Analysis

  • max time kernel
    104s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2022 11:50

General

  • Target

    tmp.exe

  • Size

    1.2MB

  • MD5

    3f0373c5bcfed4d6abbf029eebce8ed5

  • SHA1

    0a99c5eb158f34e97c7f64806f1ae82240b23765

  • SHA256

    a22742c7a6e494902e20dc3f800c4277f7d4089a2fcad9c014214bec7cebe803

  • SHA512

    ea7c2ed9580ac96e3b9b8a94ee38799ad5d359473b5242566b12965ab278037f7dd999e1693d604c33638c52702861452f5a7bfd8ef4251b1e5ec867997268e4

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

5076357887

C2

195.54.170.157:16525

Attributes
  • auth_value

    0dfaff60271d374d0c206d19883e06f3

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 16 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1304
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:948
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1076
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:628
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1948
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1912
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1352
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nfDK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1976
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AbtZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1480
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n6sL4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1776
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:828
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1460
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1632
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1816
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1964
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1744
    • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
      "C:\Program Files (x86)\Company\NewProduct\jshainx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2016
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    82259f982c66e0bdb6a9976e6eff4665

    SHA1

    df559539e52d4277762535fc694e888487e58e01

    SHA256

    ba7eda28581bd1147ab6661aacd1b61435671381c9bae3a8a6651aa40a8a0bce

    SHA512

    e9e42def570e1d27574f80979fabb742861eaa828a96240d2a84b3418318460b96ed6b9209699c08221abb5765c7b1a708de6f89903d812c621259e0802b7ec1

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{04386DC1-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    3KB

    MD5

    cd11be25418c516198da7b8e70b37b47

    SHA1

    c6809ee4ed3f54bffa41facfc9dc17defdc55bcc

    SHA256

    5ee164cc511420b34a5f94cc39a42d365ce9e088754deb16653e354395e200a8

    SHA512

    c1a18ec1ea8f360d0d87ea33011de5bbabedbbdfb97029b814925f3a521fed8236d5fd2040c71069de7e4eb8eafcd4e4ddc11b8dc82c2b6c88bd7461458fdaee

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{043A6991-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    5KB

    MD5

    605c50ce82bdf0cf1be072b7273981ff

    SHA1

    8bd4f2199f43f6ecd68513e290e2c3f2ef92f255

    SHA256

    7326182865383d207dae422985c92da16d75623fcec47dd78fc275878088750c

    SHA512

    a285a499ae517585a8f983d094e0836324b9805a64c12830d7340d861ee71c238ba1f6f73ee956b39c0d44902ca1dfeea1d2ee1f997fad9695add3dded478021

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{043DEC01-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    3KB

    MD5

    3f3628d61dd40853375e8bb552259b71

    SHA1

    c7a968ca32bf1c95b1a1a60e408b6b847bb8b934

    SHA256

    f547890b9db55a69d4f21acc6747212828b9d38f5846f36fa869db7c01f30b08

    SHA512

    06c20e5752efaaf0f6d04fff980126e1177f7693e9f90165a58a89a956e9419cde878706a11b7688e60df04373d01bc80632f8c4c4c19bd71c46106d15dd7a2e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{043DEC01-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    5KB

    MD5

    0f6add10d5fc1388f2816835b493a5ad

    SHA1

    e1c70436c9d0e13593420114f25506494a171806

    SHA256

    a0bec5591512955b4ff988921112d87ac6abf95b927de9bc92ec4e07f134620d

    SHA512

    ee84a8abe0ce99c72483988497b3811f3c0ecf6b16e865a30b659b4d7c59a30c8d93b7caf08c929a3c9cc2d4e3ad1c6183f028460ea93ce286f921333d7bb6f0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{04400EE1-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    5KB

    MD5

    8be7dab0bcee65cef562dd1ace3a6f5e

    SHA1

    2128302b639d2f4e17a6f415cac9241e3c6e8cac

    SHA256

    fa49c7f18054a2b904072838562a2b2c3a5719c4ff33aa25d4be0da29bd30013

    SHA512

    7688acf91d543d37f67ea782a8df8196f69a913e7dba32061dd01cffda5c4b91822bc7f62ef8e4f16a60ddf927478ac4208a5877f45ff33cc3774689766f8e98

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{04440681-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    3KB

    MD5

    fb27163b5fba8341b6ee02e685bc4119

    SHA1

    252968699727e26cd2638d18d0deb3c740470c3c

    SHA256

    2cd2c1011d3c2122af3608634ba8f2f3e34a7887d41c3d451345eec9f80f5d4b

    SHA512

    4b66c8d5b4cd1bbe5980e987151836b11953d210d1f0f156b381d53425960318cfe34ff3e8f386e74eff92e0f640c2879a72aa17c0837e638b08b9b2787d331c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{04440681-1721-11ED-960D-D20479E00C25}.dat
    Filesize

