Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe
Resource
win10v2004-20220721-en
General
-
Target
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe
-
Size
1.4MB
-
MD5
3b60e55817d1e61d5b98df195efd79d0
-
SHA1
d61730ba4c43d35de9a5bc13bdabbd0c0a1f4164
-
SHA256
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02b8ba8e65e1081c054cb
-
SHA512
b73e3b2c1d749a7729a9ddab9d77ec57454423d759bea312179dc6d4e62852c0721ba9956da985e7b670bd0d22a1f1bbc353ec739866ff29098bb36f55be46b5
Malware Config
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
redline
https://t.me/insttailer
185.199.224.90:37143
-
auth_value
1e73e022970e3ad55c62cb5010e7599b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline \Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline \Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline \Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline behavioral1/memory/1396-90-0x0000000000B00000-0x0000000000B44000-memory.dmp family_redline behavioral1/memory/2024-89-0x00000000003B0000-0x00000000003F4000-memory.dmp family_redline \Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline behavioral1/memory/1676-92-0x0000000000F90000-0x0000000000FB0000-memory.dmp family_redline behavioral1/memory/1648-97-0x00000000000A0000-0x00000000000D0000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
real.exeF0geI.exenamdoitntn.exeromb_ro.exetag.exesafert44.exekukurzka9000.exepigmo.exenamdoitntn.exeffnameedit.exeEU1.exepid process 1700 real.exe 1052 F0geI.exe 2024 namdoitntn.exe 1792 romb_ro.exe 1676 tag.exe 1396 safert44.exe 784 kukurzka9000.exe 580 pigmo.exe 1868 namdoitntn.exe 1648 ffnameedit.exe 768 EU1.exe -
Loads dropped DLL 29 IoCs
Processes:
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exepigmo.exekukurzka9000.exeRundll32.exeRundll32.exepid process 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe 580 pigmo.exe 580 pigmo.exe 784 kukurzka9000.exe 784 kukurzka9000.exe 784 kukurzka9000.exe 580 pigmo.exe 3688 Rundll32.exe 3688 Rundll32.exe 3688 Rundll32.exe 3688 Rundll32.exe 3672 Rundll32.exe 3672 Rundll32.exe 3672 Rundll32.exe 3672 Rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 10 IoCs
Processes:
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\pigmo.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\romb_ro.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\EU1.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule \Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_1 \Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_2 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_1 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_2 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_1 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c5d59666a0d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "365546484" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7ECDE51-0C59-11ED-AA2A-6ACE15CCDF97} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Processes:
pigmo.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 pigmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 pigmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A pigmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 pigmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 pigmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 pigmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 pigmo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 pigmo.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
namdoitntn.exetag.exesafert44.exenamdoitntn.exeffnameedit.exereal.exepid process 2024 namdoitntn.exe 1676 tag.exe 1396 safert44.exe 1868 namdoitntn.exe 1648 ffnameedit.exe 1700 real.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
namdoitntn.exetag.exesafert44.exenamdoitntn.exeffnameedit.exedescription pid process Token: SeDebugPrivilege 2024 namdoitntn.exe Token: SeDebugPrivilege 1676 tag.exe Token: SeDebugPrivilege 1396 safert44.exe Token: SeDebugPrivilege 1868 namdoitntn.exe Token: SeDebugPrivilege 1648 ffnameedit.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 1928 iexplore.exe 944 iexplore.exe 1168 iexplore.exe 1436 iexplore.exe 1276 iexplore.exe 1116 iexplore.exe 564 iexplore.exe 1828 iexplore.exe 2020 iexplore.exe 280 iexplore.