869e7e80234a30633bd0301b57deb

      SHA1

      13790ad2bc012431324093b16c19b1e532c94e63

      SHA256

      d6f183097bf12a7f68632efecc6dc7ddac16002839229502b32cd40826dd472c

      SHA512

      7d043054fcde4c73e9e5988330a94a737360adf1b0d806efc4660d1e336e27a66149494b611969a29b873d76bc4b1278b47d1efc27a9c7bd50a1f8cdf346937a

    • C:\Users\Public\Netstat\pcicapi.dll

      Filesize

      32KB

      MD5

      dcde2248d19c778a41aa165866dd52d0

      SHA1

      7ec84be84fe23f0b0093b647538737e1f19ebb03

      SHA256

      9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

      SHA512

      c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

    • C:\Users\Public\Netstat\pivo.exe

      Filesize

      17.3MB

      MD5

      2d5f24f25ed215dcd5b36a471f443633

      SHA1

      647c48f00951f83a0df41473898aeb703f044b53

      SHA256

      8777be6a537392b72fae3846d7f249cc64caa5ca9eff09f096270c0b6479dc63

      SHA512

      2e3869728d6922beacc1f8ca76afe530416942b084e6618f87bc38ecedb1154096e7c1b039c569d8f530372ac26b33f955960e1aa32914db3ac3539f20531ca1

    • memory/1472-190-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/1472-202-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/3588-207-0x00000000050F0000-0x0000000005694000-memory.dmp

      Filesize

      5.6MB

    • memory/3588-208-0x00000000056A0000-0x0000000005862000-memory.dmp

      Filesize

      1.8MB

    • memory/3588-232-0x0000000007310000-0x000000000731A000-memory.dmp

      Filesize

      40KB

    • memory/3588-203-0x00000000021E0000-0x00000000022AA000-memory.dmp

      Filesize

      808KB

    • memory/3588-205-0x0000000005020000-0x00000000050E6000-memory.dmp

      Filesize

      792KB

    • memory/3588-206-0x0000000002980000-0x0000000002A12000-memory.dmp

      Filesize

      584KB

    • memory/3588-388-0x0000000005A10000-0x0000000005A22000-memory.dmp

      Filesize

      72KB

    • memory/3588-389-0x0000000005A30000-0x0000000005A6C000-memory.dmp

      Filesize

      240KB

    • memory/3588-209-0x0000000004F50000-0x0000000004FC6000-memory.dmp

      Filesize

      472KB

    • memory/3588-210-0x00000000058C0000-0x0000000005910000-memory.dmp

      Filesize

      320KB

    • memory/3588-211-0x0000000004FF0000-0x0000000004FFA000-memory.dmp

      Filesize

      40KB

    • memory/3588-212-0x0000000005C90000-0x00000000061BC000-memory.dmp

      Filesize

      5.2MB

    • memory/3588-213-0x0000000006350000-0x000000000636E000-memory.dmp

      Filesize

      120KB

    • memory/3588-214-0x0000000006400000-0x0000000006466000-memory.dmp

      Filesize

      408KB

    • memory/4016-189-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4016-172-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4944-137-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4944-171-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4976-166-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB