Analysis

  • max time kernel
    59s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/02/2025, 15:27

General

  • Target

    eagleget-2-1-6-50.exe

  • Size

    10.0MB

  • MD5

    e96dd956bc2159ff1d073876ef5d4e58

  • SHA1

    a0da0d7c8394d646eb5a0f64be14397235f22704

  • SHA256

    14636b7fc900e2be3fee5abb409e3b7a3cdf5a99107bf6d7dcbcce4b26ee0d34

  • SHA512

    c2334b9c666174d38213c1cd84a8f2f9fbfbeea8e18f7fdf7e0b6bab70377e7d1a8f01fe45688bcbfcc2bb85933aa97a829c1feb94ede874b1426dd320080806

  • SSDEEP

    196608:Mem6/gb2N3s9m35DylYLan8CmD5zpX9o38vR/dnG0sb9iMly9ssSGz8EQgCPhtv:MelYyVYm3RLaQ5zpNq8NdnExiMw+P4QD

Malware Config

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 24 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eagleget-2-1-6-50.exe
    "C:\Users\Admin\AppData\Local\Temp\eagleget-2-1-6-50.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\is-O94IH.tmp\eagleget-2-1-6-50.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-O94IH.tmp\eagleget-2-1-6-50.tmp" /SL5="$30144,9993427,175104,C:\Users\Admin\AppData\Local\Temp\eagleget-2-1-6-50.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill.exe" /f /im "net_updater32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\EagleGet\eagleSniffer.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2768
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\EagleGet\npEagleget.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2804
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\EagleGet\IEGraberBHO.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2740
      • C:\Program Files (x86)\EagleGet\net_updater32.exe
        "C:\Program Files (x86)\EagleGet\net_updater32.exe" --install-ui win_eagleget.com --dlg-app-name EagleGet --dlg-tos-link "http://www.eagleget.com/privacy-policy" --dlg-logo-link "http://admin.eagleget.com/latest/EagleGet-Icon.png" --dlg-bg-color "#ffcfe3c4" --dlg-pos "screen" --dlg-btn-color "#ff32363f" --dlg-txt-color "#ff32363f" --dlg-not-peer-txt ads
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Program Files (x86)\EagleGet\test_wpf.exe
          C:\Program Files (x86)\EagleGet\test_wpf.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\EagleGet\CrashRpt.dll

    Filesize

    294KB

    MD5

    69f2854d3497bb96078fde9147d12227

    SHA1

    b22ace716494c7422261c3468336cd8a51d03a44

    SHA256

    fd5431468ff4e188b7652f0acf237896c6fab3bda341d77f9d84c9550f803c17

    SHA512

    a15583bf595df0223d5deb984598cdf7b14f5340e6255c6d8ff864d36a9ae9a24250a51f05b176cd633f3bde4b52d13ba1ea6ec9a65339dc593901b07e5e27a1

  • C:\Program Files (x86)\EagleGet\EGMonitor.exe

    Filesize

    332KB

    MD5

    44a8d0dedc406ee46e0ca3e13768f1e3

    SHA1

    a5efe5a4db00fd6e6301a012513f955028df3823

    SHA256

    1499a03e0ab8e77fa44aae63a3be01786b2d954854c4892cd98794abbd433e1e

    SHA512

    32fea58ad5cd44d0dfd3454b9856c97625144e2b89f8cc725efd466fe95ce53adb7e0f599b779b69a1e4401887712a47c3f93fc2d305f641b2f440b20ac17ef0

  • C:\Program Files (x86)\EagleGet\IEGraberBHO.dll

    Filesize

    238KB

    MD5

    1e91ec8eaae0d9955f6bb17fc28ea04e

    SHA1

    2b3fe85e4e9a89e3081c19591f2cee3a95482638

    SHA256

    ec0527a50753879cf3ad4d153ea19ff739827ee8a983b4a1519d4927e04813d8

    SHA512

    1cce017201bd174c4b52a430b7b4323e5d53aaecad2ec9c5562f04d81868d284fc86f120a2285237365aca40b9099bfa2e2ac2aa5ba5a98d1dd286a50bea359d