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 280 iexplore.exe 280 iexplore.exe 1436 iexplore.exe 1436 iexplore.exe 1116 iexplore.exe 1116 iexplore.exe 1168 iexplore.exe 1168 iexplore.exe 944 iexplore.exe 944 iexplore.exe 1276 iexplore.exe 1276 iexplore.exe 1828 iexplore.exe 1828 iexplore.exe 2020 iexplore.exe 2020 iexplore.exe 1928 iexplore.exe 1928 iexplore.exe 564 iexplore.exe 564 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exedescription pid process target process PID 760 wrote to memory of 2020 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 2020 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 2020 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 2020 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 280 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 280 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 280 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 280 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1828 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1828 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1828 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1828 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1168 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1168 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1168 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1168 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 944 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 944 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 944 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 944 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1436 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1436 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1436 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1436 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1276 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1276 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1276 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1276 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1116 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1116 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1116 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1116 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe iexplore.exe PID 760 wrote to memory of 1700 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe real.exe PID 760 wrote to memory of 1700 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe real.exe PID 760 wrote to memory of 1700 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe real.exe PID 760 wrote to memory of 1700 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe real.exe PID 760 wrote to memory of 1052 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe F0geI.exe PID 760 wrote to memory of 1052 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe F0geI.exe PID 760 wrote to memory of 1052 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe F0geI.exe PID 760 wrote to memory of 1052 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe F0geI.exe PID 760 wrote to memory of 2024 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe namdoitntn.exe PID 760 wrote to memory of 2024 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe namdoitntn.exe PID 760 wrote to memory of 2024 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe namdoitntn.exe PID 760 wrote to memory of 2024 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe namdoitntn.exe PID 760 wrote to memory of 1792 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe romb_ro.exe PID 760 wrote to memory of 1792 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe romb_ro.exe PID 760 wrote to memory of 1792 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe romb_ro.exe PID 760 wrote to memory of 1792 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe romb_ro.exe PID 760 wrote to memory of 1396 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe safert44.exe PID 760 wrote to memory of 1396 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe safert44.exe PID 760 wrote to memory of 1396 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe safert44.exe PID 760 wrote to memory of 1396 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe safert44.exe PID 760 wrote to memory of 1676 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe tag.exe PID 760 wrote to memory of 1676 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe tag.exe PID 760 wrote to memory of 1676 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe tag.exe PID 760 wrote to memory of 1676 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe tag.exe PID 760 wrote to memory of 784 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe kukurzka9000.exe PID 760 wrote to memory of 784 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe kukurzka9000.exe PID 760 wrote to memory of 784 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe kukurzka9000.exe PID 760 wrote to memory of 784 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe kukurzka9000.exe PID 760 wrote to memory of 580 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe pigmo.exe PID 760 wrote to memory of 580 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe pigmo.exe PID 760 wrote to memory of 580 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe pigmo.exe PID 760 wrote to memory of 580 760 8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe pigmo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe"C:\Users\Admin\AppData\Local\Temp\8b91c310c14c6e5bcb8e8538bf2f65ec8bedf2bbd9d02.