Analysis

  • max time kernel
    116s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2022 15:41

General

  • Target

    f052acab310330627d5e20b1107b9d76.exe

  • Size

    1.4MB

  • MD5

    f052acab310330627d5e20b1107b9d76

  • SHA1

    6bd331d16fbf5dc132d49458f4649c28ec871c08

  • SHA256

    d294a8bc0b704479728f1db750e69503c7d9623690b5b3fbfd7802c4e0be10b1

  • SHA512

    db3db5b41352f7103db712dd5bc2e60bfcf403290536f7656e89a0498afbf9fccb8dc5be1331f591f37f3c5d858ea0457ba609a08bfdb4d10ad7570b8566eaaf

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

https://t.me/insttailer

C2

185.199.224.90:37143

Attributes
  • auth_value

    1e73e022970e3ad55c62cb5010e7599b

Extracted

Family

redline

Botnet

5076357887

C2

185.87.149.167:31402

Attributes
  • auth_value

    0dfaff60271d374d0c206d19883e06f3

Extracted

Family

privateloader

C2

http://163.123.143.4/proxies.txt

http://193.233.177.215/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

163.123.143.12

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 19 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f052acab310330627d5e20b1107b9d76.exe
    "C:\Users\Admin\AppData\Local\Temp\f052acab310330627d5e20b1107b9d76.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2580
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1528
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2560
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1732
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2648
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:832
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2544
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2572
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RchC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1276
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2628
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:836
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2588
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RqCC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:976
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:976 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2620
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nNrK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:528
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2596
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nzwK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2660
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1636
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1952
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:808
    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      "C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1660
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im romb_ro.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\romb_ro.exe" & del C:\ProgramData\*.dll & exit
        3⤵
          PID:2076
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im romb_ro.exe /f
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4008
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:3200
      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
      • C:\Program Files (x86)\Company\NewProduct\tag.exe
        "C:\Program Files (x86)\Company\NewProduct\tag.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
      • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
        "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1304
      • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
        "C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:676
      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
      • C:\Program Files (x86)\Company\NewProduct\g3rgg.exe
        "C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"
        2⤵
        • Executes dropped EXE
        PID:1628
      • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
        "C:\Program Files (x86)\Company\NewProduct\jshainx.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
      • C:\Program Files (x86)\Company\NewProduct\EU1.exe
        "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
        2⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2088
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c taskkill /im EU1.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\EU1.exe" & del C:\ProgramData\*.dll & exit
          3⤵
            PID:3680
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /im EU1.exe /f
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3912
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 6
              4⤵
              • Delays execution with timeout.exe
              PID:4060

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      3
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Company\NewProduct\EU1.exe
        Filesize

