Analysis

  • max time kernel
    137s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2022 17:41

General

  • Target

    3d8bc8f17e09303edcf5b8ae9a32d0fa.exe

  • Size

    1.7MB

  • MD5

    3d8bc8f17e09303edcf5b8ae9a32d0fa

  • SHA1

    80331898dfe6d1c20afdba65da52d7a719e24a1d

  • SHA256

    3bcf69e225f3a55bdc75f5622ad66736f6bab02ee8771ebd10b094bf99497a18

  • SHA512

    3571ceb7d0864c9348fc3930d952f4a82c40d4d2a32435eba918b19ba1daf7e9ca424f678efd15af78c55f9188a997b2fd8574d54f1796ecff28ec278af10d91

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:34589

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

5

C2

176.113.115.146:9582

Attributes
  • auth_value

    d38b30c1ccd6c1e5088d9e5bd9e51b0f

Extracted

Family

redline

Botnet

5076357887

C2

195.54.170.157:16525

Attributes
  • auth_value

    0dfaff60271d374d0c206d19883e06f3

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

RuXaRR_GG

C2

insttaller.com:40915

Attributes
  • auth_value

    4a733ff307847db3ee220c11d113a305

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8bc8f17e09303edcf5b8ae9a32d0fa.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8bc8f17e09303edcf5b8ae9a32d0fa.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AbtZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1900
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2220
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2176
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1456
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2152
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1928
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2184
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1252
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2136
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nhGL4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2016
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2160
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A3AZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2144
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1ALSZ4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2168
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:520
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1620
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:616
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1524
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1432
    • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
      "C:\Program Files (x86)\Company\NewProduct\jshainx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:808
      • C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe
        "C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
    • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
      "C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1240
    • C:\Program Files (x86)\Company\NewProduct\rawxdev.exe
      "C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"
      2⤵
      • Executes dropped EXE
      PID:1936
    • C:\Program Files (x86)\Company\NewProduct\EU1.exe
      "C:\Program Files (x86)\Company\NewProduct\EU1.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:432

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    339KB

    MD5

    501e0f6fa90340e3d7ff26f276cd582e

    SHA1

    1bce4a6153f71719e786f8f612fbfcd23d3e130a

    SHA256

    f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b

    SHA512

    dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69

  • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
    Filesize

    107KB

    MD5

    4bf892a854af9af2802f526837819f6e

    SHA1

    09f2e9938466e74a67368ecd613efdc57f80c30b

    SHA256

    713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf

    SHA512

    7ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44

  • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
    Filesize

    107KB

    MD5

    4bf892a854af9af2802f526837819f6e

    SHA1

    09f2e9938466e74a67368ecd613efdc57f80c30b

    SHA256

    713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf

    SHA512

    7ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44

  • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.4MB

    MD5

    8df3405e9cd1a18d10568e0d32e6dc39

    SHA1

    a084252242da8dbf97f23d7785fdf2b8d9677d3b

    SHA256

    79516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b

    SHA512

    6f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    107KB

    MD5

    bbd8ea73b7626e0ca5b91d355df39b7f

    SHA1

    66e298653beb7f652eb44922010910ced6242879

    SHA256

    1aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e

    SHA512

    625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f

  • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    107KB

    MD5

    bbd8ea73b7626e0ca5b91d355df39b7f

    SHA1

    66e298653beb7f652eb44922010910ced6242879

    SHA256

    1aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e

    SHA512

    625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f

  • C:\Program Files (x86)\Company\NewProduct\rawxdev.exe
    Filesize

    1.2MB

    MD5

    919cf73749642aa08fb76e9254af5efa

    SHA1

    08c25ab3572b9035496aec516342e37a25a84883

    SHA256

    2a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3

    SHA512

    5b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6

  • C:\Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    246KB

    MD5

    414ffd7094c0f50662ffa508ca43b7d0

    SHA1

    6ec67bd53da2ff3d5538a3afcc6797af1e5a53fb

    SHA256

    d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee

    SHA512

    c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399

  • C:\Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    246KB

    MD5

    414ffd7094c0f50662ffa508ca43b7d0

    SHA1

    6ec67bd53da2ff3d5538a3afcc6797af1e5a53fb

    SHA256

    d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee

    SHA512

    c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    3ad7fe34020f64ea3db03b7d89bd41b6