  • C:\Program Files (x86)\EagleGet\UninstallIco.ico

    Filesize

    17KB

    MD5

    009d9bdffb6ee378d30150031b620695

    SHA1

    11dea417c23f5682bf8102e6dd566f05ae9d7e3e

    SHA256

    5b003443e41fd99f26ecb3049b887bb9e2dec66fbe495f5f1dabc7d2fde1e801

    SHA512

    8972887f569f845a2312f0fcacc1e881990c5ab999b14184c1907931766fb7e6efd2e079efb1245007a0114ede419c41d8581c844f1936a9de4fbb029aaa9975

  • C:\Program Files (x86)\EagleGet\_eagleGet_x64.sys

    Filesize

    77KB

    MD5

    7cebfad0c6236844d930aaa0f6502e9b

    SHA1

    67a451f41d453e7c0cc8eb6f56b4c9ec257cf689

    SHA256

    2e2d1651f3b57376f0e100ead43c95481d27a9815ad13742f3034c7ebcc43f59

    SHA512

    33136266b8f4433dbfd728ed3ed3a70e0afc2d0064628dd056add79c78648e9012408341817097a128a5264e85191a7b43ebe46be53937eaae2d9f8d51b06311

  • C:\Program Files (x86)\EagleGet\_eagleGet_x86.sys

    Filesize

    62KB

    MD5

    7149e56fe2673c5a82d99848d61f5823

    SHA1

    7c74a82c264661ee511952727812e4fe63324579

    SHA256

    ee61881a1a99836a2a580e08aea53e6eba295ead01b76139b09d0741345fade3

    SHA512

    59921aa7740ea28b64833d60038f57dba1474352b1e6ad833fe57859867fccbe5c2b0ea69535533316bc726f7f70959d61bec69197677828cc00109081afa76e

  • C:\Program Files (x86)\EagleGet\addon\[email protected]

    Filesize

    96KB

    MD5

    a40b9a135b1aac95a3f4e776990ad685

    SHA1

    ebba814f2801e67d581bd6f2327f071bcfe1d7a5

    SHA256

    e6d31dc6c83b9700d204b9ddeeaf688e62e17a8bf7dafe84beae934ab496338a

    SHA512

    f15babe70a9413cf0e4098f19f728321465bff0ecfb6f0ee2ac955ecba4e2c00d92be17142d13274b6bb5639ccb78f7c02959ba19b229376210a75efdbeabdb5

  • C:\Program Files (x86)\EagleGet\addon\[email protected]

    Filesize

    104KB

    MD5

    bb9452d61f8e9637265a08935893d999

    SHA1

    ec4a265a8d3d1ad5e962fbce9ac4e827e62d9456

    SHA256

    9f84f0cfb863b9c31adbed63b5392b6ad562c80354c3494c6aed0da178d20ea4

    SHA512

    448346beb56fa925701add8c9faab5c864cc716c353dc641d79f6775ed4de9d6a1764570eb7ea32d70659ef9fc626b767187adff5982df94c4d3f3709471062d

  • C:\Program Files (x86)\EagleGet\addon\eagleget_newtab.crx

    Filesize

    961KB

    MD5

    b41e30bdb9035bdb2d73a22320263930

    SHA1

    8232e2431565a1e7274059808f7f75a358b451d7

    SHA256

    145ea4ada358df598bfbc9faf1fc73f1b41df15d72799712b7b8f410aac963d9

    SHA512

    e1efbfa845c218c751fdcf2b9cc70fedbe3c2305ec70648f55e68a7c6b63c63f48f583a25a3c6206ef2937d7e34d87206410c51cfdf7811e40bf7b7a124ca20f

  • C:\Program Files (x86)\EagleGet\addon\[email protected]

    Filesize

    18KB

    MD5

    a1af69c6512bd7641c2ccdb4025c8fd2

    SHA1

    1898a9e48f9fca77ba11e882d127839749ee8e96

    SHA256

    ef2e2baad155b62ae37138c190127aede4d86948db0be96e952e97052395f837

    SHA512

    9f64e5b95318edffac6ec1dd09f5b1ddf3324e8e1eaebeead5ea4e25367a0d262b95428a47665f6fc215980da773e31d94ab6e6b3fa4159a4a08fba0daf31568

  • C:\Program Files (x86)\EagleGet\com.eagleget.chrome_extension.json

    Filesize

    398B

    MD5

    ce86ee686db7743eb5bc3850159092c9

    SHA1

    69434018ee6e609da7a3ed27a89af852217e458e

    SHA256

    cf951b06fc0b9c97ad1e731b68bb5fa09642900e9b615760caf63aad96251a99

    SHA512

    ed2664e86ea50ad4ecfa717f0c4bc311ebb92b02d7080bb11cedc73000387282e1b112d5a6cc1561ea18202dfc0c8ec871ce67e53539c8497a98519190993e54

