Analysis

  • max time kernel
    110s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2022 07:41

General

  • Target

    da7f06ed721db4dd18cc123c483aff24.exe

  • Size

    893KB

  • MD5

    da7f06ed721db4dd18cc123c483aff24

  • SHA1

    89d63c8642c3f86478aa4c9f3f9fe40ce45d92e8

  • SHA256

    0aae4f734962cba43eda599dbff153929a18ce45e814176b5e37998858c70515

  • SHA512

    9d72514ed180d2890d4e9ccf551062a78f5a2653624e9b6057fef03b250b18ef8216f6ed5ba7abdc4727c93881c6c3d1e0bbedda3a2ae06ae9d76dbfc8c878a7

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 12 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da7f06ed721db4dd18cc123c483aff24.exe
    "C:\Users\Admin\AppData\Local\Temp\da7f06ed721db4dd18cc123c483aff24.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AbtZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2064
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1732
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2088
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2056
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1240
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2080
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1naEL4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2072
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1112
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2096
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1216
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1668
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1088
    • C:\Program Files (x86)\Company\NewProduct\nuplat.exe
      "C:\Program Files (x86)\Company\NewProduct\nuplat.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1712
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1684
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:852
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1028
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1096

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    491KB

    MD5

    681d98300c552b8c470466d9e8328c8a

    SHA1

    d15f4a432a2abce96ba9ba74443e566c1ffb933f

    SHA256

    8bbc892aedc1424ca5c66677b465c826f867515a3fea28821d015edcee71c912

    SHA512

    b909975d0212d5a5a0cb2e2809ee02224aac729cb761be97a8e3be4ee0a1d7470946da8cf725953c1b2d71fb5fc9dc3c26fd74bce5db5cc0e91a106f8bded887

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • C:\Program Files (x86)\Company\NewProduct\nuplat.exe
    Filesize

    287KB

    MD5

    17c42a0dad379448ee1e6b21c85e5ac9

    SHA1

    2fec7fbb4a47092f9c17cd5ebb509a6403cb6d69

    SHA256

    e080161f57d4eaaad9173b63219ba5a9c2c595324a6b3ffe96783db40839807b

    SHA512

    5ddfe9af625c54e417452fe582041cdd373b52d4ededbcba71a88050fd834bc8af822257f7ad606e89db3fde15be98f58c1d8ff139dac71d81a23f669617a189

  • C:\Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    c90948996aaa222537b0c58a186dd303

    SHA1

    f2221eb27d63c4b9190745063c30d9d457169e05

    SHA256

    eab6d978d95aa8d6d9169045d9729902e45b4fea0af13372ad11405c5895f5d9

    SHA512

    20ddd204da8f34e305e95c7fc5ddc6a641bbaf3a18eae00ca0652692d35a0aec5033c5aee7158328a7cc1b105cf2a2e76b98503e3c21ede12e0232e44fa4a5df

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8FBFC3A1-1890-11ED-8340-EA840160AE5B}.dat
    Filesize

    3KB

    MD5

    41743fd27e1968cb5b159c43fb2ff611

    SHA1

    0f16f18ab6e3a67bb4cfd09d291546b9a32df459

    SHA256

    82a0f8f9e0595fd44dece1fe9936c540f478f62d98a4250ffdc30fdfc9d03c85

    SHA512

    91ca87df8b39e07b93e11014f8a34895a45b374d498df73e76bfe48cf94924fb762c35a024497de91e7357cff05cae1bed97bcc584bd7830a9dd95d698bec946

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8FC73DB1-1890-11ED-8340-EA840160AE5B}.dat
    Filesize

    3KB

    MD5

    ee4fb55f9cc0a308203a7022f4c9d03a

    SHA1

    212b043649bcb7b80a011f729e07bb0547deaeb3

    SHA256

    574b5a62800470c1fab2144c88af6363db268662a30369fd5aaba4f1a95a01a2

    SHA512

    087b684deab414227d3cee3e4c8f8f9cde8f1b84974429e48df11987846741ae7d3bef4af7f2bc3f9ff0c001e1bda8004fe53ea4cca8e16d551aaf7618c2cd1d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MB7CWJSN.txt
    Filesize

    608B

    MD5

    563378a8033dbcedc07d54368b1a80c7

    SHA1

    2575122ff391b42867ab213b6ef0450db66b13b9

    SHA256

    8671b61fd7ef6fd9c069f14690d073ffff6b99bdbbaa63d6baf6c308856e5688

    SHA512

    c48adfd3cd6385da14b9959258d154349c095d6e8097b647c12204bbc0d1db159c770118e98d51b669dd471af054c925b4160f3e4f133c3f23470f227163f2f8