    SHA1

    64f37ff3b3a7d919657e6879db0f8b4e3b0b11bd

    SHA256

    2a94e0f773f18583829392d33c89f52a2c229436774d6d6392e0fa3baacd2106

    SHA512

    a878ca4f7c798b2713c7ae6787cf8e7f8797d2ffdb9017a82988a19292f302a2d05ad2b4f4b270011d287cef70c87cffbd3ec26d9c93339f16cecdfa7a73577a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B61F96A1-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    5KB

    MD5

    a5879cab132d32cfe7c678015b36a963

    SHA1

    cabe67b1b1ea9eebd992f0d51292748f056799c0

    SHA256

    537377ed071c09720c2baec685e38217650360b73c3811fc5213a90c0ea2e21b

    SHA512

    244508ce9895ae944419a4f0f8e33b248471171907320f006758086a4e425ce2772b5439ab315db509e17db40859b0a8306f0ed2796eef068de90f1d69eae92f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B62B5671-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    3KB

    MD5

    48522162c916775177aa34f4d588286a

    SHA1

    01744f42342dfc216e0f15b447b26d1f7727a1da

    SHA256

    11abf121edbb94164f34c5b9c8121a531a972aff1330f795c292c874c301ce16

    SHA512

    3169cbda6b43b2b40a6a859a7b63327f802cb5173d87381349c39026bbbca550ea8c1b469f6ef5adc8459f72d34cfeb5037daf92cb1b1a7da31c12e3e50751e9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B62B5671-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    5KB

    MD5

    41b120e68bb8bffd4255c90b2bee6e95

    SHA1

    91aeed72c5f87fc1c742ccee2e3e5931f6479584

    SHA256

    01a59a5659612a1716a227d6360842d04284e0b41966223ed5a4ef9e2e29ffa9

    SHA512

    ee02ae9b7b417e75e7562d2835ea0b8b646755b295f6f95acdc81e2c846b3a53311af56f2446f9740ad30188bbb30a42ffd6468f1b9e42c648893e4c40bd4fe9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B62D7951-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    5KB

    MD5

    b62436a37e4ad65b10e53fee0d3b7956

    SHA1

    6a78e0299eb86fd13abedba000a2f6ddc333ce07

    SHA256

    7979fd1ca6e9a58501aec172c32a0b0107b3939eca740edc930a5f962bc8af3e

    SHA512

    af7582a3917c1e22c0911875b64ef7ac1205e36e3ca68b8c38c4c1bc2e5c9110d1173f9cfbb0c8a8e3e61974a10f3538cbe51d017e42961de0dc33ead2880caa

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B62FEA51-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    3KB

    MD5

    517c45b0977cbbe468b07e84ae3d3897

    SHA1

    e9b37f2e80cb5b574665f5dc4c2b832ccd0f1964

    SHA256

    24e212cab6d99def63ce2d03fcf354185800db6ab3f6eaf5f315a0d384f6b8f7

    SHA512

    76d37d57c9f57a3690154692880bf29a13cb7667052920077b552a420f8d67609d018baaf36a5a394b2bb1a5eb0ade58c0b5d151b7ac97ce2bba9edeef36c4d1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B633E1F1-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    4KB

    MD5

    b088c02cec666537b5fa9bee5faef9fb

    SHA1

    1ef05f53a2c6b5f46016c3468acd01ef18caf82a

    SHA256

    6254debd58fbabb1dc4b3beac3c4b050e09b04d608152b870bbd64d563bc3e26

    SHA512

    322de00327bc4e81dd7fc54383e6faac1d804a531fde1ec9c0c510f29d21dc0739fa7446c8a87e634244fc7ec7357f659c9ed2f6a54be3f5bb0180ea638bb7c1

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B633E1F1-1A76-11ED-808D-42A98B637845}.dat
    Filesize