        289KB

        MD5

        61f51370de492e1b8fd565c68aa3141d

        SHA1

        89da629358f5e7fd4da717a15fd72b74869af631

        SHA256

        19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

        SHA512

        8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

      • C:\Program Files (x86)\Company\NewProduct\EU1.exe
        Filesize

        289KB

        MD5

        61f51370de492e1b8fd565c68aa3141d

        SHA1

        89da629358f5e7fd4da717a15fd72b74869af631

        SHA256

        19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

        SHA512

        8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

      • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        290KB

        MD5

        8ab8fc20b7ab8b18bf0f474cc0156523

        SHA1

        21b922f6dcd49b67b5b3abc9603ec90835e7a20d

        SHA256

        b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

        SHA512

        ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

      • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
        Filesize

        173KB

        MD5

        c5acc7e661db592ec6208d6147d5b165

        SHA1

        642f9ab10434a77ed016921401c9361b1bb36639

        SHA256

        98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

        SHA512

        92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

      • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
        Filesize

        173KB

        MD5

        c5acc7e661db592ec6208d6147d5b165

        SHA1

        642f9ab10434a77ed016921401c9361b1bb36639

        SHA256

        98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

        SHA512

        92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

      • C:\Program Files (x86)\Company\NewProduct\g3rgg.exe
        Filesize

        386KB

        MD5

        59be2ebcf6516dd07ee5df8eae402523

        SHA1

        e4e5b949a0c9721e4c89f124750d8a97e4d96c7e

        SHA256

        d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a

        SHA512

        9148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2

      • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
        Filesize

        107KB

        MD5

        b754a7159fff494383d9e7de4709aa53

        SHA1

        a25f172b4ed0b0a567594ad693483c821f2af14d

        SHA256

        4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

        SHA512

        ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

      • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
        Filesize

        107KB

        MD5

        b754a7159fff494383d9e7de4709aa53

        SHA1

        a25f172b4ed0b0a567594ad693483c821f2af14d

        SHA256

        4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

        SHA512

        ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

      • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
        Filesize

        1.1MB

        MD5

        b0d7a19c257498a2ddf4ff73a9b6fbcf

        SHA1

        07233b967c956c3cfd5498c2db6a2251769704ff

        SHA256

        45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

        SHA512

        60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\real.exe
        Filesize

        289KB

        MD5

        cf25b95144c2766ff8d6af9439b77596

        SHA1

        467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

        SHA256

        df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

        SHA512

        bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

      • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
        Filesize

        289KB

        MD5

        e699a82cef03ea485495a78f74af733d

        SHA1

        c5d3719a8a05f27e4f733294b8b89838f204fc64

        SHA256

        206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

        SHA512

        887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

      • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
        Filesize

        289KB

        MD5

        e699a82cef03ea485495a78f74af733d

        SHA1

        c5d3719a8a05f27e4f733294b8b89838f204fc64

        SHA256

        206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

        SHA512

        887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\tag.exe
        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • C:\Program Files (x86)\Company\NewProduct\tag.exe
        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D616F51-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        4KB

        MD5

        af44c0b6accfc63acfa670214f92709f

        SHA1

        cbbb2925edb1e4c509b4432e8eebb9ebbbf56d24

        SHA256

        6bf1d370c6df4b8fdfc0f95622d6d5cde52d869a11542c70dba0a5abe05617a7

        SHA512

        f7a190e2b359ae85015948c501adff8f0b9c8ac6e3b99af86c8a9df29bc0f99a5f589b0dc8ff7d528845874011b100375482fb7ac54621377e700a982e1f5944

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D616F51-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        5KB

        MD5

        f03c8100be715c90027444b3e039f0cd

        SHA1

        2f4f8da64c04480372f220e3ff31f6bb37007b2a

        SHA256

        c9ef7baa8e2e2f1d4a25f4551367763bee87f914ee71ff911312e99c5291ae4b

        SHA512

        03e89cf70b45ec4bd83351000320c88b1015b2d651661eaa3287eaf160f4e637896e5f7f5e6ce25531355d2db5c5f576db762de748ba885871721cb8aebdfd3b

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D642E71-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        5KB

        MD5

        a4582fd8cd43067ab00391b682893ebe

        SHA1

        bb3957d0faa2219a61c1e23bcf93b738a89e8c44

        SHA256

        df7a2bd2339efc0e8c6f3dabd39a33ad7cfd75892239ada144c2dd65e630c0d9

        SHA512

        cc0b7713c354b3119c1e90126cbb6a3ada7b88a4e40bfead5ab00b810f63c4d1277c144af78c0286b6d347394273ddad42da5e2739c1eaea5c8a7c4c7c24cf11

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D660331-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        5KB

        MD5

        10a9a0519cc70ec07c2edfac554a5025

        SHA1

        d42353fb2771d6e4b8b7767df07939e3ec5e2630

        SHA256

        f374740bab9d0e41e64efd86840191744a63af6c6c83708b204ca4011c2bc793

        SHA512

        1601c5b42983f59fe20e112c156879127a176e98d879c213b237449681ac2e766da8e8dec859dcbe849cee0fafad44203188acc7c7b01a46e8233535c6d9869f