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    178KB

    MD5

    8d24da259cd54db3ede2745724dbedab

    SHA1

    96f51cc49e1a6989dea96f382f2a958f488662a9

    SHA256

    42f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883

    SHA512

    ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    491KB

    MD5

    681d98300c552b8c470466d9e8328c8a

    SHA1

    d15f4a432a2abce96ba9ba74443e566c1ffb933f

    SHA256

    8bbc892aedc1424ca5c66677b465c826f867515a3fea28821d015edcee71c912

    SHA512

    b909975d0212d5a5a0cb2e2809ee02224aac729cb761be97a8e3be4ee0a1d7470946da8cf725953c1b2d71fb5fc9dc3c26fd74bce5db5cc0e91a106f8bded887

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    491KB

    MD5

    681d98300c552b8c470466d9e8328c8a

    SHA1

    d15f4a432a2abce96ba9ba74443e566c1ffb933f

    SHA256

    8bbc892aedc1424ca5c66677b465c826f867515a3fea28821d015edcee71c912

    SHA512

    b909975d0212d5a5a0cb2e2809ee02224aac729cb761be97a8e3be4ee0a1d7470946da8cf725953c1b2d71fb5fc9dc3c26fd74bce5db5cc0e91a106f8bded887

  • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    245KB

    MD5

    b16134159e66a72fb36d93bc703b4188

    SHA1

    e869e91a2b0f77e7ac817e0b30a9a23d537b3001

    SHA256

    b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

    SHA512

    3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

  • \Program Files (x86)\Company\NewProduct\nuplat.exe
    Filesize

    287KB

    MD5

    17c42a0dad379448ee1e6b21c85e5ac9

    SHA1

    2fec7fbb4a47092f9c17cd5ebb509a6403cb6d69

    SHA256

    e080161f57d4eaaad9173b63219ba5a9c2c595324a6b3ffe96783db40839807b

    SHA512

    5ddfe9af625c54e417452fe582041cdd373b52d4ededbcba71a88050fd834bc8af822257f7ad606e89db3fde15be98f58c1d8ff139dac71d81a23f669617a189

  • \Program Files (x86)\Company\NewProduct\nuplat.exe
    Filesize

    287KB

    MD5

    17c42a0dad379448ee1e6b21c85e5ac9

    SHA1

    2fec7fbb4a47092f9c17cd5ebb509a6403cb6d69

    SHA256

    e080161f57d4eaaad9173b63219ba5a9c2c595324a6b3ffe96783db40839807b

    SHA512

    5ddfe9af625c54e417452fe582041cdd373b52d4ededbcba71a88050fd834bc8af822257f7ad606e89db3fde15be98f58c1d8ff139dac71d81a23f669617a189

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • \Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    244KB

    MD5

    dbe947674ea388b565ae135a09cc6638

    SHA1

    ae8e1c69bd1035a92b7e06baad5e387de3a70572

    SHA256

    86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

    SHA512

    67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

  • \Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • memory/852-77-0x0000000000000000-mapping.dmp
  • memory/852-91-0x0000000000420000-0x0000000000426000-memory.dmp
    Filesize

    24KB

  • memory/852-87-0x0000000000880000-0x00000000008C4000-memory.dmp
    Filesize

    272KB

  • memory/1028-90-0x0000000000B90000-0x0000000000BB0000-memory.dmp
    Filesize

    128KB

  • memory/1028-81-0x0000000000000000-mapping.dmp
  • memory/1088-92-0x0000000000270000-0x0000000000276000-memory.dmp
    Filesize

    24KB

  • memory/1088-64-0x0000000000000000-mapping.dmp
  • memory/1088-88-0x00000000009D0000-0x0000000000A14000-memory.dmp
    Filesize

    272KB

  • memory/1096-85-0x0000000000000000-mapping.dmp
  • memory/1216-126-0x0000000000729000-0x0000000000739000-memory.dmp
    Filesize

    64KB

  • memory/1216-101-0x0000000000729000-0x0000000000739000-memory.dmp
    Filesize

    64KB

  • memory/1216-102-0x0000000000020000-0x000000000002F000-memory.dmp
    Filesize

    60KB

  • memory/1216-103-0x0000000000400000-0x000000000062B000-memory.dmp
    Filesize

    2.2MB

  • memory/1216-165-0x0000000000729000-0x0000000000739000-memory.dmp
    Filesize

    64KB

  • memory/1216-57-0x0000000000000000-mapping.dmp
  • memory/1668-93-0x00000000002B0000-0x00000000002C2000-memory.dmp
    Filesize

    72KB

  • memory/1668-94-0x0000000000400000-0x0000000000482000-memory.dmp
    Filesize

    520KB

  • memory/1668-61-0x0000000000000000-mapping.dmp
  • memory/1684-73-0x0000000000000000-mapping.dmp
  • memory/1712-107-0x0000000060900000-0x0000000060992000-memory.dmp
    Filesize

    584KB

  • memory/1712-68-0x0000000000000000-mapping.dmp
  • memory/1956-54-0x00000000756B1000-0x00000000756B3000-memory.dmp
    Filesize

    8KB