Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 22:22

General

  • Target

    9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe

  • Size

    1.4MB

  • MD5

    48d01d98ec485e09f5f93be69a3bcdab

  • SHA1

    b9c8c101e77e285d1b93a7675d6a8e2e31c4fac2

  • SHA256

    9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10

  • SHA512

    7fdb4382018d8b12f8b296ffeb13c4fe9d789b5abde04fde87243f0b20d9c82019dd042d38834de2e0f757197c8678a82597b667ca031ac7679213d8814d2185

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

vidar

Version

53.3

Botnet

1455

C2

https://t.me/proabudabi

Attributes
  • profile_id

    1455

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 27 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe
    "C:\Users\Admin\AppData\Local\Temp\9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1904
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2352
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1280
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2376
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2424
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1348
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2360
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RchC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1408
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1408 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2384
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1240
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2368
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nCCJ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2432
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RiLC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1332
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1332 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2392
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2032
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:376
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1592
    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      "C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:436
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im romb_ro.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\romb_ro.exe" & del C:\ProgramData\*.dll & exit
        3⤵
          PID:3508
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im romb_ro.exe /f
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3552
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:3608
      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
      • C:\Program Files (x86)\Company\NewProduct\tag.exe
        "C:\Program Files (x86)\Company\NewProduct\tag.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:240
      • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
        "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
        2⤵
        • Executes dropped EXE
        PID:1748
      • C:\Program Files (x86)\Company\NewProduct\pigmo.exe
        "C:\Program Files (x86)\Company\NewProduct\pigmo.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        PID:1492
        • C:\Windows\SysWOW64\Rundll32.exe
          Rundll32.exe C:\Users\Admin\AppData\Local\Temp\libnspr4.dll,PR_DestroyRWLock
          3⤵
          • Loads dropped DLL
          PID:3756
        • C:\Windows\SysWOW64\Rundll32.exe
          Rundll32.exe C:\Users\Admin\AppData\Local\Temp\clip.dll,PR_DestroyRWLock
          3⤵
          • Loads dropped DLL
          PID:3768
      • C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe
        "C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe"
        2⤵
        • Executes dropped EXE
        PID:1928
      • C:\Program Files (x86)\Company\NewProduct\USA1.exe
        "C:\Program Files (x86)\Company\NewProduct\USA1.exe"
        2⤵
        • Executes dropped EXE
        PID:588

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • C:\Program Files (x86)\Company\NewProduct\USA1.exe
      Filesize

      289KB

      MD5

      88cd972f3dd0b2e4288276d1be359f23

      SHA1

      d399895b0193cfb903dd6edc6f15bc8f6afdebec

      SHA256

      7519f74f46204d75acc6aef962c40885b49d1a4572d4215aec1bce96417c1743

      SHA512

      3eea0b9d18644740bbf4b541cf051c2bd797ad805118f90ed91fac2e173ed5fc4c5cc26ebd5334d58020e41b6385f693269df8fc637d53e3436b96ec99f3320c

    • C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe
      Filesize

      290KB

      MD5

      3edc9ccbc5593e1b9a28c58e0f62e950

      SHA1

      169913831e1864ea24800bd74a5175e9caf8cba4

      SHA256

      8de5ec8cd5e2a45bb17544e9974d87ab140514e3852284d0c07534b7d39d923d

      SHA512

      8c503af6fd91f6ee3f045c4b5ab2f77d6c492ed563d535af09edc8c80e695fa0c9180ad9e42f149f93f69017115726fbfd0e3b7c2bd2eed93791b8742a7a8ab4