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D6BCF91-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        3KB

        MD5

        7e81674ce89e98b42c6993d0ed2a47ea

        SHA1

        c0086477182f2f8662fd7c1110cd3ffd80e5a39e

        SHA256

        f064ee103e7408ad5b5059e01a440558d0dc84695916f29a5f3e43fbf9a3ae49

        SHA512

        0319256a5cdf9aa4597c5128747bfd119e7b0ddeb60f886785b0d13945cef70308dbf88e2485a973268e5e393f534d46bc26da469f4ffece460c910ab52c667d

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D6BCF91-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        5KB

        MD5

        9a95ab899448e518641ae8d9ba8f3be4

        SHA1

        38bd32dd7322229d6d87ff01d807251261a19246

        SHA256

        74e5e179e49c704e2651c9b5003a7dc431d6ffe9057451482b5708c2167151a2

        SHA512

        af1b2f1de7de15cb5451acb9a0436de7a38648462d86c6071683e40305a04e0a3a324debe8276e1d64c5df8759697ce5eb11c64aa045cd189a75b6e17a374b41

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D706371-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        5KB

        MD5

        122ddeeed158bfaf4b1936daa5fe2b56

        SHA1

        01c33df498645832b1a23ad0a5ad32dadb4630b3

        SHA256

        34c09fbadaffe1882ab7b4c03b460830aeb81ef7723a18a28cfc55b818177b81

        SHA512

        c108d6590fbf3756169709bf8db22492914e43fc29eb09214f8c6d7a5827e22443779f9af0e7f13d161b7b5c8b73cb3bc0572f21c2ddd36b313eb7b211428b73

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D754571-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        3KB

        MD5

        93e65a92204d5c5df802a90d135885c5

        SHA1

        1e865ad8333a29a3502f4aa77180566d66e585dc

        SHA256

        171cc3479321924cf15066d28732379c742a4c0f471e42a1d517fb4ccc4cd62c

        SHA512

        87e335de95f5564e79c5d4b0c564881ba86916fe5b32e8844ef5fe97ff0d4f1ba29048d083a8ae2225a2a754b7d280bd11849bcf6b71e57b31f4be440ac69092

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5D796421-0CF9-11ED-BB29-F6E2865B1FA7}.dat
        Filesize

        3KB

        MD5

        fdfce65522644643c3767424e093e152

        SHA1

        29dfb352aa8b3aa9e36520a72663e6d7ccc5fcb1

        SHA256

        308f7650249f6d74add5dbafd9308b4349eaf0e4754be00625b9cf1b02257e81

        SHA512

        7b076ca91fccf3f54bcaa20e4d4d2ab45e5a35d15b98ddfc3a640e4451962f9eaafd06bdb49417c54724531733b72b58ff14f5feebab4ed61f37b8ca42c3f297

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V3XBWORX.txt
        Filesize

        606B

        MD5

        0df6dc0f2f9c38de0301b5260c3f1d11

        SHA1

        705ababc9ab57bbd99b2da5747125b6c89bb16f9

        SHA256

        5ff2993731d18f3b6bfe818f73bad3969db5e04ca9963c6ebe0f92e8e833425f

        SHA512

        7e7a598e8a111eac02553564576e8c4b613270cae59cf48213a836b73659a82dbf60bf1d82fbfecc869201b363b07ed2285522a7d1ef3f9e3a69edc3892d7318