  • C:\Program Files (x86)\EagleGet\dl.dll

    Filesize

    4.1MB

    MD5

    49e0aec342c9b5ea33becd816373795b

    SHA1

    387b33413a92e9a7016c2c71e17c039f6282de9e

    SHA256

    23576dd1005adf75ada73b774dd6df8da6774725334f1b1b49c3b4315da393bc

    SHA512

    1e499b0c6a773d1091a2788ef49174c5e0be17b3ab1d97881140030a40f45c225b334a2978cfe16245b58673dd29ae7df32a681526b6cec33628e5122fc207be

  • C:\Program Files (x86)\EagleGet\download-complete.wav

    Filesize

    120KB

    MD5

    0efa3ef40736d08b8504575dbcd281ba

    SHA1

    bf900a29a60a2d109db849ae33b89e6544e48b02

    SHA256

    5c734125eaabaad56362f76c311fedeb86bfea5f19bd68a11d696be561f59651

    SHA512

    094e901553317895400190d66529f02e048e513be1a1a5b21f9eef25715dce2ac32adf197620f82a630d495380188972162d40635b290b688776afb916d8fd28

  • C:\Program Files (x86)\EagleGet\eagleGet_wfp_x64.sys

    Filesize

    84KB

    MD5

    cb9a12bde2db323740692f0f54f83dd8

    SHA1

    87f02a72c44ea04ad38d8d726c0c253fe0783d69

    SHA256

    69287e35b96f50df7fb628b8132f9a58bbb2d1312705aeccd15fc1cf3048fa2a

    SHA512

    e3153606a1c2d2c86c967ed2e680b714bc1ac6127dedb85409b16f582e9bee1fcf6f4fefcedd969dc3a9c1e9768318f46ffa735b5fca806b9364b9f57ae9af9a

  • C:\Program Files (x86)\EagleGet\eagleGet_wfp_x86.sys

    Filesize

    67KB

    MD5

    549219f86174d095f30b4f1da4189358

    SHA1

    432e98a1118e82160d5abf5e4658d0f7f5fa8404

    SHA256

    a1c5453dc41ab2176c985422e02a14f7b9113ed9af2fe5b9141c6d32a4e8a93e

    SHA512

    5adfb74807b39ac5ce0c91e501f68bbb85267cc2bc77b3ecddf91393d339c0bcc22dcb8200ab84798d30818a367ce945e4549877e960d0243c4d3cf07af614f7

  • C:\Program Files (x86)\EagleGet\eagleGet_x64.sys

    Filesize

    74KB

    MD5

    61745181308202b14cc2f47d50e85cf6

    SHA1

    b665b8004ae3fe4a5d141a5a95b0e28135d23ca8

    SHA256

    2875cdbd6960ada13590ee6569a077e36271653c03eca9996af166aad64e6385

    SHA512

    6424dd4c395326410a5222d26a6518a650524aad8a3e9428f16d06117e8c9b72a990f1b1df53ce342b87a3bb10ad609e640d290f2180f93ee2aaa571142dcda5

  • C:\Program Files (x86)\EagleGet\eagleGet_x86.sys

    Filesize

    59KB

    MD5

    5bf0b3477ce8b7c40d7f3fbd083147f4

    SHA1

    ee72e488b6ddd022fa0d4377ef8e6c4aec813d34

    SHA256

    617ecb74de35e7d27d6ea1e556aaab0b5e038e9a96963f5011b6fea203666cae

    SHA512

    bbc4e3da130b4b1963a0eca3fcb93287135057b3d1ec43384d083c90c11d810ee138f2306979912ec149fd94ae3be53d9eddcaa5f79b1842d7ef039d46480526

  • C:\Program Files (x86)\EagleGet\error.wav

    Filesize

    1KB

    MD5

    72309f20f2bfee0595fe8d20b8cbefb0

    SHA1

    efc2b2b263722dddffea44ffc7a116daf09709b3

    SHA256

    dce3297d94996c91126446e133145e4395c87ba47c4b731ca86c4c845dad8049

    SHA512

    0de89f9b0ca62cd9977e2becf30d8e9c416ad42f66d1bfbf78e34dc6301e0cec559813d76a05f11abeb39c7cac45e6c20bdf88c86c398c09158cb9f6c3af5942