    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.5MB

      MD5

      4bb92f1ae6e62f60d99d305929807c49

      SHA1

      b304564cb3f9a96673d853b5f30c04e7b7898b76

      SHA256

      61767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2

      SHA512

      9bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\pigmo.exe
      Filesize

      59KB

      MD5

      70730b152cfc9df1fb3884b52d13135f

      SHA1

      a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b

      SHA256

      bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd

      SHA512

      78016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903

    • C:\Program Files (x86)\Company\NewProduct\pigmo.exe
      Filesize

      59KB

      MD5

      70730b152cfc9df1fb3884b52d13135f

      SHA1

      a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b

      SHA256

      bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd

      SHA512

      78016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903

    • C:\Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      6adc24e326546ccd86472a3d4ccf03db

      SHA1

      5094a1723aa4cfdc03cedc7ed64236969b82d588

      SHA256

      c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4

      SHA512

      aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce

    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      6adc24e326546ccd86472a3d4ccf03db

      SHA1

      5094a1723aa4cfdc03cedc7ed64236969b82d588

      SHA256

      c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4

      SHA512

      aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      340B

      MD5

      5e1b1f2cc186bda0cfc7fba732ac8401

      SHA1

      97452c20c9d93b8e97019a1f8e34730a83f8753f

      SHA256

      5afb532f00f8c485613631c73cdba591b2f195e472895773c9f26c5522bd22b4

      SHA512

      cbf5d0f3ded83d2f1ff3cc2f2d6df83889b719e9468b9a6062529d64772155687db75ece1f2183ed108efbba742a19233f01388cd46b8e153fd26aa1ce726d3e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C86A6751-0C79-11ED-89C9-FEC1DD9ACD16}.dat
      Filesize

      5KB

      MD5

      35e5e7e14217112d17576d05cf157d2e

      SHA1

      f81e0b5c1349265ac1734de5172f9f32c84e8788

      SHA256

      335c056f2e0dc0c4d86030276b37703e0ccac3c4c0f074dbae9012e13c6f7fcc

      SHA512

      a5c6ea7b8f1be54647f83e61d5f7baef47e2a12ab60219053260764aeec173b2d676d16c153b17b050bd122cc5cb4a0249475d1540a1e67adf09851a7990a056

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C86AB571-0C79-11ED-89C9-FEC1DD9ACD16}.dat
      Filesize

      5KB

      MD5

      153f747a0402250cdd6f1e49232be8e6

      SHA1

      9ca2ba16138d58de1e8031fb47ef8ec1356d9a3f

      SHA256

      8235ccda096577b7d5247980532c7251df51e1f79395f25b3e7a6d62713a19ea

      SHA512

      a042e16439571c28f33b25aada816105472328c81f0ba55a09cf1b0ac5febcd93513805a785d71149298652eb9314480707741a98296588d72cfff1107f144c7

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C877D4D1-0C79-11ED-89C9-FEC1DD9ACD16}.dat
      Filesize

      3KB

      MD5

      9ade87ed90d3cd89c16be966942728b9

      SHA1

      87de4572b893c3c1ccb3640f2c288167a49b696f

      SHA256

      f88fe5f8b64a7b5370b4a006d6dfc28d0de8f539e17d4ec71310b538aeda6d4a

      SHA512

      8c6c94e94861ae43706dc7d800ddf43424316725358ec406f09723a076a4e51e6cc239d787c66541215ef68f0ddeaacb68709eda32e78b19cdb1d95433395ab8

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C87822F1-0C79-11ED-89C9-FEC1DD9ACD16}.dat
      Filesize

      5KB

      MD5

      f43dbdedc8deae16ae80bc05dc59e88a

      SHA1

      aa0c9733580fe1f0bdd94c23e21326b116e83655

      SHA256

      6db389ad82de2ca5b34b8be49b0df2ac1718548a87cc66684ca5bf08c244dd75

      SHA512

      f4556914dbd3f815cd618ecad652ac996528942d3a97691133221fe89937eb78c076a133aa242bd9b4bfe387c3a39d1ce4beee0419e6517eb07ea413fd1fc924

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C8790D51-0C79-11ED-89C9-FEC1DD9ACD16}.dat
      Filesize