    4KB

    MD5

    58d15c7cd89750a9eb3842ccf658eb0a

    SHA1

    ef4a8c5596557b7e9f94613f895b641038810564

    SHA256

    534c311080a26269626eb76be9de611baa4e0f0df4180db59b22e59056fc4dc4

    SHA512

    60d6b15e82089be1e2a71a1567e0f109be3695eb7acb165c361f2f652a8e700e2a2c231d3123e7142e56892da09e9179b116c3d49dd5f8a7a9cd590f139f67e4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2PUCAF16.txt
    Filesize

    608B

    MD5

    c3bbbc8388da34074ea45bd878d8da43

    SHA1

    981751830fd334339c95603e855541a85756de32

    SHA256

    d4a94a823d2538bd6a0e09edbf576c7fd26f889b6ae25c8783c411652eb8bf26

    SHA512

    f06ad0e015a3f092e17d2087c40c591cfef4be74cb5963f653e1cc94b1535f307e92631f19a03b32ac2272df2d8020fb4d4cf6b213152a62b7cd01cc73a75c49

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    289KB

    MD5

    98ee616bbbdae32bd744f31d48e46c72

    SHA1

    fb2fe19e8890c7c4be116db78254fe3e1beb08a0

    SHA256

    5e0e8817946e234867eb10b92ce613a12d1597ca53e73020ec19e1c76b3566cb

    SHA512

    fab7fc5c37551ca64daad4611b62d456ed245946298f1b813120ca0fe45ffb76c29ec8402327e58c565fdf42f2b1d0bd18864b4ab63f85742e2b99772981af9d

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    82259f982c66e0bdb6a9976e6eff4665

    SHA1

    df559539e52d4277762535fc694e888487e58e01

    SHA256

    ba7eda28581bd1147ab6661aacd1b61435671381c9bae3a8a6651aa40a8a0bce

    SHA512

    e9e42def570e1d27574f80979fabb742861eaa828a96240d2a84b3418318460b96ed6b9209699c08221abb5765c7b1a708de6f89903d812c621259e0802b7ec1

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.5MB

    MD5

    82259f982c66e0bdb6a9976e6eff4665

    SHA1

    df559539e52d4277762535fc694e888487e58e01

    SHA256

    ba7eda28581bd1147ab6661aacd1b61435671381c9bae3a8a6651aa40a8a0bce

    SHA512

    e9e42def570e1d27574f80979fabb742861eaa828a96240d2a84b3418318460b96ed6b9209699c08221abb5765c7b1a708de6f89903d812c621259e0802b7ec1

  • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    289KB

    MD5

    84d016c5a9e810c2ef08767805a87589

    SHA1

    750b15c9c1acdfcd1396ecec11ab109706a945ad

    SHA256

    6e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845

    SHA512

    7c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953

  • \Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • \Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • memory/1460-95-0x00000000002B0000-0x00000000002B6000-memory.dmp
    Filesize

    24KB

  • memory/1460-56-0x0000000000000000-mapping.dmp
  • memory/1460-91-0x00000000011E0000-0x0000000001224000-memory.dmp
    Filesize

    272KB

  • memory/1604-89-0x00000000012C0000-0x00000000012E0000-memory.dmp
    Filesize

    128KB

  • memory/1604-81-0x0000000000000000-mapping.dmp
  • memory/1620-54-0x0000000075A61000-0x0000000075A63000-memory.dmp
    Filesize

    8KB

  • memory/1632-110-0x0000000060900000-0x0000000060992000-memory.dmp
    Filesize

    584KB

  • memory/1632-60-0x0000000000000000-mapping.dmp
  • memory/1744-107-0x0000000000709000-0x0000000000719000-memory.dmp
    Filesize

    64KB

  • memory/1744-109-0x0000000000400000-0x000000000062B000-memory.dmp
    Filesize

    2.2MB

  • memory/1744-108-0x0000000000020000-0x000000000002F000-memory.dmp
    Filesize

    60KB

  • memory/1744-148-0x0000000000709000-0x0000000000719000-memory.dmp
    Filesize

    64KB

  • memory/1744-149-0x0000000000709000-0x0000000000719000-memory.dmp
    Filesize

    64KB

  • memory/1744-74-0x0000000000000000-mapping.dmp
  • memory/1816-94-0x00000000003C0000-0x00000000003C6000-memory.dmp
    Filesize

    24KB

  • memory/1816-64-0x0000000000000000-mapping.dmp
  • memory/1816-90-0x0000000000180000-0x00000000001C4000-memory.dmp
    Filesize

    272KB

  • memory/1960-86-0x0000000000000000-mapping.dmp
  • memory/1964-70-0x0000000000000000-mapping.dmp
  • memory/2016-92-0x0000000001310000-0x0000000001330000-memory.dmp
    Filesize

    128KB

  • memory/2016-77-0x0000000000000000-mapping.dmp