  • C:\Program Files (x86)\EagleGet\libcurl.dll

    Filesize

    296KB

    MD5

    1923e9ae0a142aead21fdb87b67e0efc

    SHA1

    e6d32341e7c3b5a3488416d7f62e37b2d0ed2b47

    SHA256

    96620fbfaf8635d7c5b0623bd10b28deec2cc7706dcb470c2d0b1fd4674c8e39

    SHA512

    f852aea4bb9712f8f56c5671c242b5ac4611a1c4bc3aa8bb3838a91cc583387c3a1b4af2b97c12e97dafcd6676c9a78e0ac936f9336151915d9cbcf7942b38fb

  • C:\Program Files (x86)\EagleGet\libeay32.dll

    Filesize

    2.2MB

    MD5

    61d8d7cbbd1cc7d544c8168d6c917ce4

    SHA1

    c003fbc9167817d98e34269c3f45eb5113aa7f89

    SHA256

    4a7768932385e490443dfd0f8b1402a0028f2a5736ebded5093c128a45b5da72

    SHA512

    b4790ca751abb622abaeea8b766f16d57a2b8f1f14442399a7ecc150ec605881f372481190c750ae5bf1f8b2e2ae63ca3a42e4c04d83207ac480dd8e92bb82c2

  • C:\Program Files (x86)\EagleGet\libgcc_s_dw2-1.dll

    Filesize

    42KB

    MD5

    c4b4409f186da70fcf2bcc60d5f05489

    SHA1

    056663c9fd2851cd64f39d882f6758e7a987bd42

    SHA256

    b35f2a8f4c8f1833f3cdec20739c58e295758ce22021d03d4335043148bd7610

    SHA512

    cdcb945a82a0304e4d7cfc9ae9d7e5a5e81d4e3025e982494c87c283f6fac542181e9e1e3028456b9b0b5b6279990cb3e1a50f9df0f6e707c70fa0e23c7a808c

  • C:\Program Files (x86)\EagleGet\lum_sdk32.dll

    Filesize

    2.5MB

    MD5

    f70f30ae1d1d0e1f8f2015e52e66a0f1

    SHA1

    62f7c6bebd04c7f607afea262c6da288c10fba23

    SHA256

    450ac74d8681d8d05abd0fdd34b0891e629bd4f39fabe996f5e721665de0dead

    SHA512

    baee69cdb4b58407740631bdd719b2cf7f78de970ba262f9488d123b70f90eb34426079f4d983e0261f2dd766b4415bbd10eac16f8ff870a7f91b0236bc6c6d1

  • C:\Program Files (x86)\EagleGet\luminati\20250216_152828_04_02_supported_1.172.289.log

    Filesize

    1B

    MD5

    68b329da9893e34099c7d8ad5cb9c940

    SHA1

    adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

    SHA256

    01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

    SHA512

    be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

  • C:\Program Files (x86)\EagleGet\proxy.dll

    Filesize

    935KB

    MD5

    efd86d051508f93eb579fe383c4a178d

    SHA1

    1245f64675be60a46f9bd06cd05c745f2434b249

    SHA256

    3e082acacba78908405821eb3e20385398e19548dfa8917a886794403ddf78c5

    SHA512

    730d4e72f8b47932904ec3f7d5b0b245de82c485d698fbe0c88e4c7dcb94d453fcdfbd4fe26235ebc729a4cd60e7ea8d18bcffddaaa5658aa713401efb2d7d90

  • C:\Program Files (x86)\EagleGet\ssl.dll

    Filesize

    844KB

    MD5

    e08048c35eb288871cec585dff712fb9

    SHA1

    429a550b0ee400acfcdf287311882865ecb8d1b8

    SHA256

    f60645863b359f55aca2bea5fab96f6d5d75658c3d9edbe4e752d70ec0627085

    SHA512

    90f3d16099142771bea0b511bf335a80c95f6eff13b4d7fcdb0b4bb698f3757ccc3cf7f3acbf3938ae996021ef259fad90bb07d6e20c00ccce18167ea0d03c70

