| File name: | file_id4649039ids1s.exe |
| Full analysis: | https://app.any.run/tasks/989d1439-bd41-42d2-bf73-a4f90f1ee47d |
| Verdict: | Malicious activity |
| Analysis date: | November 07, 2021, 09:17:14 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | C68370AAA888E311939BF5A86ECAB098 |
| SHA1: | 7A78A6F89E7A14E1A8708840EFAC885CB17B05A6 |
| SHA256: | 18867D0DF4235538A341449ABA7D6281F5009346766D1026AB785C69793514E9 |
| SSDEEP: | 49152:lTcwZvyNlILWmbG7aNpz4gSK7OW2aRETTmSDQdeVuAbO:BcwsCWmbG7aVl72agySkL |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:10:07 15:36:26+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 562688 |
| InitializedDataSize: | 1778176 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x81e12 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 1 |
| InternalName: | - |
| LegalCopyright: | - |
| OriginalFileName: | - |
| ProductName: | - |
| ProductVersion: | 1 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 07-Oct-2021 13:36:26 |
| Detected languages: |
|
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 1.0 |
| InternalName: | - |
| LegalCopyright: | - |
| OriginalFilename: | - |
| ProductName: | - |
| ProductVersion: | 1.0 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000108 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 07-Oct-2021 13:36:26 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00089554 | 0x00089600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.64957 |
.rdata | 0x0008B000 | 0x000241BC | 0x00024200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.62407 |
.data | 0x000B0000 | 0x00004D80 | 0x00001C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.80282 |
.rsrc | 0x000B5000 | 0x001824B0 | 0x00182600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.94496 |
.reloc | 0x00238000 | 0x00009C4C | 0x00009E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.57896 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.22706 | 820 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 5.18073 | 4264 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 5.05232 | 2440 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 4.75162 | 1128 | Latin 1 / Western European | English - United States | RT_ICON |
128 | 2.62308 | 62 | Latin 1 / Western European | English - United States | RT_GROUP_ICON |
129 | 1.67172 | 170 | Latin 1 / Western European | English - United States | UNKNOWN |
HTML | 7.99985 | 1220261 | Latin 1 / Western European | Russian - Russia | ARCHIVE_7Z |
PRELOADER-EN | 7.99585 | 44712 | Latin 1 / Western European | Russian - Russia | ARCHIVE_7Z |
PRELOADER-RU | 7.99605 | 45905 | Latin 1 / Western European | Russian - Russia | ARCHIVE_7Z |
CABUNDLE | 6.0253 | 227153 | Latin 1 / Western European | Russian - Russia | CRT |
ADVAPI32.dll |
COMCTL32.dll |
CRYPT32.dll |
GDI32.dll |
KERNEL32.dll |
MSVCR90.dll |
OLEAUT32.dll |
OPENGL32.dll |
PSAPI.DLL |
SHELL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 276 | C:\Users\admin\MediaGet2\Luminati-m\luminati-m-controller.exe is_switch_on | C:\Users\admin\MediaGet2\Luminati-m\luminati-m-controller.exe | mediaget.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 101 Modules
| |||||||||||||||
| 500 | "C:\Users\admin\MediaGet2\Luminati-m\luminati\net_svc.exe" --report-idle | C:\Users\admin\MediaGet2\Luminati-m\luminati\net_svc.exe | — | net_svc.exe | |||||||||||
User: admin Company: Luminati Networks Ltd. Integrity Level: MEDIUM Description: Luminati SDK Engine Exit code: 0 Version: 1.245.997 Modules
| |||||||||||||||
| 756 | "C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=MediaGet2 --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=1736 /prefetch:8 | C:\Users\admin\MediaGet2\QtWebEngineProcess.exe | mediaget.exe | ||||||||||||