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:280 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RchC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nCCJ42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exe"C:\Program Files (x86)\Company\NewProduct\pigmo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\libnspr4.dll,PR_DestroyRWLock3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\clip.dll,PR_DestroyRWLock3⤵
- Loads dropped DLL
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RqCC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RwCC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\EU1.exe"C:\Program Files (x86)\Company\NewProduct\EU1.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
289KB
MD5d2dea6e0a56875cdc586accb454cff71
SHA10563016b8f98516dc637ea66a4d588528dbb029f
SHA256a3dcb2cdc7def8e8d843b7630be027af4c43926d8f5c41d91c61729ef35b3134
SHA512f8c81401111ed6380d0c3e8fb40149c1d739be43bd5e784c4c32808a0a2a5517de99bbe34439f15b0aedab353e3c07398c310330f8a2070c0dae9b2cfd7ddac7
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
173KB
MD5c5acc7e661db592ec6208d6147d5b165
SHA1642f9ab10434a77ed016921401c9361b1bb36639
SHA25698169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d
SHA51292f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
173KB
MD5c5acc7e661db592ec6208d6147d5b165
SHA1642f9ab10434a77ed016921401c9361b1bb36639
SHA25698169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d
SHA51292f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD54bb92f1ae6e62f60d99d305929807c49
SHA1b304564cb3f9a96673d853b5f30c04e7b7898b76
SHA25661767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2
SHA5129bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exeFilesize
59KB
MD570730b152cfc9df1fb3884b52d13135f
SHA1a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b
SHA256bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd
SHA51278016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exeFilesize
59KB
MD570730b152cfc9df1fb3884b52d13135f
SHA1a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b
SHA256bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd
SHA51278016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5cf25b95144c2766ff8d6af9439b77596
SHA1467cfb3e63b9da2b1c03bc712ab08cdb8fa71034
SHA256df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c
SHA512bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD56adc24e326546ccd86472a3d4ccf03db
SHA15094a1723aa4cfdc03cedc7ed64236969b82d588
SHA256c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4
SHA512aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD57073e162a8ab9493aabaebea9ef44460
SHA1cf1d34bd5da0bcb99d0d102fb1858e29b4eeb8db
SHA2564e417fb64e80baa38a143ed53bb0d0af69a34461f98b8ee599f556f01693ea88
SHA512fa1bcb5da712539187aea3d6fc36ddef5270b15c71fb679d83d44f85220504ce89fa62bd2e7a661f69db34cab2b562807019310ca741284cc37f53a5e7c3b8de
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B7EDA1A1-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD548e9612706cde94e7a711baa8fe9852f
SHA1d355db7dc206c932c12683b48293f72ebdff7ddc
SHA25618611fa066104896f38c7ba11855ba687dd7b275d7c7c97179eeb032d3e6bd3e
SHA512f7ecf83db820bea5779996264ce1d1bd4531903b6b7ba4f10aba710e9f9f8a30e4966675b003c6fc49496ae5ec1a4c42f844b749ba808e9e3d24fc580bf73f3a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B7F4A681-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD5ec33950a74f8acb8c0ef367e150613a4
SHA1e89e4ab1e1d84fadaf3db60db3c2252fb708f60b
SHA2563322175891d3d7e4eda770303f2c7f016c3c613a0254bb1424e5d2d836feb8c5
SHA512cc77156c8fb704a36077e4a1cbb0aa049c863625686bc93250043c98570833de221ddb40b8d37aaf8968cae5cb34c49ae9674d1fe1329505e3b5d09070e3ac73
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B7F8C531-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD5ecccd5640e4c9e7485bc943707982c9d
SHA1b78f7927b23d5429db99749fe14a97546521c930
SHA256dc9fda0cedf45d378743f04b3041ee473aa60b19cacc7ad0a795c90e73a02763
SHA5121a0127aed165dd69cb16fb2d85458092e05273ac1d9c6157cc3e2ac1b6d8bb4bf575811ba469f36851e9d873c4ad2ea17131f6da752417973e97ba08195194f1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B8023B11-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD55e9ffaa24371c6e2573c99b13210facd
SHA15c3324d125bec9f977dee3216a5092d99659c959
