Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-08-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
71b5b59a6cd5822105c645f6da3dede9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
71b5b59a6cd5822105c645f6da3dede9.exe
Resource
win10v2004-20220812-en
General
-
Target
71b5b59a6cd5822105c645f6da3dede9.exe
-
Size
1.7MB
-
MD5
71b5b59a6cd5822105c645f6da3dede9
-
SHA1
dabf8ddb37a147e8b8a864f709979fc393c2b5f2
-
SHA256
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522
-
SHA512
ed77dc6dd253172fee2821a94d78cf030859fff8373f3bd2bc460459bfa22ebbd605f957ad4cda8dd1643d827cc30b0ab9b95efa3d8f8fb62c59e5fb8492ec91
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Extracted
redline
5076357887
195.54.170.157:16525
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
RuXaRR_GG
insttaller.com:40915
-
auth_value
4a733ff307847db3ee220c11d113a305
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule \Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline \Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline \Program Files (x86)\Company\NewProduct\jshainx.exe family_redline \Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline \Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline behavioral1/memory/932-99-0x0000000000240000-0x0000000000260000-memory.dmp family_redline behavioral1/memory/1776-98-0x00000000012C0000-0x00000000012E0000-memory.dmp family_redline behavioral1/memory/1568-96-0x00000000010B0000-0x00000000010D0000-memory.dmp family_redline behavioral1/memory/432-95-0x00000000009D0000-0x00000000009F0000-memory.dmp family_redline behavioral1/memory/1164-94-0x0000000000100000-0x0000000000144000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exesafert44.exereal.exejshainx.exetag.exeffnameedit.exerawxdev.exeEU1.exeMinecraftForge.exepid process 1104 F0geI.exe 532 kukurzka9000.exe 932 namdoitntn.exe 1164 safert44.exe 1000 real.exe 432 jshainx.exe 1776 tag.exe 1568 ffnameedit.exe 1376 rawxdev.exe 1848 EU1.exe 3608 MinecraftForge.exe -
Loads dropped DLL 15 IoCs
Processes:
71b5b59a6cd5822105c645f6da3dede9.exejshainx.exepid process 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 1764 71b5b59a6cd5822105c645f6da3dede9.exe 432 jshainx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 10 IoCs
Processes:
71b5b59a6cd5822105c645f6da3dede9.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\rawxdev.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\EU1.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 71b5b59a6cd5822105c645f6da3dede9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe 71b5b59a6cd5822105c645f6da3dede9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EE41B91-1AD8-11ED-B68C-6A6CB2F85B9F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ED8F801-1AD8-11ED-B68C-6A6CB2F85B9F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Processes:
jshainx.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 jshainx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 jshainx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 jshainx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 jshainx.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
real.exejshainx.exenamdoitntn.exesafert44.exeffnameedit.exeMinecraftForge.exepid process 1000 real.exe 432 jshainx.exe 932 namdoitntn.exe 1164 safert44.exe 1568 ffnameedit.exe 3608 MinecraftForge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
jshainx.exenamdoitntn.exesafert44.exeffnameedit.exeMinecraftForge.exedescription pid process Token: SeDebugPrivilege 432 jshainx.exe Token: SeDebugPrivilege 932 namdoitntn.exe Token: SeDebugPrivilege 1164 safert44.exe Token: SeDebugPrivilege 1568 ffnameedit.exe Token: SeDebugPrivilege 3608 MinecraftForge.