      5KB

      MD5

      c1aefd39fda4d90d3cd20fc775163431

      SHA1

      058aee41cc61c2cd7636863ce353c45ab84d2a99

      SHA256

      145073e2eac7b1b772de226e39028a0e75fed64315fae5d615251dbabd5b69ad

      SHA512

      02dddc1bf65010588d90e0bd3ca5e7a119baac9d7896a0305904f4358740f543100a4db94b68c1963e594101529294376b41b0dca3db195bb294c76a8e37fceb

    • C:\Users\Admin\AppData\Local\Temp\clip.dll
      Filesize

      319KB

      MD5

      74779254de3128d746451e0fdb3d9fbe

      SHA1

      57dd3cea01de9fda0eb1930116e0ef3a18504c87

      SHA256

      918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c

      SHA512

      437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b

    • C:\Users\Admin\AppData\Local\Temp\libnspr4.dll
      Filesize

      584KB

      MD5

      45008317b0182ced811ee53cdfb39776

      SHA1

      7c4a797840e3aa7a9d6b540d2cf0395dbe87b717

      SHA256

      fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4

      SHA512

      62100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JSGYBMHK.txt
      Filesize

      607B

      MD5

      81127ad326b9d186c4465db30fb4c578

      SHA1

      6399d1a9c2d35c726650dd897111beb91466aff9

      SHA256

      ee906c9d8cdd4c6cb3801f43a08d761ffd33bdf8684257f0903b1b38718efb32

      SHA512

      222133cb57cd99d1dbad31956917d9001bbce3df0dae6bf64c89f4a3099311f1ddc44a520b30c583be890e4cd1455c4ddb8121851abf618f4db77baa1d435dda

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • \Program Files (x86)\Company\NewProduct\USA1.exe
      Filesize

      289KB

      MD5

      88cd972f3dd0b2e4288276d1be359f23

      SHA1

      d399895b0193cfb903dd6edc6f15bc8f6afdebec

      SHA256

      7519f74f46204d75acc6aef962c40885b49d1a4572d4215aec1bce96417c1743

      SHA512

      3eea0b9d18644740bbf4b541cf051c2bd797ad805118f90ed91fac2e173ed5fc4c5cc26ebd5334d58020e41b6385f693269df8fc637d53e3436b96ec99f3320c

    • \Program Files (x86)\Company\NewProduct\USA1.exe
      Filesize

      289KB

      MD5

      88cd972f3dd0b2e4288276d1be359f23

      SHA1

      d399895b0193cfb903dd6edc6f15bc8f6afdebec

      SHA256

      7519f74f46204d75acc6aef962c40885b49d1a4572d4215aec1bce96417c1743

      SHA512

      3eea0b9d18644740bbf4b541cf051c2bd797ad805118f90ed91fac2e173ed5fc4c5cc26ebd5334d58020e41b6385f693269df8fc637d53e3436b96ec99f3320c

    • \Program Files (x86)\Company\NewProduct\hAphAsh.exe
      Filesize

      290KB

      MD5

      3edc9ccbc5593e1b9a28c58e0f62e950

      SHA1

      169913831e1864ea24800bd74a5175e9caf8cba4

      SHA256

      8de5ec8cd5e2a45bb17544e9974d87ab140514e3852284d0c07534b7d39d923d

      SHA512

      8c503af6fd91f6ee3f045c4b5ab2f77d6c492ed563d535af09edc8c80e695fa0c9180ad9e42f149f93f69017115726fbfd0e3b7c2bd2eed93791b8742a7a8ab4

    • \Program Files (x86)\Company\NewProduct\hAphAsh.exe
      Filesize

      290KB

      MD5

      3edc9ccbc5593e1b9a28c58e0f62e950

      SHA1

      169913831e1864ea24800bd74a5175e9caf8cba4

      SHA256

      8de5ec8cd5e2a45bb17544e9974d87ab140514e3852284d0c07534b7d39d923d

      SHA512

      8c503af6fd91f6ee3f045c4b5ab2f77d6c492ed563d535af09edc8c80e695fa0c9180ad9e42f149f93f69017115726fbfd0e3b7c2bd2eed93791b8742a7a8ab4