SHA2561effb45594efe9cafc68adad81e63e411a81ab65eafbd61d8ee81b31be965a38
SHA5128876a5b482483c43711cc890fcee31a15aa66481e0c8ed0d8ef24f866fa5989e01b9b83162b4a0197dcfcce2d7c0de7b92d4e3585ef357c7141545f157155534
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B80BFF11-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
3KB
MD5200f08aff644d9033d35ef5a34cc2b7c
SHA16baf8b775c41a6efc0e52c6342eb0d9af9b146c6
SHA25609d2db46e76417d2a5f6337ef208d69d7a9e9d5240daf275e6055fe59aedec0a
SHA5121fb7e7a8445725b2d01613bf9fb07ae3a16c14a3ce2bcc3d39b1134db337585a8a024e167b708b0637320257dc3979ff59e864724fb7984593dc71c5cfe89ffd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B80BFF11-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD5dbbf8e4ea192bca59dfe964cb0be3694
SHA197d219aa4bc883d6b8453e7e0c23f309d29e8001
SHA2565aa80163d71b5078d6e870cabf9b4d9196851e5dd64e27b33a0de4c62d40a26c
SHA5122cb91fab76e39b9dfdcec7e8a0da904eb1e832649319156a258190c1a9fcc1470346230bf66a33c2bd2f99454eaabe071578b7cfda2eeefddcb34cdc300f6a46
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B90850D1-0C59-11ED-AA2A-6ACE15CCDF97}.datFilesize
5KB
MD544411d9ec8ab4e17d8d8e17d5d771cb0
SHA120b8a33d248e468ecea30a72049a9c8d4fc6fcc1
SHA2560d9004bdb6f9cc2d4394dd6bedc4f18e88166bba488f5b2eda417239bf7a4749
SHA512f27d1d62910cefc0d49dafac330c07d4154dc1f12a5b1ee29384345372cffba1b1657ad0aaafe863dad4b429b0c60761e0b03052bd609b73625c2192bd745d8c
-
C:\Users\Admin\AppData\Local\Temp\clip.dllFilesize
319KB
MD574779254de3128d746451e0fdb3d9fbe
SHA157dd3cea01de9fda0eb1930116e0ef3a18504c87
SHA256918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c
SHA512437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b
-
C:\Users\Admin\AppData\Local\Temp\libnspr4.dllFilesize
584KB
MD545008317b0182ced811ee53cdfb39776
SHA17c4a797840e3aa7a9d6b540d2cf0395dbe87b717
SHA256fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4
SHA51262100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4YQN6L1T.txtFilesize
606B
MD5e1ae5c3d9083039d8fb97fe53c1a366d
SHA11d875d5be2077cd307744ed0469e8af5f11574a8
SHA2569c4c655e712772c2be02fd712b93a0a974f78b68defdbae7e65c5f3cd8f61025
SHA512d66060a1be0e28a1c7bf7a23df44256d456990134d18bad30ee1ff32e3cf19852217cdfb82fe534e5585f336465ab7783bc1b75d5a30434d9261de7665961d46
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
289KB
MD5d2dea6e0a56875cdc586accb454cff71
SHA10563016b8f98516dc637ea66a4d588528dbb029f
SHA256a3dcb2cdc7def8e8d843b7630be027af4c43926d8f5c41d91c61729ef35b3134
SHA512f8c81401111ed6380d0c3e8fb40149c1d739be43bd5e784c4c32808a0a2a5517de99bbe34439f15b0aedab353e3c07398c310330f8a2070c0dae9b2cfd7ddac7
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
289KB
MD5d2dea6e0a56875cdc586accb454cff71
SHA10563016b8f98516dc637ea66a4d588528dbb029f
SHA256a3dcb2cdc7def8e8d843b7630be027af4c43926d8f5c41d91c61729ef35b3134
SHA512f8c81401111ed6380d0c3e8fb40149c1d739be43bd5e784c4c32808a0a2a5517de99bbe34439f15b0aedab353e3c07398c310330f8a2070c0dae9b2cfd7ddac7
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
173KB
MD5c5acc7e661db592ec6208d6147d5b165
SHA1642f9ab10434a77ed016921401c9361b1bb36639
SHA25698169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d
SHA51292f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD54bb92f1ae6e62f60d99d305929807c49
SHA1b304564cb3f9a96673d853b5f30c04e7b7898b76
SHA25661767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2
SHA5129bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD54bb92f1ae6e62f60d99d305929807c49
SHA1b304564cb3f9a96673d853b5f30c04e7b7898b76
SHA25661767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2
SHA5129bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d
-
\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
\Program Files (x86)\Company\NewProduct\pigmo.exeFilesize
59KB
MD570730b152cfc9df1fb3884b52d13135f
SHA1a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b
SHA256bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd
SHA51278016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5cf25b95144c2766ff8d6af9439b77596
SHA1467cfb3e63b9da2b1c03bc712ab08cdb8fa71034
SHA256df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c
SHA512bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5cf25b95144c2766ff8d6af9439b77596
SHA1467cfb3e63b9da2b1c03bc712ab08cdb8fa71034
SHA256df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c
SHA512bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d
-
\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD56adc24e326546ccd86472a3d4ccf03db
SHA15094a1723aa4cfdc03cedc7ed64236969b82d588
SHA256c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4
SHA512aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce
-
\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD56adc24e326546ccd86472a3d4ccf03db
SHA15094a1723aa4cfdc03cedc7ed64236969b82d588