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 1712 iexplore.exe 1940 iexplore.exe 1176 iexplore.exe 960 iexplore.exe 1656 iexplore.exe 1372 iexplore.exe 1516 iexplore.exe 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1940 iexplore.exe 1940 iexplore.exe 1712 iexplore.exe 1712 iexplore.exe 1656 iexplore.exe 1656 iexplore.exe 1176 iexplore.exe 1176 iexplore.exe 1516 iexplore.exe 1516 iexplore.exe 1788 iexplore.exe 1788 iexplore.exe 960 iexplore.exe 960 iexplore.exe 1372 iexplore.exe 1372 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71b5b59a6cd5822105c645f6da3dede9.exedescription pid process target process PID 1764 wrote to memory of 1372 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1372 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1372 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1372 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1712 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1712 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1712 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1712 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1788 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1788 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1788 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1788 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1940 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1940 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1940 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1940 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1516 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1516 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1516 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1516 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1656 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1656 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1656 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1656 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 960 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 960 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 960 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 960 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1176 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1176 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1176 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1176 1764 71b5b59a6cd5822105c645f6da3dede9.exe iexplore.exe PID 1764 wrote to memory of 1104 1764 71b5b59a6cd5822105c645f6da3dede9.exe F0geI.exe PID 1764 wrote to memory of 1104 1764 71b5b59a6cd5822105c645f6da3dede9.exe F0geI.exe PID 1764 wrote to memory of 1104 1764 71b5b59a6cd5822105c645f6da3dede9.exe F0geI.exe PID 1764 wrote to memory of 1104 1764 71b5b59a6cd5822105c645f6da3dede9.exe F0geI.exe PID 1764 wrote to memory of 532 1764 71b5b59a6cd5822105c645f6da3dede9.exe kukurzka9000.exe PID 1764 wrote to memory of 532 1764 71b5b59a6cd5822105c645f6da3dede9.exe kukurzka9000.exe PID 1764 wrote to memory of 532 1764 71b5b59a6cd5822105c645f6da3dede9.exe kukurzka9000.exe PID 1764 wrote to memory of 532 1764 71b5b59a6cd5822105c645f6da3dede9.exe kukurzka9000.exe PID 1764 wrote to memory of 932 1764 71b5b59a6cd5822105c645f6da3dede9.exe namdoitntn.exe PID 1764 wrote to memory of 932 1764 71b5b59a6cd5822105c645f6da3dede9.exe namdoitntn.exe PID 1764 wrote to memory of 932 1764 71b5b59a6cd5822105c645f6da3dede9.exe namdoitntn.exe PID 1764 wrote to memory of 932 1764 71b5b59a6cd5822105c645f6da3dede9.exe namdoitntn.exe PID 1764 wrote to memory of 1000 1764 71b5b59a6cd5822105c645f6da3dede9.exe real.exe PID 1764 wrote to memory of 1000 1764 71b5b59a6cd5822105c645f6da3dede9.exe real.exe PID 1764 wrote to memory of 1000 1764 71b5b59a6cd5822105c645f6da3dede9.exe real.exe PID 1764 wrote to memory of 1000 1764 71b5b59a6cd5822105c645f6da3dede9.exe real.exe PID 1764 wrote to memory of 1164 1764 71b5b59a6cd5822105c645f6da3dede9.exe safert44.exe PID 1764 wrote to memory of 1164 1764 71b5b59a6cd5822105c645f6da3dede9.exe safert44.exe PID 1764 wrote to memory of 1164 1764 71b5b59a6cd5822105c645f6da3dede9.exe safert44.exe PID 1764 wrote to memory of 1164 1764 71b5b59a6cd5822105c645f6da3dede9.exe safert44.exe PID 1764 wrote to memory of 1776 1764 71b5b59a6cd5822105c645f6da3dede9.exe tag.exe PID 1764 wrote to memory of 1776 1764 71b5b59a6cd5822105c645f6da3dede9.exe tag.exe PID 1764 wrote to memory of 1776 1764 71b5b59a6cd5822105c645f6da3dede9.exe tag.exe PID 1764 wrote to memory of 1776 1764 71b5b59a6cd5822105c645f6da3dede9.exe tag.exe PID 1764 wrote to memory of 432 1764 71b5b59a6cd5822105c645f6da3dede9.exe jshainx.exe PID 1764 wrote to memory of 432 1764 71b5b59a6cd5822105c645f6da3dede9.exe jshainx.exe PID 1764 wrote to memory of 432 1764 71b5b59a6cd5822105c645f6da3dede9.exe jshainx.exe PID 1764 wrote to memory of 432 1764 71b5b59a6cd5822105c645f6da3dede9.exe jshainx.exe PID 1764 wrote to memory of 1568 1764 71b5b59a6cd5822105c645f6da3dede9.exe ffnameedit.exe PID 1764 wrote to memory of 1568 1764 71b5b59a6cd5822105c645f6da3dede9.exe ffnameedit.exe PID 1764 wrote to memory of 1568 1764 71b5b59a6cd5822105c645f6da3dede9.exe ffnameedit.exe PID 1764 wrote to memory of 1568 1764 71b5b59a6cd5822105c645f6da3dede9.exe ffnameedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b5b59a6cd5822105c645f6da3dede9.exe"C:\Users\Admin\AppData\Local\Temp\71b5b59a6cd5822105c645f6da3dede9.