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.5MB

      MD5

      4bb92f1ae6e62f60d99d305929807c49

      SHA1

      b304564cb3f9a96673d853b5f30c04e7b7898b76

      SHA256

      61767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2

      SHA512

      9bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.5MB

      MD5

      4bb92f1ae6e62f60d99d305929807c49

      SHA1

      b304564cb3f9a96673d853b5f30c04e7b7898b76

      SHA256

      61767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2

      SHA512

      9bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d

    • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • \Program Files (x86)\Company\NewProduct\pigmo.exe
      Filesize

      59KB

      MD5

      70730b152cfc9df1fb3884b52d13135f

      SHA1

      a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b

      SHA256

      bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd

      SHA512

      78016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • \Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      6adc24e326546ccd86472a3d4ccf03db

      SHA1

      5094a1723aa4cfdc03cedc7ed64236969b82d588

      SHA256

      c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4

      SHA512

      aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce

    • \Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      6adc24e326546ccd86472a3d4ccf03db

      SHA1

      5094a1723aa4cfdc03cedc7ed64236969b82d588

      SHA256

      c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4

      SHA512

      aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce

    • \Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • \Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • \Users\Admin\AppData\Local\Temp\clip.dll
      Filesize

      319KB

      MD5

      74779254de3128d746451e0fdb3d9fbe

      SHA1

      57dd3cea01de9fda0eb1930116e0ef3a18504c87

      SHA256

      918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c

      SHA512

      437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b

    • \Users\Admin\AppData\Local\Temp\clip.dll
      Filesize

      319KB

      MD5

      74779254de3128d746451e0fdb3d9fbe

      SHA1

      57dd3cea01de9fda0eb1930116e0ef3a18504c87

      SHA256

      918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c

      SHA512

      437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b

    • \Users\Admin\AppData\Local\Temp\clip.dll
      Filesize

      319KB

      MD5

      74779254de3128d746451e0fdb3d9fbe

      SHA1

      57dd3cea01de9fda0eb1930116e0ef3a18504c87

      SHA256

      918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c

      SHA512

      437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b

    • \Users\Admin\AppData\Local\Temp\clip.dll
      Filesize

      319KB

      MD5

      74779254de3128d746451e0fdb3d9fbe

      SHA1

      57dd3cea01de9fda0eb1930116e0ef3a18504c87

      SHA256

      918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c

      SHA512

      437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b

    • \Users\Admin\AppData\Local\Temp\libnspr4.dll
      Filesize

      584KB

      MD5

      45008317b0182ced811ee53cdfb39776

      SHA1

      7c4a797840e3aa7a9d6b540d2cf0395dbe87b717

      SHA256

      fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4

      SHA512

      62100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e

    • \Users\Admin\AppData\Local\Temp\libnspr4.dll
      Filesize

      584KB

      MD5

      45008317b0182ced811ee53cdfb39776

      SHA1

      7c4a797840e3aa7a9d6b540d2cf0395dbe87b717

      SHA256

      fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4

      SHA512

      62100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e

    • \Users\Admin\AppData\Local\Temp\libnspr4.dll
      Filesize

      584KB

      MD5

      45008317b0182ced811ee53cdfb39776

      SHA1

      7c4a797840e3aa7a9d6b540d2cf0395dbe87b717