SHA256c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4
SHA512aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce
-
\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
\Users\Admin\AppData\Local\Temp\clip.dllFilesize
319KB
MD574779254de3128d746451e0fdb3d9fbe
SHA157dd3cea01de9fda0eb1930116e0ef3a18504c87
SHA256918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c
SHA512437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b
-
\Users\Admin\AppData\Local\Temp\clip.dllFilesize
319KB
MD574779254de3128d746451e0fdb3d9fbe
SHA157dd3cea01de9fda0eb1930116e0ef3a18504c87
SHA256918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c
SHA512437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b
-
\Users\Admin\AppData\Local\Temp\clip.dllFilesize
319KB
MD574779254de3128d746451e0fdb3d9fbe
SHA157dd3cea01de9fda0eb1930116e0ef3a18504c87
SHA256918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c
SHA512437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b
-
\Users\Admin\AppData\Local\Temp\clip.dllFilesize
319KB
MD574779254de3128d746451e0fdb3d9fbe
SHA157dd3cea01de9fda0eb1930116e0ef3a18504c87
SHA256918e7e08df9d5cdb654e6eab315cd69c81a862f8a7305c445602d06ea0398e9c
SHA512437b2aeb945c0b2234722cca83d00f09de04b0592245304924484327de62c7b8d3e8a64f956e02db39a142b516e60d5dfbddf45a0d036c3fcc17cc52d7344b4b
-
\Users\Admin\AppData\Local\Temp\libnspr4.dllFilesize
584KB
MD545008317b0182ced811ee53cdfb39776
SHA17c4a797840e3aa7a9d6b540d2cf0395dbe87b717
SHA256fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4
SHA51262100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e
-
\Users\Admin\AppData\Local\Temp\libnspr4.dllFilesize
584KB
MD545008317b0182ced811ee53cdfb39776
SHA17c4a797840e3aa7a9d6b540d2cf0395dbe87b717
SHA256fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4
SHA51262100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e
-
\Users\Admin\AppData\Local\Temp\libnspr4.dllFilesize
584KB
MD545008317b0182ced811ee53cdfb39776
SHA17c4a797840e3aa7a9d6b540d2cf0395dbe87b717
SHA256fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4
SHA51262100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e
-
\Users\Admin\AppData\Local\Temp\libnspr4.dllFilesize
584KB
MD545008317b0182ced811ee53cdfb39776
SHA17c4a797840e3aa7a9d6b540d2cf0395dbe87b717
SHA256fa82d0695fabd1b97be3875306cde441ab7acad915be85386e4e5ce05223dab4
SHA51262100595d9af5942e7c87bdbcdc68c34591a8e569a640bcd7416eb7b94ff8d0fd9902bf3a7888415f90b93a29870d844c367128e1f345acfb2a87fc28390489e
-
\Users\Admin\AppData\Local\Temp\nsy18F0.tmp\INetC.dllFilesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsy18F0.tmp\INetC.dllFilesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
\Users\Admin\AppData\Local\Temp\nsy18F0.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
memory/580-84-0x0000000000000000-mapping.dmp
-
memory/760-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB
-
memory/768-100-0x0000000000000000-mapping.dmp
-
memory/784-108-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/784-107-0x00000000005B0000-0x00000000005C5000-memory.dmpFilesize
84KB
-
memory/784-144-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/784-150-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/784-81-0x0000000000000000-mapping.dmp
-
memory/1052-111-0x00000000005DC000-0x00000000005EC000-memory.dmpFilesize
64KB
-
memory/1052-112-0x0000000000220000-0x000000000022E000-memory.dmpFilesize
56KB
-
memory/1052-61-0x0000000000000000-mapping.dmp
-
memory/1052-113-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/1052-109-0x0000000000220000-0x000000000022E000-memory.dmpFilesize
56KB
-
memory/1396-90-0x0000000000B00000-0x0000000000B44000-memory.dmpFilesize
272KB
-
memory/1396-106-0x0000000000470000-0x0000000000476000-memory.dmpFilesize
24KB
-
memory/1396-72-0x0000000000000000-mapping.dmp
-
memory/1648-97-0x00000000000A0000-0x00000000000D0000-memory.dmpFilesize
192KB
-
memory/1648-88-0x0000000000000000-mapping.dmp
-
memory/1676-74-0x0000000000000000-mapping.dmp
-
memory/1676-92-0x0000000000F90000-0x0000000000FB0000-memory.dmpFilesize
128KB
-
memory/1700-57-0x0000000000000000-mapping.dmp
-
memory/1700-153-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/1792-68-0x0000000000000000-mapping.dmp
-
memory/1868-104-0x0000000000380000-0x0000000000386000-memory.dmpFilesize
24KB
-
memory/1868-93-0x0000000000000000-mapping.dmp
-
memory/2024-89-0x00000000003B0000-0x00000000003F4000-memory.dmpFilesize
272KB
-
memory/2024-64-0x0000000000000000-mapping.dmp
-
memory/3672-145-0x0000000010000000-0x0000000010098000-memory.dmpFilesize
608KB
-
memory/3672-130-0x0000000000000000-mapping.dmp
-
memory/3688-146-0x0000000010000000-0x0000000010056000-memory.dmpFilesize
344KB
-
memory/3688-131-0x0000000000000000-mapping.dmp