Analysis

  • max time kernel
    103s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2022 12:31

General

  • Target

    ffba715730cdb446fa832c8fcaa4f783.exe

  • Size

    1.2MB

  • MD5

    ffba715730cdb446fa832c8fcaa4f783

  • SHA1

    c15cccf1ba94a7e67e615bf4f94d1266fc9d3c7b

  • SHA256

    7fd0c18e417e77f1b4019024738211632265864ea3acf9f985eea6c0c75ba3ba

  • SHA512

    74b9d7ef04add54d269f81b5191d31b4b6fc6bc653c5f64595adc8a92a4ed60f8422e7f00e40507266b89d4e184618758a1f1846b6c5e5e59f119d0d67de89ee

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffba715730cdb446fa832c8fcaa4f783.exe
    "C:\Users\Admin\AppData\Local\Temp\ffba715730cdb446fa832c8fcaa4f783.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:908
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:944
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:852
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:988 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1788
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:760
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1548
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nfDK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:1924
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AbtZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:480
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:480 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:996
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2036
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1916
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1544
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1192
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1784
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1684
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1340

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    5412966383390aab13f3d06d8b942ab5

    SHA1

    e5b6ca3e0eee4799a82a7838a0b381a7a271e9c3

    SHA256

    ef1646934a42857fd4bea5210112ab72f40dfb0ad6b2c296dcb4d0f73a429d55

    SHA512

    655fd9207da7b3b7507644fa3d90d55eaed2e78413145d147223fd5f242df7aa788ce62315873bc64ce38ae81d234d8202b7cad9377dd920d51178bc741ef6e7

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B584B51-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    5KB

    MD5

    59308a1173204524f1330019c21697ae

    SHA1

    5c26cde29680caec76145f0a3eeb1fac3b9239ca

    SHA256

    ed56adc4e7eb937250b1821da405d434c10760ff999fbb3956babe89a138182e

    SHA512

    20142b10c688207226b24b4c9ec335d08ddd8d11385854e435cf4bf1129d8917f81486c9d6d920dd97f9a1b55e48f345b8ea2c7b490521d0ada99a9951bd06ea

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B5AE361-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    5KB

    MD5

    c08c3b625aa9aacf7cb3638ff9a16b60

    SHA1

    467fb323cc1ed015743a91f9d79f7e64732cc511

    SHA256

    9685bc33f6718f5b2eaf659627afb4325e457c38053b131f62c52bad390a38ac

    SHA512

    16a4b94478b5157f7215e0214f8da76e043afc0846ca6746d0fab1290cf9ba51361d270e48b8c3da7443fcd584da0976c9ca50bb5338bbef0d11afbbec4c618e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B5CB821-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    4KB

    MD5

    1cffdeeeddcd336dbd2d94668b570fb5

    SHA1

    4dc9927fcbc90432285312d126fa8af7ce54c3e2

    SHA256

    982fc072ce1f9aa34a4dcbac3d0f2cf4f347ee3b9c5d6e336a0e3a4f443a7e2a

    SHA512

    65ef3169741082efeb0b115dbe7df48b672e4f3cdd3caab8a34a2fe965871f8fcd299fbbaee066965870c8cf0f61e99b7dd650394e30af411f244ade26bb4420

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B5CB821-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    5KB

    MD5

    ccd0424fc1714176ad27a642b3841272

    SHA1

    84c97dba62adb17ba7377ebe400f5ae42860ee50

    SHA256

    75dd9d7286ee27a18fcd84b60e1d0953632cfa6d8b54ff9bdb39aec54e61c3e0

    SHA512

    48453e9e45c9ee8751cd1accd6edecd6cb8c539bbdc3af7f35d27208e429d35d5586e29da48e73b3adac3b61aa02cde9f760405370c9ec757342a33c0e065aae

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B5E17B1-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    5KB

    MD5

    2d1e36ce2facbd1c55df98bbd88f562e

    SHA1

    ede88936120efff91055a5ba00a296ae3c7ffe29

    SHA256

    7149c30ff26bce279664585206364fa98d996e523458914b13f81f7e452398a3

    SHA512

    41dc7158267d0e2d8833494ed9116896a2d0d18954f9ddd905dcdbee082d3cebda7832ac853c5aed66125fa3c34e3c83334f151d60df0d836b22577ba59cb95e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7B6124F1-14BA-11ED-93C4-CAFCD9EA70F9}.dat
    Filesize

