Analysis

  • max time kernel
    113s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2022 01:46

General

  • Target

    972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de.exe

  • Size

    2.4MB

  • MD5

    4d9abf7905ad423200a067568f45a2e6

  • SHA1

    a19937f1b03ccd9575478369a5666c04080241dd

  • SHA256

    972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de

  • SHA512

    10db66702b4c8fd375957cda8b9657bf9a5bd184c9b9b232b6e2ade62d841dd9fcac91cb1d88819ef23b6b680f946a72951a6099d9718e72e1993059b5994ba7

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://77.73.132.84

rc4.plain

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de.exe
    "C:\Users\Admin\AppData\Local\Temp\972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A3PL4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:984 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2104
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2144
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2116
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2152
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:672
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2128
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RfaV4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2136
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1488
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1740
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:788
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1784
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:588
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1976
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:288
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im EU1.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\EU1.exe" & del C:\ProgramData\*.dll & exit
        3⤵
          PID:2720
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im EU1.exe /f
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:2744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      Filesize

      289KB

      MD5

      61f51370de492e1b8fd565c68aa3141d

      SHA1

      89da629358f5e7fd4da717a15fd72b74869af631

      SHA256

      19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

      SHA512

      8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      Filesize

      289KB

      MD5

      61f51370de492e1b8fd565c68aa3141d

      SHA1

      89da629358f5e7fd4da717a15fd72b74869af631

      SHA256

      19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

      SHA512

      8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      178KB

      MD5

      8d24da259cd54db3ede2745724dbedab

      SHA1

      96f51cc49e1a6989dea96f382f2a958f488662a9

      SHA256

      42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

      SHA512

      ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      699KB

      MD5

      591fe3c4a7613d32309af09848c88233

      SHA1

      8170fce4ede2b4769fad1bec999db5d6a138fbb1

      SHA256

      9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

      SHA512

      e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      c334f2f742fc8f7c13dfa2a01da3f46a

      SHA1

      d020819927da87bc5499df52e12dc5211a09ef61

      SHA256

      92e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb

      SHA512

      43deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2D54A0C1-0FBA-11ED-B71F-CAFCD9EA70F9}.dat
      Filesize

      5KB

      MD5

      7116fea9444cf22509734cbbeea349d3

      SHA1

      1deab40d85e44922252dc6d028dbe95fd187b2b4

      SHA256

      6bd820ca295b83cd2ec237cff8654c9ee2f7cd2f83ab545450062ccaaff27409

      SHA512

      9fc5bd94645f7b716ba30a268dbed625f65d6af2a3ad8c6bf24755c6408068a3d044b02baecbb88c7ba7b11c4bd354557df7b2054d1f389149b1463f0eb6afb4

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2D54C7D1-0FBA-11ED-B71F-CAFCD9EA70F9}.dat
      Filesize

      3KB

      MD5

      a272600b2336e4fbbd1444c48531c5c6

      SHA1

      6ab5edc2bd32df83b88105b3d1b20e70c387b2ed

      SHA256

      d335bd42cf7fa331304865d817d9d4f9f2abd18d8076a8bd6a62213cb4ba881e

      SHA512

      8a9b8013f315b1fe765e0b9390993a1fbbe2ca809e862ab350dc4c8cc854249decd5d3d7db1db1b56aacd5f7b01d66fcf47808d04366c91db32eddabcca7e604

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ASSL12IH.txt
      Filesize

      601B

      MD5

      57b2d3c484cf45ad8f22fd2245b06d14

      SHA1

      bfd344b99c2ed32c8ff9907000e7782978b80d3a

      SHA256

      1a4354e7a52ce0324b449d0d34328b93d3c2e0cfbef48755cd29f7e52e505cd8

      SHA512

      571186b1010af0af44984272881049e35cfffe242eb9d05f9f997e8ed008fbf2c4c8c652f96148db1fa3e42a3dd96f02abaa52129e2ddc83d2d2d826beda340c