    3KB

    MD5

    cb046d75747e28d4efbf252e8f3bdfbf

    SHA1

    838f7cde12edd5a9b8380bae3d1df9cd506dc170

    SHA256

    34be06a0a8866db42db0c1cea4e7d74214abc3b180d03cf69c4a059598f72d28

    SHA512

    1f241f13af6f6ab7beb7d16115ce41cb45f64625dd522e06ef1981ede600fc664442e8dc854048fd399f0a1d5786f99507c7a1cd24a21eedff17231681789a1e

  • C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe
    Filesize

    71KB

    MD5

    f8370d132f334be6703ce54b08db1578

    SHA1

    55d98f702724f25535bfbeb7a46cee92d57a4421

    SHA256

    2b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6

    SHA512

    0eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b

  • C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe
    Filesize

    71KB

    MD5

    f8370d132f334be6703ce54b08db1578

    SHA1

    55d98f702724f25535bfbeb7a46cee92d57a4421

    SHA256

    2b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6

    SHA512

    0eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S0TODPFL.txt
    Filesize

    608B

    MD5

    e12e94da95c0e71978dec0a7efb37666

    SHA1

    3218d402a6edebc36a1aeedbdfef24a4b4416211

    SHA256

    56522de3f890a61c39518f375b4cf02bcbb688fa2f429b6b1772188e12403347

    SHA512

    0db5d68ba7b204a464102080f1d65c09867750f4f0fc41de6868ac75a5dc2f1025334321d9564e6215cc4186751d5a655a47b6eb6fd783e973170b30b94f94bd

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • \Program Files (x86)\Company\NewProduct\EU1.exe
    Filesize

    286KB

    MD5

    eaa8eacd3c59ed71b7f68ef7a96602a3

    SHA1

    9b35e7b6cd147a4a729d3f6b1791e774a754c589

    SHA256

    2f7a5ab1ce00d00b1196b2cd815457176467928a47a8c652b8af41e6bab8772b

    SHA512

    c19934e143dcf1242f2f1584baaad4cebbd2e06d048c2ef9d347683ef0d77e2791c364608957e8ea4c1b9613450c3c2e4112bb56280ee12a4b1b1a63c714d83e

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    339KB

    MD5

    501e0f6fa90340e3d7ff26f276cd582e

    SHA1

    1bce4a6153f71719e786f8f612fbfcd23d3e130a

    SHA256

    f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b

    SHA512

    dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69

  • \Program Files (x86)\Company\NewProduct\F0geI.exe
    Filesize

    339KB

    MD5

    501e0f6fa90340e3d7ff26f276cd582e

    SHA1

    1bce4a6153f71719e786f8f612fbfcd23d3e130a

    SHA256

    f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b

    SHA512

    dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69

  • \Program Files (x86)\Company\NewProduct\ffnameedit.exe
    Filesize

    107KB

    MD5

    4bf892a854af9af2802f526837819f6e

    SHA1

    09f2e9938466e74a67368ecd613efdc57f80c30b

    SHA256

    713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf

    SHA512

    7ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44

  • \Program Files (x86)\Company\NewProduct\jshainx.exe
    Filesize

    107KB

    MD5

    2647a5be31a41a39bf2497125018dbce

    SHA1

    a1ac856b9d6556f5bb3370f0342914eb7cbb8840

    SHA256

    84c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665

    SHA512

    68f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.4MB

    MD5

    8df3405e9cd1a18d10568e0d32e6dc39

    SHA1

    a084252242da8dbf97f23d7785fdf2b8d9677d3b

    SHA256

    79516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b

    SHA512

    6f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87

  • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
    Filesize

    1.4MB

    MD5

    8df3405e9cd1a18d10568e0d32e6dc39

    SHA1

    a084252242da8dbf97f23d7785fdf2b8d9677d3b

    SHA256

    79516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b

    SHA512

    6f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87

  • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
    Filesize

    107KB

    MD5

    bbd8ea73b7626e0ca5b91d355df39b7f

    SHA1

    66e298653beb7f652eb44922010910ced6242879

    SHA256

    1aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e

    SHA512

    625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f

  • \Program Files (x86)\Company\NewProduct\rawxdev.exe
    Filesize

    1.2MB

    MD5

    919cf73749642aa08fb76e9254af5efa

    SHA1

    08c25ab3572b9035496aec516342e37a25a84883

    SHA256

    2a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3

    SHA512

    5b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • \Program Files (x86)\Company\NewProduct\real.exe
    Filesize