    3KB

    MD5

    459381727a5411cde365be536f279e39

    SHA1

    e7b2973d9c87b3a5f747602a8b9d39afcc5b5f43

    SHA256

    520b15a20015dbca015177c9c882ed0d84df4b0437f934c75a7e8d056428a1db

    SHA512

    124f92e9eeb092f305dd681e5f8c67b3a1a7f499fd1c80778ac087c07d9d70993b0b2a4b25bbe50aa4b835cf427871d00b29fc8966467189116f577bd19c5d63

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5074R78H.txt
    Filesize

    598B

    MD5

    3eefca311c2831424787abc7fcc9256c

    SHA1

    16e74fab074a998879a9b097462e6b55ff8641f2

    SHA256

    7d7f6b7b3b8261dc30c49550ff6d39d9ccf7cc1dfcdea6bffd1da08ab18805db

    SHA512

    32d9f95a4edab9bcd1a165aeb1625c5df47565effbfade9961e4838f4e1b6708159a57af89e884f1a70f86248da579627c7c4583d15533df2e2f813063ce6eb0

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    5412966383390aab13f3d06d8b942ab5

    SHA1

    e5b6ca3e0eee4799a82a7838a0b381a7a271e9c3

    SHA256

    ef1646934a42857fd4bea5210112ab72f40dfb0ad6b2c296dcb4d0f73a429d55

    SHA512

    655fd9207da7b3b7507644fa3d90d55eaed2e78413145d147223fd5f242df7aa788ce62315873bc64ce38ae81d234d8202b7cad9377dd920d51178bc741ef6e7

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    5412966383390aab13f3d06d8b942ab5

    SHA1

    e5b6ca3e0eee4799a82a7838a0b381a7a271e9c3

    SHA256

    ef1646934a42857fd4bea5210112ab72f40dfb0ad6b2c296dcb4d0f73a429d55

    SHA512

    655fd9207da7b3b7507644fa3d90d55eaed2e78413145d147223fd5f242df7aa788ce62315873bc64ce38ae81d234d8202b7cad9377dd920d51178bc741ef6e7

  • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • \Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • \Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • \Users\Admin\AppData\LocalLow\mozglue.dll
    Filesize

    612KB

    MD5

    f07d9977430e762b563eaadc2b94bbfa

    SHA1

    da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

    SHA256

    4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

    SHA512

    6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

  • \Users\Admin\AppData\LocalLow\nss3.dll
    Filesize

    1.9MB

    MD5

    f67d08e8c02574cbc2f1122c53bfb976

    SHA1

    6522992957e7e4d074947cad63189f308a80fcf2

    SHA256

    c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

    SHA512

    2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

  • \Users\Admin\AppData\LocalLow\sqlite3.dll
    Filesize

    1.0MB

    MD5

    dbf4f8dcefb8056dc6bae4b67ff810ce

    SHA1

    bbac1dd8a07c6069415c04b62747d794736d0689

    SHA256

    47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

    SHA512

    b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

  • memory/904-54-0x00000000766A1000-0x00000000766A3000-memory.dmp
    Filesize

    8KB

  • memory/1192-69-0x0000000000000000-mapping.dmp
  • memory/1340-82-0x0000000000000000-mapping.dmp
  • memory/1544-64-0x0000000000000000-mapping.dmp
  • memory/1544-87-0x0000000000C80000-0x0000000000CC4000-memory.dmp
    Filesize

    272KB

  • memory/1544-89-0x0000000000300000-0x0000000000306000-memory.dmp
    Filesize

    24KB

  • memory/1684-85-0x0000000000220000-0x0000000000240000-memory.dmp
    Filesize

    128KB

  • memory/1684-77-0x0000000000000000-mapping.dmp
  • memory/1784-74-0x0000000000000000-mapping.dmp
  • memory/1784-100-0x0000000000779000-0x0000000000789000-memory.dmp
    Filesize

    64KB

  • memory/1784-101-0x0000000000020000-0x000000000002F000-memory.dmp
    Filesize

    60KB

  • memory/1784-102-0x0000000000400000-0x000000000062B000-memory.dmp
    Filesize

    2.2MB

  • memory/1784-144-0x0000000000779000-0x0000000000789000-memory.dmp
    Filesize

    64KB

  • memory/1784-145-0x0000000000400000-0x000000000062B000-memory.dmp
    Filesize

    2.2MB

  • memory/1916-103-0x0000000060900000-0x0000000060992000-memory.dmp
    Filesize

    584KB

  • memory/1916-61-0x0000000000000000-mapping.dmp
  • memory/2036-56-0x0000000000000000-mapping.dmp
  • memory/2036-88-0x00000000004F0000-0x00000000004F6000-memory.dmp
    Filesize

    24KB

  • memory/2036-86-0x0000000001170000-0x00000000011B4000-memory.dmp
    Filesize

    272KB