  • C:\Program Files (x86)\EagleGet\sslQuery.dll

    Filesize

    194KB

    MD5

    2fab3c62e113076f0a383d07d7126829

    SHA1

    08ff2d3b4ace54f2b721bf7e4bfbc9c31619c248

    SHA256

    23d3f1984563297059c1a2616da4ef2c79fddcba4ca3fc7f6fe18f1d6981728e

    SHA512

    659fbdb9d64a70ebfa90aa5de8c51ffa0e4404ef4124de199a095d4ca2590f9cf04c795d79952ea71336ef2da40fa6f7ff4e894349b22b5afd93c31f5ffe9c3b

  • C:\Program Files (x86)\EagleGet\ssleay32.dll

    Filesize

    576KB

    MD5

    8c32276fe49dcf47b6f3364e3e6ad610

    SHA1

    839d246d96e12babf3963d62d0bdb378dc916638

    SHA256

    bcc7cc8af2f8d4ed65866a09640ca8391f9065f199526a32d783def445b0f3b8

    SHA512

    387f0296615355264bd48a15c7e7c8be3c4707ea02de40a2dfecdf61d5d041a8a60b71621c4f0835df5e1d9dda3dd1921b9bc2054dc1332d8097684f7eefa329

  • C:\Program Files (x86)\EagleGet\test_wpf.exe

    Filesize

    17KB

    MD5

    3b996b69e145725c8d0e0557fbfb48e1

    SHA1

    1142ad91b7907981ae2bf688abb268d8431a497f

    SHA256

    bc9b6aa2bfd98e3b51358398f3fa94b118e6e098ea5568c11a2f14ebc9df7421

    SHA512

    13f46a55342de4a8878e0da763c7209c6ddc5da2d69b4c7d500dae64873fa28b66f2c88ceb8c28bd1733ea000c051350ded7d672e66f599254fcebb53d962a4b

  • C:\Program Files (x86)\EagleGet\unins000.dat

    Filesize

    67KB

    MD5

    6c2df0a858e63e14f8e81f3a81feb619

    SHA1

    fd845904e02df37293c3779da0ce01c0bdf6a2ef

    SHA256

    236091f3fe4d3bf2423911109f3b43b5ed2858c5fbdf400b8f849ba9c46546d1

    SHA512

    4cfa5e1fcb67d49c7b4606d91d3822edb540fe496a2afefe7b5c6c800e7b8111f3206f2ea79d0283394c4af23dc9f6f6a94c799568d2769f40a63550e7e59261

  • C:\Program Files (x86)\EagleGet\zlib.dll

    Filesize

    52KB

    MD5

    87eddceb9d22c129e386e652c5cda521

    SHA1

    0447ff30dfe7a5234624ea21a6947e88f6e80054

    SHA256

    792d768258eddaec86d9263e51ff64ee6f0bed2f28205f535ee150e94f8d6a2b

    SHA512

    83ae55dde165165b8001463cb3c4b3713ddc5108a68af5289055bdb10b2c10f1338e2eb6337703edc299e375f9c9f04e757d92eee535994ab61c841e2dff78ec

  • C:\Program Files (x86)\EagleGet\zlibwapi.dll

    Filesize

    382KB

    MD5

    b97a71c359c03cf1e9bc1c06e3aa9162

    SHA1

    c3d1971f3556a2d60df7683b601e7d0d42805588

    SHA256

    2c22a3dcad17df613e8bf2ae1db82387aef9826747136436c6d6f00b43dfa5ad

    SHA512

    f3e884abb645e101d80a33666bb610290fabd47da6855b4a5618d17d260730b9ffa0426f2c3ce9cc17068bdf496fed368b0c334f7421fc5575a58354718aa9c7

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\back.png

    Filesize

    2KB

    MD5

    ef9ed169ba900bc5250d0210d25619e3

    SHA1

    d333ee23b4441e7da0109886159f7c9e78819c5c

    SHA256

    806f42fddd09b24993ec053e6fdcae023e4833b371590843a498aacac20b8c7c

    SHA512

    042e7fef639b74e421ab456e41301dedd1a91f29795b5594eea89ee95ff6c44b3f72936e639f8671bba3874fb6f536c7ef01bc878c5e3a1bdc1e73ae2f716267

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\btn_browser.png

    Filesize

    2KB

    MD5

    8dd4f9f2c22073544694eca39c4f305d

    SHA1

    f7944cd8aa4f4b5233867dbdcea034a8d4be69e2

    SHA256

    0f6e9827ef681b88722d2013ae44fe5f8eeeaf22b6fe64904ecd0852de8197c8

    SHA512

    1c8708c77e8e61659ad7a903a4b5431e72532645486ca62e9b84d42f2e1fce2ebf07d17b64241656e08f32d766843dea6bc40fe7e8ff6e010201de8860a0d189