    286KB

    MD5

    8a370815d8a47020150efa559ffdf736

    SHA1

    ba9d8df8f484b8da51161a0e29fd29e5001cff5d

    SHA256

    975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58

    SHA512

    d2eb60e220f64e76ebed2b051cc14f3a2da29707d8b2eb52fb41760800f11eafeb8bb3f1f8edcfca693a791aa60e56e263063f2b72abe4ad8784061feee6f7bf

  • \Program Files (x86)\Company\NewProduct\safert44.exe
    Filesize

    246KB

    MD5

    414ffd7094c0f50662ffa508ca43b7d0

    SHA1

    6ec67bd53da2ff3d5538a3afcc6797af1e5a53fb

    SHA256

    d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee

    SHA512

    c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399

  • \Program Files (x86)\Company\NewProduct\tag.exe
    Filesize

    107KB

    MD5

    2ebc22860c7d9d308c018f0ffb5116ff

    SHA1

    78791a83f7161e58f9b7df45f9be618e9daea4cd

    SHA256

    8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

    SHA512

    d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

  • \Users\Admin\AppData\Local\Temp\MinecraftForge.exe
    Filesize

    71KB

    MD5

    f8370d132f334be6703ce54b08db1578

    SHA1

    55d98f702724f25535bfbeb7a46cee92d57a4421

    SHA256

    2b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6

    SHA512

    0eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b

  • memory/432-95-0x0000000000000000-mapping.dmp
  • memory/520-167-0x000000000065B000-0x000000000066C000-memory.dmp
    Filesize

    68KB

  • memory/520-121-0x000000000065B000-0x000000000066C000-memory.dmp
    Filesize

    68KB

  • memory/520-102-0x000000000065B000-0x000000000066C000-memory.dmp
    Filesize

    68KB

  • memory/520-103-0x0000000000220000-0x0000000000230000-memory.dmp
    Filesize

    64KB

  • memory/520-104-0x0000000000400000-0x000000000046E000-memory.dmp
    Filesize

    440KB

  • memory/520-57-0x0000000000000000-mapping.dmp
  • memory/616-64-0x0000000000000000-mapping.dmp
  • memory/616-76-0x00000000003F0000-0x0000000000410000-memory.dmp
    Filesize

    128KB

  • memory/808-97-0x00000000012D0000-0x00000000012F0000-memory.dmp
    Filesize

    128KB

  • memory/808-81-0x0000000000000000-mapping.dmp
  • memory/1168-101-0x0000000000380000-0x0000000000386000-memory.dmp
    Filesize

    24KB

  • memory/1168-72-0x0000000000000000-mapping.dmp
  • memory/1168-79-0x0000000000190000-0x00000000001D4000-memory.dmp
    Filesize

    272KB

  • memory/1240-86-0x0000000000000000-mapping.dmp
  • memory/1240-98-0x0000000000B20000-0x0000000000B40000-memory.dmp
    Filesize

    128KB

  • memory/1432-75-0x0000000000000000-mapping.dmp
  • memory/1432-99-0x00000000008B0000-0x00000000008D0000-memory.dmp
    Filesize

    128KB

  • memory/1524-122-0x0000000060900000-0x0000000060992000-memory.dmp
    Filesize

    584KB

  • memory/1524-68-0x0000000000000000-mapping.dmp
  • memory/1620-107-0x0000000000400000-0x000000000056A000-memory.dmp
    Filesize

    1.4MB

  • memory/1620-105-0x0000000001EA0000-0x0000000001EB2000-memory.dmp
    Filesize

    72KB

  • memory/1620-61-0x0000000000000000-mapping.dmp
  • memory/1936-91-0x0000000000000000-mapping.dmp
  • memory/1980-54-0x0000000075981000-0x0000000075983000-memory.dmp
    Filesize

    8KB

  • memory/3912-142-0x0000000000000000-mapping.dmp
  • memory/3912-146-0x0000000000390000-0x0000000000396000-memory.dmp
    Filesize

    24KB

  • memory/3912-145-0x00000000000F0000-0x0000000000108000-memory.dmp
    Filesize

    96KB