User: admin Company: The Qt Company Ltd. Integrity Level: HIGH Description: C++ Application Development Framework Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| 880 | "C:\Users\admin\MediaGet2\Luminati-m\net_updater32.exe" --install-ui win_mediaget.com --dlg-app-name MediaGet --dlg-tos-link "https://mediaget.com/license" --dlg-benefit-txt "MediaGet (Ad free)" --dlg-logo-link "https://mediaget.com/installer/binaries/mg-icon-400.png" --dlg-not-peer-txt ads --dlg-peer-txt remove_ads | C:\Users\admin\MediaGet2\Luminati-m\net_updater32.exe | lum_inst.tmp | ||||||||||||
User: admin Company: Luminati Networks Ltd. Integrity Level: HIGH Description: Luminati SDK Updater Exit code: 1 Version: 1.240.55 Modules
| |||||||||||||||
| 912 | "C:\Users\admin\MediaGet2\mediaget.exe" --installer | C:\Users\admin\MediaGet2\mediaget.exe | file_id4649039ids1s.exe | ||||||||||||
User: admin Company: MediaGet Integrity Level: HIGH Description: MediaGet torrent client Exit code: 0 Modules
| |||||||||||||||
| 980 | C:\Users\admin\MediaGet2\Luminati-m\test_wpf.exe | C:\Users\admin\MediaGet2\Luminati-m\test_wpf.exe | — | luminati-m-controller.exe | |||||||||||
User: admin Company: Luminati Networks Ltd. Integrity Level: HIGH Description: test_wpf Exit code: 0 Version: 1.240.55 Modules
| |||||||||||||||
| 1240 | C:\Users\admin\MediaGet2\Luminati-m\test_wpf.exe | C:\Users\admin\MediaGet2\Luminati-m\test_wpf.exe | — | net_updater32.exe | |||||||||||
User: SYSTEM Company: Bright Data Ltd. Integrity Level: SYSTEM Description: test_wpf Exit code: 0 Version: 1.260.260 Modules
| |||||||||||||||
| 1436 | "C:\Users\admin\MediaGet2\Luminati-m\net_updater32.exe" --install win_mediaget.com --no-cleanup | C:\Users\admin\MediaGet2\Luminati-m\net_updater32.exe | net_updater32.exe | ||||||||||||
User: admin Company: Luminati Networks Ltd. Integrity Level: HIGH Description: Luminati SDK Updater Exit code: 0 Version: 1.240.55 Modules
| |||||||||||||||
| 1848 | C:\Windows\system32\cmd.exe /d /s /c ""C:/Users/admin/MediaGet2/Luminati-m/luminati/temp/net_updater32.exe" "--install" "win_mediaget.com" "--remote"" | C:\Windows\system32\cmd.exe | — | net_svc.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2000 | "C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2524 /prefetch:1 | C:\Users\admin\MediaGet2\QtWebEngineProcess.exe | — | mediaget.exe | |||||||||||
User: admin Company: The Qt Company Ltd. Integrity Level: LOW Description: C++ Application Development Framework Exit code: 0 Version: 5.15.2.0 Modules
| |||||||||||||||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Media Get LLC\MediaGet2-systemScope\mediaget_info |
| Operation: | write | Name: | hasDownloadedUpdate |
Value: false | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2328) file_id4649039ids1s.exe | Key: | HKEY_CURRENT_USER\Software\MediaGet |
| Operation: | write | Name: | (default) |
Value: C:\Users\admin\MediaGet2\mediaget.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1940E63DBCBF0B5D910855E5C0ABB6C3 | der | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\curl-ca-bundle.crt | text | |
MD5:BE2B0736EA029FFF398559FA7DF4E646 | SHA256:C05A79296D61E3B2A2EBAF5AF476839B976D69A5ACB6F581A667E60E681049A2 | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\archive.7z | compressed | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1940E63DBCBF0B5D910855E5C0ABB6C3 | binary | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img2\cancel-page-new-en.png | image | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\img2\cancel-page-new2-ru.png | image | |
MD5:— | SHA256:— | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\preloader.html | html | |
MD5:99FE6F416A71D610999A774A5931CA60 | SHA256:CD86C3E177C1F5A6AF3D45AD76665F42EA2B45D80821D180B286FAC0F845EE15 | |||
| 2328 | file_id4649039ids1s.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 | der | |