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\btn_close.png

    Filesize

    204B

    MD5

    b780d58e26ddf76733743501d00123d4

    SHA1

    594b7196378628bcc7107e8186e2f2f6da07ac0b

    SHA256

    8a6026306c1774d027022b3ee600c34b296ab8135f46c872d74c734baa239eac

    SHA512

    8691a1c2a00311f31224fee23803a91bc2a7597aa2ac928cfc43291b7c6cfd89bce7f7fd60d8448603b5c441ff2706f9686e1fa71c56041d0c5377eb1e14ba5c

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\btn_min.png

    Filesize

    103B

    MD5

    2e9c0f6a83184050751c5cb0dfae2397

    SHA1

    f1c3e7a900db6572ac0940b833b1ec30141bc17d

    SHA256

    686967328122f54acd92f85f6c162d42a8f607148f511ec4f7ab41010fc7db66

    SHA512

    03256bfcf0df9e390e1cfa1b4571aece489270d6c72f231db1c0a1d22b9c181a89fb2865810af217956b052eb47f34d5636edef4606074f607203358370ffc90

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\btn_n.png

    Filesize

    1KB

    MD5

    66deff37283bca24ea963ae3a3963b38

    SHA1

    6c2410db0d9d77ed8019c01d68cb9fcdfa93b330

    SHA256

    d9f0859f6a5648b0a9060200cc9a7534161e1b22844f631766e4e3540090790a

    SHA512

    706a5f2b297694f48f623ba3ab9b0cbadd4a48be9d3b619ec76cf0aadf1638134d65a8de492b869573c136665778bfe86133cb9973d47f29f95683c4bb83faa6

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\btn_setup.png

    Filesize

    4KB

    MD5

    212afbaedaa752a5e8957a609a0ae9f1

    SHA1

    73e210e0fdd3ac797e6b30bb57a17f2ddd195002

    SHA256

    d95a68be5109a23db0d0dff20ba3453ca69d39f48f2ae996255b84557a96881b

    SHA512

    b83e22c50f011f2bb42ea6936bd2b776d9371c933119a7aa19181cb2a3f7e050478c8e679410aea39ecc750b408ecf55fd927bad1234fa041a89ebd737ac5061

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\checkboxdeep.png

    Filesize

    351B

    MD5

    3f5325a8962d480ccb89be73e7e054b5

    SHA1

    319e2f9e1c6c681f79265f6b24606574cbbeebbc

    SHA256

    ecfe768ec009c8cb24edb1dd3cfe8a8e8a583fcfc90ec90442ce1c8d59241cdc

    SHA512

    5994ba26c4fdc4ae3a94af2e0e48e3e173c8094fa8b069bfa47b1403ba8283e2ee312f49c308eed2f0d9d244373577244c6d8e4495d4f91f8b6597fff90b4db1

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\license.png

    Filesize

    1KB

    MD5

    8277d98e048ba1adf360d63622f5b0bf

    SHA1

    0bdc270cd963b2b34e919250455062f782052a47

    SHA256

    9a004daa7630d4916c962e681f1a1f95db3ff476fe82272dc937f7ac200683a2

    SHA512

    5b8a354efe4073473a92118027b06d1fe599a422f395fbfa17ce0bf5c3a0cb94c7bfadb1c324e66829ad478e1561200259d32d05514fbaa22f6bbc3a90a8579a

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\loading.png

    Filesize

    89B

    MD5

    589ac6ffe91a177aff97dabe25689011

    SHA1

    36e1bf95b0ddee3359b906aedcd1bdf74dfb646d

    SHA256

    2313bd947e407ccee25c6bcba3c7d45f5c92159950d9d1277d258a293760a732

    SHA512

    688dd947443dcb79a85843ccb845c5ec4a867dbb393e6fc0e4bf5d143faaf8ffc13360d4663aaa37862e30ca8a52f1adbb066c29e893feed8f057fcbd7ca1a98

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\loading_pic.png

    Filesize

    12KB

    MD5

    cd6306a12fc1fcedfa3b58da75386bda

    SHA1

    7ca8035de254c7daa138d4fbab14e3a1045538aa

    SHA256

    a6a1ee3dfe884126494a906cc36fb34f7a75ee0db932e0f4b4507b5cf9851765

    SHA512

    bda08fcfe9ccf5b9ac41adc4b5fd53cb510ad4f89aec611206d5e8125319e99972d6c28aabac4e492927efd9602bca51fdfe8ffaaca886dd224c3c50bf587b1c