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1AbtZ42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nhGL42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A3AZ42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1ALSZ42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe"C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\EU1.exe"C:\Program Files (x86)\Company\NewProduct\EU1.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD58df3405e9cd1a18d10568e0d32e6dc39
SHA1a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA25679516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
SHA5126f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
1.2MB
MD5919cf73749642aa08fb76e9254af5efa
SHA108c25ab3572b9035496aec516342e37a25a84883
SHA2562a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3
SHA5125b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD5efb1c4587813b33987d9d8b44bf72a9f
SHA1d258356a9141d11e7740c47ff062318d1d2d02d5
SHA256155305153deddb70697a19d7ef7e281bbb58a387f5a844c0844b96a389837d95
SHA512384e668d47dbaa716c2d9ed29f49c565e5df92c4a8ae250385d2af7b50c821c1bcfb7b4bf49d9c0652b2c4f58d42a4879749db67af18e582e6aa080d89142bfb
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7ED8D0F1-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
5KB
MD554588c631416220605baf5e974703267
SHA19c5bb7321a7d113ad0ecd14de7de979e9540f18a
SHA256a998a4c77440167354488b423a2a4f2e12f491f69cddae58229437a900977a5a
SHA512bcb60863000582afa17fe3fc2c28cb6f4a6d28a48dc00017ac2352d218dc5b336dc1aeb4a71f5a9dec293da0abf16b7c89d9fe3d92a473b4e721a9f964633ad5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7ED8F801-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
5KB
MD597ac6976b3a501b4a9f89d58c812bd04
SHA15d0aa199996f0c474223eb9134df9e65e51691a8
SHA256b7d66bc071c574318173dcd200ff1a854cf045c62829d7abbbb43150168c4d99
SHA512066bf245b9ad0c6b35a2d9481f91886bdc6f8a120db00bfa83e7518933defe53f3a8e7160ad992298c911a146efb35d9246baf09a88a76875ec7e0262a8fdca5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE41B91-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
3KB
MD59fb3010b70357760dfcba2d16c258ee3
SHA14d6a71f738e07516e582484f471bf729eaeb63e9
SHA256b2dfcbc394b492af6afbc915c8f7fd1db45c3a9acc861391feb7adc8f9bfbecd
SHA512acffa92607599b17fef16e508c04e210f4095d7b9f012d551273c3cd421ed0b8cb57eba2b66090e64306953b628e7e790b710628efbad90a9ef4329c457cb886
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE41B91-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
5KB
MD5e5c03ecf6fcdd6504031e393dbeea5f1
SHA1e1292736e41092f69378b9de115560da7543ada7
SHA2564e4ed769b057befc6074b00af651e1897722dd86555c8afd311010c5058f3d43
SHA512bcc02b6bed53e5f7f42c87269a1939a488027eeee3fb56ce868c18ebf5c29518abd1bfc67855352481802de95949f2ab09d23287946516efe4952ceac582260e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE79E01-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
3KB
MD58164f9ef02b31d4d647bf838cddad36e
SHA1d84ca45583905e9b31a6e1baa3b8bfb72b31f027
SHA256299f274c3a11594402f9972fb1ff7a94d740fcca568360b2388d133ec0ef4fb3
SHA512bf3f089147e4135da323f618d5d281f88bc9ed3cf1675722f8eb00c1464f6fafc5bb1c0674e07475bf5cfe546e711b6d38576b55609739a0e2e1d95213b11200
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE79E01-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
5KB
MD599399a539e47d029c351d185580aabf2
SHA100500a2bd756ce58c33a82029c9626d72ca2e3af
SHA25676bcc7016e13c54e6a43bbac4b6885b03ec9c1f0738d2d13abd013ece1348f2e
SHA512cf6e647bc04fbd3912a0fd490a53fe7e884f232f502c705a4bdeec9251ea8c5a14e5129a0c298938d8a623c1f93f46fcaac1fa88b3fc7cf41631ce89c21e6fa8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE94BB1-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
4KB
MD56c3125cb4ce49eb38363f5b7e0c353ae