      • \Program Files (x86)\Company\NewProduct\EU1.exe
        Filesize

        289KB

        MD5

        61f51370de492e1b8fd565c68aa3141d

        SHA1

        89da629358f5e7fd4da717a15fd72b74869af631

        SHA256

        19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

        SHA512

        8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

      • \Program Files (x86)\Company\NewProduct\EU1.exe
        Filesize

        289KB

        MD5

        61f51370de492e1b8fd565c68aa3141d

        SHA1

        89da629358f5e7fd4da717a15fd72b74869af631

        SHA256

        19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

        SHA512

        8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

      • \Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        290KB

        MD5

        8ab8fc20b7ab8b18bf0f474cc0156523

        SHA1

        21b922f6dcd49b67b5b3abc9603ec90835e7a20d

        SHA256

        b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

        SHA512

        ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

      • \Program Files (x86)\Company\NewProduct\F0geI.exe
        Filesize

        290KB

        MD5

        8ab8fc20b7ab8b18bf0f474cc0156523

        SHA1

        21b922f6dcd49b67b5b3abc9603ec90835e7a20d

        SHA256

        b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

        SHA512

        ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

      • \Program Files (x86)\Company\NewProduct\ffnameedit.exe
        Filesize

        173KB

        MD5

        c5acc7e661db592ec6208d6147d5b165

        SHA1

        642f9ab10434a77ed016921401c9361b1bb36639

        SHA256

        98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

        SHA512

        92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

      • \Program Files (x86)\Company\NewProduct\g3rgg.exe
        Filesize

        386KB

        MD5

        59be2ebcf6516dd07ee5df8eae402523

        SHA1

        e4e5b949a0c9721e4c89f124750d8a97e4d96c7e

        SHA256

        d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a

        SHA512

        9148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2

      • \Program Files (x86)\Company\NewProduct\jshainx.exe
        Filesize

        107KB

        MD5

        b754a7159fff494383d9e7de4709aa53

        SHA1

        a25f172b4ed0b0a567594ad693483c821f2af14d

        SHA256

        4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

        SHA512

        ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

      • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
        Filesize

        1.1MB

        MD5

        b0d7a19c257498a2ddf4ff73a9b6fbcf

        SHA1

        07233b967c956c3cfd5498c2db6a2251769704ff

        SHA256

        45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

        SHA512

        60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

      • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
        Filesize

        1.1MB

        MD5

        b0d7a19c257498a2ddf4ff73a9b6fbcf

        SHA1

        07233b967c956c3cfd5498c2db6a2251769704ff

        SHA256

        45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

        SHA512

        60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

      • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • \Program Files (x86)\Company\NewProduct\real.exe
        Filesize

        289KB

        MD5

        cf25b95144c2766ff8d6af9439b77596

        SHA1

        467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

        SHA256

        df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

        SHA512

        bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

      • \Program Files (x86)\Company\NewProduct\real.exe
        Filesize

        289KB

        MD5

        cf25b95144c2766ff8d6af9439b77596

        SHA1

        467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

        SHA256

        df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

        SHA512

        bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

      • \Program Files (x86)\Company\NewProduct\romb_ro.exe
        Filesize

        289KB

        MD5

        e699a82cef03ea485495a78f74af733d

        SHA1

        c5d3719a8a05f27e4f733294b8b89838f204fc64

        SHA256

        206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

        SHA512

        887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

      • \Program Files (x86)\Company\NewProduct\romb_ro.exe
        Filesize

        289KB

        MD5

        e699a82cef03ea485495a78f74af733d

        SHA1

        c5d3719a8a05f27e4f733294b8b89838f204fc64

        SHA256

        206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

        SHA512

        887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

      • \Program Files (x86)\Company\NewProduct\safert44.exe
        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • \Program Files (x86)\Company\NewProduct\tag.exe
        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • \Users\Admin\AppData\LocalLow\mozglue.dll
        Filesize