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\loadingbk.png

    Filesize

    112B

    MD5

    bc922799a665701140e9f65da9722b61

    SHA1

    6f3248d471ac006145266498e6f0012423bd25c4

    SHA256

    08e0aa5886e0951fa48c3c1d6b6307e542dfcbed8e953c5d685e88433293b652

    SHA512

    b9ca303317906d6e9dd5efc30e10fadb5191725d03bcd7b99a7519409948543fa83f7e85db03428ab7594bbb42c8e598dac447a91e404aa2c31cfc80eeaaa5df

  • C:\Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\xy.png

    Filesize

    11KB

    MD5

    e92f3fbf3876c4044722fd975281b3ff

    SHA1

    d92877cad872663616a48f25af291e8bffb246aa

    SHA256

    31137ad0ef19381e1778eb89b6cb9f70a9ee5244ad943ad494e1e57b18b48ab7

    SHA512

    46fdb373fe54ecf762adcba6a08a0e2e67080d97931fe1407d4f60b74921d9ef7d38ec7104271805635a015ba5230a09e16de60010aecc5c404ae376efddfac7

  • \Program Files (x86)\EagleGet\EagleGet.exe

    Filesize

    2.4MB

    MD5

    3c4dd1443e03ce175a528e12565c0089

    SHA1

    0cf63ef1f19ff607a10e6b28cbcbaccfcdc5fbfd

    SHA256

    4ee513649cdf0925868df4cd7b17e4b67abc0e0a825570ae40ff400e418b4b9b

    SHA512

    ffff0689d476d58372628c197b3f2d64fcdbe9d0ab4af48a4ce88e9d5247367da9bb222a21519608d4ffff956af8b40e487212020a3cb0234f4768f1b72cb730

  • \Program Files (x86)\EagleGet\eagleSniffer.dll

    Filesize

    791KB

    MD5

    8fab5242b8d6da4ed7b41d0bdddfe32c

    SHA1

    d7087dc2c9031624815c4b1e9896f38a53c51193

    SHA256

    25e761477cd01e7e98a0e7cd572a8c07c94af9f3afda33c524c25e4716cf4786

    SHA512

    a483431f0f7b0ddb99339e524661062f8cf207405377965a89226c51745d9e5013f5643deffa3633fc9175899d4f558d4d144857830db141494bc8880e882856

  • \Program Files (x86)\EagleGet\lum_sdk32_clr.dll

    Filesize

    1.4MB

    MD5

    15bf1de003ac5bfd3f5d55f1a01b74d8

    SHA1

    2530f5819e189c19ba98858808053047af2e6bbd

    SHA256

    843c4acbecf80058ea8e089e17e7e3fb0e7482b0ea17f7476dd6bbd292400e98

    SHA512

    d665aaf3c98f33ea1baaaac51f75ba221ae1620c1fb7dc8982d1d664dc568ea9d82281f1c19dc2d29a7d16bc0cf09b814e075e6ea0f21884c39f685a6acdd3bc

  • \Program Files (x86)\EagleGet\net_updater32.exe

    Filesize

    2.0MB

    MD5

    398ae862a545dd10f4ec7103c1dfa846

    SHA1

    37e36747aed074daa7ad6ab4d34cce616acd6bf4

    SHA256

    e58e26c2254eea4a800af5db4384fde23819af4fc3893351a9efc21160bac239

    SHA512

    1652012fc830a8dd4e69d0c9f331d66d1dbb50c50e5da8a3b1813e446938a0dd1e01bc04e36fc45b2863c9409ca4691bdddfc0eceb32cb4e27d76b09db459e94

  • \Program Files (x86)\EagleGet\npEagleget.dll

    Filesize

    1.1MB

    MD5

    054e9138c058522469c15914b6cac191

    SHA1

    3348718abe2975375a3a7edc3e458c66216ae62c

    SHA256

    fa775101b3e3d36934e716cc1718ae1008893d91a344aa94a9d2424092c2266e

    SHA512

    d1e713e7506e67a989e196ad3ad1899599ece192150b79595f68a5df70f30bb2dc3b092f1461a081ddf9fddc69717ce03934e431fbf2271b02eb9c3dcea2d455