    • \Program Files (x86)\Company\NewProduct\EU1.exe
      Filesize

      289KB

      MD5

      61f51370de492e1b8fd565c68aa3141d

      SHA1

      89da629358f5e7fd4da717a15fd72b74869af631

      SHA256

      19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

      SHA512

      8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

    • \Program Files (x86)\Company\NewProduct\EU1.exe
      Filesize

      289KB

      MD5

      61f51370de492e1b8fd565c68aa3141d

      SHA1

      89da629358f5e7fd4da717a15fd72b74869af631

      SHA256

      19338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355

      SHA512

      8aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      178KB

      MD5

      8d24da259cd54db3ede2745724dbedab

      SHA1

      96f51cc49e1a6989dea96f382f2a958f488662a9

      SHA256

      42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

      SHA512

      ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      178KB

      MD5

      8d24da259cd54db3ede2745724dbedab

      SHA1

      96f51cc49e1a6989dea96f382f2a958f488662a9

      SHA256

      42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

      SHA512

      ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      699KB

      MD5

      591fe3c4a7613d32309af09848c88233

      SHA1

      8170fce4ede2b4769fad1bec999db5d6a138fbb1

      SHA256

      9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

      SHA512

      e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      699KB

      MD5

      591fe3c4a7613d32309af09848c88233

      SHA1

      8170fce4ede2b4769fad1bec999db5d6a138fbb1

      SHA256

      9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

      SHA512

      e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

    • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      c334f2f742fc8f7c13dfa2a01da3f46a

      SHA1

      d020819927da87bc5499df52e12dc5211a09ef61

      SHA256

      92e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb

      SHA512

      43deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      c334f2f742fc8f7c13dfa2a01da3f46a

      SHA1

      d020819927da87bc5499df52e12dc5211a09ef61

      SHA256

      92e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb

      SHA512

      43deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156

    • \Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • \Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • memory/288-78-0x0000000000000000-mapping.dmp
    • memory/588-69-0x0000000000000000-mapping.dmp
    • memory/588-95-0x0000000000280000-0x0000000000286000-memory.dmp
      Filesize

      24KB

    • memory/588-94-0x00000000002D0000-0x0000000000314000-memory.dmp
      Filesize

      272KB

    • memory/788-64-0x0000000000000000-mapping.dmp
    • memory/788-96-0x00000000004A0000-0x00000000004A6000-memory.dmp
      Filesize

      24KB

    • memory/788-93-0x0000000000840000-0x0000000000884000-memory.dmp
      Filesize

      272KB

    • memory/1480-54-0x0000000076311000-0x0000000076313000-memory.dmp
      Filesize

      8KB

    • memory/1488-91-0x0000000000400000-0x000000000062B000-memory.dmp
      Filesize

      2.2MB

    • memory/1488-90-0x0000000000020000-0x000000000002F000-memory.dmp
      Filesize

      60KB

    • memory/1488-57-0x0000000000000000-mapping.dmp
    • memory/1488-89-0x0000000000749000-0x0000000000759000-memory.dmp
      Filesize

      64KB

    • memory/1740-87-0x0000000000400000-0x00000000004B5000-memory.dmp
      Filesize

      724KB

    • memory/1740-86-0x0000000000500000-0x0000000000516000-memory.dmp
      Filesize

      88KB

    • memory/1740-60-0x0000000000000000-mapping.dmp
    • memory/1784-67-0x0000000000000000-mapping.dmp
    • memory/1784-102-0x0000000060900000-0x0000000060992000-memory.dmp
      Filesize

      584KB

    • memory/1976-73-0x0000000000000000-mapping.dmp
    • memory/1976-92-0x0000000000D10000-0x0000000000D30000-memory.dmp
      Filesize

      128KB

    • memory/2720-140-0x0000000000000000-mapping.dmp
    • memory/2744-142-0x0000000000000000-mapping.dmp
    • memory/2916-141-0x0000000000000000-mapping.dmp