      SHA256

      fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4

      SHA512

      62100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e

    • \Users\Admin\AppData\Local\Temp\libnspr4.dll
      Filesize

      584KB

      MD5

      45008317b0182ced811ee53cdfb39776

      SHA1

      7c4a797840e3aa7a9d6b540d2cf0395dbe87b717

      SHA256

      fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4

      SHA512

      62100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e

    • \Users\Admin\AppData\Local\Temp\nso1BBE.tmp\INetC.dll
      Filesize

      21KB

      MD5

      2b342079303895c50af8040a91f30f71

      SHA1

      b11335e1cb8356d9c337cb89fe81d669a69de17e

      SHA256

      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

      SHA512

      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

    • \Users\Admin\AppData\Local\Temp\nso1BBE.tmp\INetC.dll
      Filesize

      21KB

      MD5

      2b342079303895c50af8040a91f30f71

      SHA1

      b11335e1cb8356d9c337cb89fe81d669a69de17e

      SHA256

      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

      SHA512

      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

    • \Users\Admin\AppData\Local\Temp\nso1BBE.tmp\System.dll
      Filesize

      11KB

      MD5

      fbe295e5a1acfbd0a6271898f885fe6a

      SHA1

      d6d205922e61635472efb13c2bb92c9ac6cb96da

      SHA256

      a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

      SHA512

      2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

    • memory/240-76-0x0000000000000000-mapping.dmp
    • memory/240-103-0x0000000000990000-0x00000000009B0000-memory.dmp
      Filesize

      128KB

    • memory/376-101-0x0000000000220000-0x000000000022E000-memory.dmp
      Filesize

      56KB

    • memory/376-61-0x0000000000000000-mapping.dmp
    • memory/376-166-0x000000000053C000-0x000000000054C000-memory.dmp
      Filesize

      64KB

    • memory/376-102-0x0000000000400000-0x0000000000454000-memory.dmp
      Filesize

      336KB

    • memory/376-100-0x000000000053C000-0x000000000054C000-memory.dmp
      Filesize

      64KB

    • memory/376-118-0x000000000053C000-0x000000000054C000-memory.dmp
      Filesize

      64KB

    • memory/376-119-0x0000000000400000-0x0000000000454000-memory.dmp
      Filesize

      336KB

    • memory/436-124-0x0000000060900000-0x0000000060992000-memory.dmp
      Filesize

      584KB

    • memory/436-68-0x0000000000000000-mapping.dmp
    • memory/588-92-0x0000000000000000-mapping.dmp
    • memory/1492-83-0x0000000000000000-mapping.dmp
    • memory/1592-109-0x0000000000340000-0x0000000000346000-memory.dmp
      Filesize

      24KB

    • memory/1592-104-0x0000000000A00000-0x0000000000A44000-memory.dmp
      Filesize

      272KB

    • memory/1592-64-0x0000000000000000-mapping.dmp
    • memory/1616-54-0x00000000758B1000-0x00000000758B3000-memory.dmp
      Filesize

      8KB

    • memory/1748-80-0x0000000000000000-mapping.dmp
    • memory/1748-106-0x00000000005B0000-0x00000000005C5000-memory.dmp
      Filesize

      84KB

    • memory/1748-107-0x0000000000400000-0x000000000058B000-memory.dmp
      Filesize

      1.5MB

    • memory/1928-88-0x0000000000000000-mapping.dmp
    • memory/2000-108-0x0000000000210000-0x0000000000216000-memory.dmp
      Filesize

      24KB

    • memory/2000-105-0x00000000001C0000-0x0000000000204000-memory.dmp
      Filesize

      272KB

    • memory/2000-71-0x0000000000000000-mapping.dmp
    • memory/2032-57-0x0000000000000000-mapping.dmp
    • memory/3508-143-0x0000000000000000-mapping.dmp
    • memory/3552-144-0x0000000000000000-mapping.dmp
    • memory/3608-145-0x0000000000000000-mapping.dmp
    • memory/3756-147-0x0000000000000000-mapping.dmp
    • memory/3756-162-0x0000000010000000-0x0000000010098000-memory.dmp
      Filesize

      608KB

    • memory/3768-163-0x0000000010000000-0x0000000010056000-memory.dmp
      Filesize

      344KB

    • memory/3768-148-0x0000000000000000-mapping.dmp