  • \Program Files (x86)\EagleGet\unins000.exe

    Filesize

    1.2MB

    MD5

    44d563ac5e67e28730b5bad898bd4518

    SHA1

    775c67f4912fafd639c12c1e38ef4624f54edcd7

    SHA256

    f9ae0a8a53e9d0314b25f92f29892316bb3e228a22173e312a05627bcde1e31f

    SHA512

    3502f35038b1a28b538fb203db0951a2fcf445817c14c4352f76bafe44ffc9066ff66c395c7efaf5290d2d29b566e3b217a48aac98b2fc163a85572a49039d89

  • \Users\Admin\AppData\Local\Temp\is-O94IH.tmp\eagleget-2-1-6-50.tmp

    Filesize

    1.2MB

    MD5

    eb42e5720e09cd014694a22c86929f5e

    SHA1

    b619dccd5e1deb090d8eae6c6bac5e5dae91fdfb

    SHA256

    4dc2d414277e497490d2009f370051298bccaa649d0a335b064269a0bb9bbbf3

    SHA512

    4f5ea3e32f7da75799b8067351a860f6c840dba8108c92d34d4be7d6b811140e6b2dd161ba4bd90df77dff41b74e1e85b536b3776cadb656018a1914acc3ee2f

  • \Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\CallbackCtrl.dll

    Filesize

    4KB

    MD5

    f07e819ba2e46a897cfabf816d7557b2

    SHA1

    8d5fd0a741dd3fd84650e40dd3928ae1f15323cc

    SHA256

    68f42a7823ed7ee88a5c59020ac52d4bbcadf1036611e96e470d986c8faa172d

    SHA512

    7ed26d41ead2ace0b5379639474d319af9a3e4ed2dd9795c018f8c5b9b533fd36bfc1713a1f871789bf14884d186fd0559939de511dde24673b0515165d405af

  • \Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\botva2.dll

    Filesize

    35KB

    MD5

    0177746573eed407f8dca8a9e441aa49

    SHA1

    6b462adf78059d26cbc56b3311e3b97fcb8d05f7

    SHA256

    a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008

    SHA512

    d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a

  • \Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\sqlite3.dll

    Filesize

    596KB

    MD5

    ee7e9a4cb1bc952e356145eb6306a6ee

    SHA1

    e32952efe8daf7c58821cd008ae5169719c0e580

    SHA256

    50f7c306c28a22cd277daffa5d3f28ac7cb4c561b260aa8c4626587f8e82f103

    SHA512

    44fb2e38fd36e860685bad86fde03a9b829c98d4b8fa1bccbc061eb038a9e9031166f2249caeee135d584ee8b9fa1cdf27902ff017dfe6fa7285e75eb1c96c8b

  • \Users\Admin\AppData\Local\Temp\is-UFCSK.tmp\util.dll

    Filesize

    1010KB

    MD5

    192c98cb51f39be053ad5c7e029e75f8

    SHA1

    2fbb285edc39d51a0e56a7ef996c9f67c4b1a015

    SHA256

    a2ef6b8fbf44bc77631d5635b8abedf90db5903b94618753168f5a904ebc5f60

    SHA512

    4b810f8861d037e3581fadb17a7a22f29648eb651d9bbd2827167fdce94975a5eef25d899009286ce6636a59732b6728510b6f9e151ea2d026f764dd1fd5bf2e

  • memory/1504-105-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/1504-431-0x0000000002040000-0x000000000204E000-memory.dmp

    Filesize

    56KB

  • memory/1504-430-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/1504-8-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/1504-54-0x0000000002040000-0x000000000204E000-memory.dmp

    Filesize

    56KB

  • memory/1504-104-0x0000000002040000-0x000000000204E000-memory.dmp

    Filesize

    56KB

  • memory/2012-408-0x0000000001380000-0x0000000001388000-memory.dmp

    Filesize

    32KB

  • memory/2132-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2132-102-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2132-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2252-453-0x00000000057F0000-0x0000000005954000-memory.dmp

    Filesize

    1.4MB

  • memory/2252-454-0x0000000002F30000-0x0000000002FD0000-memory.dmp

    Filesize

    640KB

  • memory/2252-455-0x0000000000A40000-0x0000000000A56000-memory.dmp

    Filesize

    88KB

  • memory/2252-456-0x0000000005680000-0x0000000005728000-memory.dmp

    Filesize

    672KB