SHA1e8e349c268e95acdabf11091b69988603c735561
SHA2566e93fe2e5dbfa5f81386720b73ed1fabbd21505f4a3c3949aef8e148641016f3
SHA512fd7673a1b516be711f8d996f9d54083583daca34b00ccb331f34593814522dc146a668f3dbe1651bd1703a1d19d3fe149273874896ddea37c5b546d9f5c47433
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7EE94BB1-1AD8-11ED-B68C-6A6CB2F85B9F}.datFilesize
3KB
MD59154f2ded1939446ddf3a909de4e3843
SHA1205f20834dbf393dc7a805f8e7a995e398547d66
SHA256105c554c4891a4d89303f973414e9ccbd7d13c0c7774a4dbd844bf7f7f06199d
SHA51231fee3ac98a6bc7c7ed54bd0af98f099a6792156194cb1b5ced26ef7bd0e16aec046320f03b0011cb271a00e83b774e314e1135423d78b4d3c2aaec7333a12c5
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exeFilesize
71KB
MD5f8370d132f334be6703ce54b08db1578
SHA155d98f702724f25535bfbeb7a46cee92d57a4421
SHA2562b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
SHA5120eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exeFilesize
71KB
MD5f8370d132f334be6703ce54b08db1578
SHA155d98f702724f25535bfbeb7a46cee92d57a4421
SHA2562b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
SHA5120eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EZG6N79J.txtFilesize
608B
MD599c0776882514d2169e1f9bb9545e1c9
SHA15d972f101864640e9c415095e040dcac4092913a
SHA256df2f10fe6e47c540e7a6b29752e7314aba0f63715818c278be059e825917aad5
SHA5123919e3917b5a15f4879068bc48ef7e61154657a1ec70e843427990ed33980c61c2c44bd22ba90866b67b6e2898652515586fa720a12166b0e1e189ffc04a9504
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD58df3405e9cd1a18d10568e0d32e6dc39
SHA1a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA25679516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
SHA5126f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD58df3405e9cd1a18d10568e0d32e6dc39
SHA1a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA25679516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
SHA5126f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87
-
\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
1.2MB
MD5919cf73749642aa08fb76e9254af5efa
SHA108c25ab3572b9035496aec516342e37a25a84883
SHA2562a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3
SHA5125b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
\Users\Admin\AppData\Local\Temp\MinecraftForge.exeFilesize
71KB
MD5f8370d132f334be6703ce54b08db1578
SHA155d98f702724f25535bfbeb7a46cee92d57a4421
SHA2562b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
SHA5120eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b
-
memory/432-80-0x0000000000000000-mapping.dmp
-
memory/432-95-0x00000000009D0000-0x00000000009F0000-memory.dmpFilesize
128KB
-
memory/532-107-0x0000000000400000-0x000000000056A000-memory.dmpFilesize
1.4MB
-
memory/532-106-0x00000000002C0000-0x00000000002D2000-memory.dmpFilesize
72KB
-
memory/532-61-0x0000000000000000-mapping.dmp
-
memory/932-64-0x0000000000000000-mapping.dmp
-
memory/932-99-0x0000000000240000-0x0000000000260000-memory.dmpFilesize
128KB
-
memory/1000-69-0x0000000000000000-mapping.dmp
-
memory/1000-122-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/1104-104-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1104-57-0x0000000000000000-mapping.dmp
-
memory/1104-149-0x00000000005FB000-0x000000000060C000-memory.dmpFilesize
68KB
-
memory/1104-105-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1104-103-0x00000000005FB000-0x000000000060C000-memory.dmpFilesize
68KB
-
memory/1104-141-0x00000000005FB000-0x000000000060C000-memory.dmpFilesize
68KB
-
memory/1164-72-0x0000000000000000-mapping.dmp
-
memory/1164-94-0x0000000000100000-0x0000000000144000-memory.dmpFilesize
272KB
-
memory/1164-108-0x00000000002C0000-0x00000000002C6000-memory.dmpFilesize
24KB
-
memory/1376-89-0x0000000000000000-mapping.dmp
-
memory/1568-96-0x00000000010B0000-0x00000000010D0000-memory.dmpFilesize
128KB
-
memory/1568-82-0x0000000000000000-mapping.dmp
-
memory/1764-54-0x0000000076261000-0x0000000076263000-memory.dmpFilesize
8KB
-
memory/1776-76-0x0000000000000000-mapping.dmp
-
memory/1776-98-0x00000000012C0000-0x00000000012E0000-memory.dmpFilesize
128KB
-
memory/1848-93-0x0000000000000000-mapping.dmp
-
memory/3608-143-0x0000000000000000-mapping.dmp
-
memory/3608-146-0x0000000001080000-0x0000000001098000-memory.dmpFilesize
96KB
-
memory/3608-147-0x0000000000540000-0x0000000000546000-memory.dmpFilesize
24KB