MD5:54E9306F95F32E50CCD58AF19753D929 | SHA256:45F94DCEB18A8F738A26DA09CE4558995A4FE02B971882E8116FC9B59813BB72 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
756 | QtWebEngineProcess.exe | GET | 200 | 142.250.185.163:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
756 | QtWebEngineProcess.exe | GET | 200 | 95.100.153.123:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I | unknown | der | 1.54 Kb | whitelisted |
756 | QtWebEngineProcess.exe | GET | 200 | 142.250.185.163:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D | US | der | 724 b | whitelisted |
756 | QtWebEngineProcess.exe | GET | 200 | 95.100.153.123:80 | http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso | unknown | der | 1.50 Kb | whitelisted |
3336 | net_updater32.exe | GET | 200 | 104.18.30.182:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEB2iSDBvmyYY0ILgln0z02o%3D | US | der | 727 b | whitelisted |
— | — | GET | 200 | 3.94.72.89:80 | http://3.94.72.89:80/myip.json | US | text | 266 b | suspicious |
756 | QtWebEngineProcess.exe | GET | 200 | 142.250.185.163:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEE4I%2FiUGSyiBCgAAAAEQNAg%3D | US | der | 471 b | whitelisted |
3336 | net_updater32.exe | GET | 200 | 151.139.128.14:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D | US | der | 471 b | whitelisted |
756 | QtWebEngineProcess.exe | GET | 200 | 5.45.205.244:80 | http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CECosiqdXosrVzE6LrmbYt3c%3D | RU | der | 1.48 Kb | whitelisted |
756 | QtWebEngineProcess.exe | GET | 200 | 142.250.185.163:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDwz%2Fr0hq6lmQoAAAABEDeb | US | der | 472 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2328 | file_id4649039ids1s.exe | 51.15.43.19:443 | mediaget.com | Online S.a.s. | NL | unknown |
2328 | file_id4649039ids1s.exe | 104.89.32.83:80 | x1.c.lencr.org | Akamai Technologies, Inc. | NL | suspicious |
2328 | file_id4649039ids1s.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
880 | net_updater32.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
1436 | net_updater32.exe | 142.93.74.196:443 | perr.l-err.biz | — | CA | suspicious |
— | — | 142.93.74.196:443 | perr.l-err.biz | — | CA | suspicious |
3336 | net_updater32.exe | 162.125.66.18:443 | www.dropbox.com | Dropbox, Inc. | DE | suspicious |
3336 | net_updater32.exe | 142.93.74.196:443 | perr.l-err.biz | — | CA | suspicious |
912 | mediaget.exe | 142.250.185.78:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
756 | QtWebEngineProcess.exe | 51.158.177.208:443 | mediaget.com | — | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
mediaget.com |
| suspicious |
ctldl.windowsupdate.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |
r3.o.lencr.org |
| shared |
www.dropbox.com |
| shared |
perr.l-err.biz |
| suspicious |
perr.lum-sdk.io |
| suspicious |
clientsdk.lum-sdk.io |
| suspicious |
dht.libtorrent.org |
| suspicious |
router.bittorrent.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
880 | net_updater32.exe | Potential Corporate Privacy Violation | ET POLICY Dropbox.com Offsite File Backup in Use |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
— | — | Potential Corporate Privacy Violation | ET P2P BitTorrent DHT ping request |
— | — | Potential Corporate Privacy Violation | ET P2P Vuze BT UDP Connection (5) |
Process | Message |
|---|---|
mediaget.exe | > __thiscall Application::Application(int &,char *[])
|
mediaget.exe | os version: "6.1.7601v" __ os name: "Windows 7 Version 6.1 (Build 7601: SP 1)"
|
mediaget.exe | > int __thiscall Application::exec(void)
|
mediaget.exe | > __thiscall MediagetServerSettings::MediagetServerSettings(void)
|
mediaget.exe | INSTALL ID: "" _ OLD ID: ""
|
mediaget.exe | reseller - "" installId ""
|
mediaget.exe | > void __thiscall MediagetServerSettings::flushSettings(void)
|