        612KB

        MD5

        f07d9977430e762b563eaadc2b94bbfa

        SHA1

        da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

        SHA256

        4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

        SHA512

        6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

      • \Users\Admin\AppData\LocalLow\nss3.dll
        Filesize

        1.9MB

        MD5

        f67d08e8c02574cbc2f1122c53bfb976

        SHA1

        6522992957e7e4d074947cad63189f308a80fcf2

        SHA256

        c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

        SHA512

        2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

      • \Users\Admin\AppData\LocalLow\sqlite3.dll
        Filesize

        1.0MB

        MD5

        dbf4f8dcefb8056dc6bae4b67ff810ce

        SHA1

        bbac1dd8a07c6069415c04b62747d794736d0689

        SHA256

        47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

        SHA512

        b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

      • memory/676-91-0x00000000003E0000-0x0000000000410000-memory.dmp
        Filesize

        192KB

      • memory/676-87-0x0000000000000000-mapping.dmp
      • memory/808-64-0x0000000000000000-mapping.dmp
      • memory/808-108-0x0000000000420000-0x0000000000426000-memory.dmp
        Filesize

        24KB

      • memory/808-73-0x0000000000180000-0x00000000001C4000-memory.dmp
        Filesize

        272KB

      • memory/1096-98-0x0000000000000000-mapping.dmp
      • memory/1096-102-0x0000000000F40000-0x0000000000F60000-memory.dmp
        Filesize

        128KB

      • memory/1204-54-0x0000000076231000-0x0000000076233000-memory.dmp
        Filesize

        8KB

      • memory/1304-115-0x0000000000400000-0x0000000000522000-memory.dmp
        Filesize

        1.1MB

      • memory/1304-84-0x0000000000000000-mapping.dmp
      • memory/1304-114-0x0000000002AE0000-0x0000000002AF5000-memory.dmp
        Filesize

        84KB

      • memory/1304-186-0x0000000000400000-0x0000000000522000-memory.dmp
        Filesize

        1.1MB

      • memory/1304-160-0x0000000000400000-0x0000000000522000-memory.dmp
        Filesize

        1.1MB

      • memory/1480-81-0x0000000000260000-0x00000000002A4000-memory.dmp
        Filesize

        272KB

      • memory/1480-72-0x0000000000000000-mapping.dmp
      • memory/1480-109-0x0000000000240000-0x0000000000246000-memory.dmp
        Filesize

        24KB

      • memory/1628-125-0x00000000005CC000-0x00000000005F2000-memory.dmp
        Filesize

        152KB

      • memory/1628-185-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/1628-127-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/1628-95-0x0000000000000000-mapping.dmp
      • memory/1628-126-0x0000000000230000-0x0000000000289000-memory.dmp
        Filesize

        356KB

      • memory/1628-184-0x00000000005CC000-0x00000000005F2000-memory.dmp
        Filesize

        152KB

      • memory/1636-57-0x0000000000000000-mapping.dmp
      • memory/1660-69-0x0000000000000000-mapping.dmp
      • memory/1920-78-0x0000000000F60000-0x0000000000F80000-memory.dmp
        Filesize

        128KB

      • memory/1920-75-0x0000000000000000-mapping.dmp
      • memory/1952-113-0x0000000000400000-0x0000000000454000-memory.dmp
        Filesize

        336KB

      • memory/1952-112-0x0000000000230000-0x000000000023E000-memory.dmp
        Filesize

        56KB

      • memory/1952-111-0x000000000061C000-0x000000000062C000-memory.dmp
        Filesize

        64KB

      • memory/1952-61-0x0000000000000000-mapping.dmp
      • memory/2028-88-0x0000000000000000-mapping.dmp
      • memory/2076-180-0x0000000000000000-mapping.dmp
      • memory/2088-135-0x0000000060900000-0x0000000060992000-memory.dmp
        Filesize

        584KB

      • memory/2088-105-0x0000000000000000-mapping.dmp
      • memory/3200-182-0x0000000000000000-mapping.dmp
      • memory/3680-154-0x0000000000000000-mapping.dmp
      • memory/3912-158-0x0000000000000000-mapping.dmp
      • memory/4008-181-0x0000000000000000-mapping.dmp
      • memory/4060-159-0x0000000000000000-mapping.dmp