Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2022 15:19

General

  • Target

    1d4954ca060b4eaec6ae327a5c7ab379ea6892b591858d0d03de67ccd87de996.exe

  • Size

    1.4MB

  • MD5

    0437918badc36e49aec44d6b07dea2ab

  • SHA1

    6ed87877260a6f566f1aa8fd6d9edcc26b3c8815

  • SHA256

    1d4954ca060b4eaec6ae327a5c7ab379ea6892b591858d0d03de67ccd87de996

  • SHA512

    918186ff02884996dfb1c902e8c32e807f1dc34ce6f4424e6864a5043c987e55bb411ce811192dbafac471992e666027de1541fa895d9948f90ecedca567ce45

  • SSDEEP

    24576:pAT8QE+k4j8L5W6+QqPgXOuhtFYJH3qlXPdu/NGb/r/fE5SZSledc9tGnJcnUZ/g:pAI+3YLA6eJUtI3+Xlu07fG8dcvaJcn/

Malware Config

Extracted

Family

vidar

Version

53.3

Botnet

1571

C2

http://146.19.247.145:80

http://146.19.247.187:80

Attributes
  • profile_id

    1571

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:18728

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

vidar

Version

53.4

Botnet

1557

C2

http://91.242.229.63:80

http://91.242.229.89:80

http://91.242.229.111:80

Attributes
  • profile_id

    1557

Extracted

Family

redline

Botnet

4

C2

31.41.244.134:11643

Attributes
  • auth_value

    a516b2d034ecd34338f12b50347fbd92

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

https://t.me/insttailer

C2

185.199.224.90:37143

Attributes
  • auth_value

    1e73e022970e3ad55c62cb5010e7599b

Extracted

Family

redline

Botnet

5076357887

C2

185.87.149.167:31402

Attributes
  • auth_value

    0dfaff60271d374d0c206d19883e06f3

Extracted

Family

vidar

Version

53.4

Botnet

1521

C2

http://62.204.41.126:80

Attributes
  • profile_id

    1521

Extracted

Family

raccoon

Botnet

315dc1dd84dd7b872ce61c63b12c8944

C2

http://146.19.247.91/

rc4.plain

Extracted

Family

privateloader

C2

http://163.123.143.4/proxies.txt

http://193.233.177.215/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

163.123.143.12

http://91.241.19.125/pub.php?pub=one

http://sarfoods.com/index.php

http://107.182.129.251/server.txt

Attributes
  • payload_url

    https://cdn.discordapp.com/attachments/1003879548242374749/1003976870611669043/NiceProcessX64.bmp

    https://cdn.discordapp.com/attachments/1003879548242374749/1003976754358124554/NiceProcessX32.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp

    https://c.xyzgamec.com/userdown/2202/random.exe

    http://193.56.146.76/Proxytest.exe

    http://www.yzsyjyjh.com/askhelp23/askinstall23.exe

    http://privacy-tools-for-you-780.com/downloads/toolspab3.exe

    http://luminati-china.xyz/aman/casper2.exe

    https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe

    http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe

    https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp

    http://185.215.113.208/ferrari.exe

    https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp

    https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp

    https://c.xyzgamec.com/userdown/2202/random.exe

    http://mnbuiy.pw/adsli/note8876.exe

    http://www.yzsyjyjh.com/askhelp23/askinstall23.exe

    http://luminati-china.xyz/aman/casper2.exe

    https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe

    http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe

    https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe

    https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe

    https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe

    https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe

    https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp

Extracted

Family

raccoon

Botnet

27f434caa92497d1b6f4b36154ae9141

C2

http://45.182.189.196/

rc4.plain

Extracted

Family

djvu

C2

http://acacaca.org/test3/get.php

Attributes
  • extension

    .aamv

  • offline_id

    MyudhIExJux2oRQXw95TT1oAPu7mvqRMzxr1eet1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://acacaca.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-4Xcf4IX21n Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0564Jhyjd

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 5 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 24 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 24 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 35 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d4954ca060b4eaec6ae327a5c7ab379ea6892b591858d0d03de67ccd87de996.exe
    "C:\Users\Admin\AppData\Local\Temp\1d4954ca060b4eaec6ae327a5c7ab379ea6892b591858d0d03de67ccd87de996.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1n7LH4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1776
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2412
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1868
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2480
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1408
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1408 CREDAT:275458 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2472
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2440
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RchC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2464
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC4
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:840
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2448
    • C:\Program Files (x86)\Company\NewProduct\real.exe
      "C:\Program Files (x86)\Company\NewProduct\real.exe"
      2⤵
      • Executes dropped EXE
      PID:1108
    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
      2⤵
      • Executes dropped EXE
      PID:1928
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      PID:1796
    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      "C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1052
    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
      2⤵
      • Executes dropped EXE
      PID:1368
    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      "C:\Program Files (x86)\Company\NewProduct\tag.exe"
      2⤵
      • Executes dropped EXE
      PID:1352
    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
      2⤵
      • Executes dropped EXE
      PID:1884
    • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
      "C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"
      2⤵
      • Executes dropped EXE
      PID:1496
    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
      2⤵
      • Executes dropped EXE
      PID:692
    • C:\Program Files (x86)\Company\NewProduct\g3rgg.exe
      "C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:972
      • C:\Users\Admin\Pictures\Adobe Films\fItcJPCWHWEnhZxJU7_gA0lr.exe
        "C:\Users\Admin\Pictures\Adobe Films\fItcJPCWHWEnhZxJU7_gA0lr.exe"
        3⤵
        • Executes dropped EXE
        PID:3760
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3760 -s 100
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:392
      • C:\Users\Admin\Pictures\Adobe Films\SKZkmTvvk0vKW6vBjCG5uQIc.exe
        "C:\Users\Admin\Pictures\Adobe Films\SKZkmTvvk0vKW6vBjCG5uQIc.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
      • C:\Users\Admin\Pictures\Adobe Films\av_i0LphtcmrgDd11XbSkaDr.exe
        "C:\Users\Admin\Pictures\Adobe Films\av_i0LphtcmrgDd11XbSkaDr.exe"
        3⤵
        • Executes dropped EXE
        PID:3432
      • C:\Users\Admin\Pictures\Adobe Films\KnCRPa9kAFQ1SkJRQoAuVR3U.exe
        "C:\Users\Admin\Pictures\Adobe Films\KnCRPa9kAFQ1SkJRQoAuVR3U.exe"
        3⤵
        • Executes dropped EXE
        PID:3424
      • C:\Users\Admin\Pictures\Adobe Films\PNK2qDH4B2zHtjEFakizB6zN.exe
        "C:\Users\Admin\Pictures\Adobe Films\PNK2qDH4B2zHtjEFakizB6zN.exe"
        3⤵
        • Executes dropped EXE
        PID:3828
      • C:\Users\Admin\Pictures\Adobe Films\lrPtX_Gb8SH8OaXKghIOS0Xq.exe
        "C:\Users\Admin\Pictures\Adobe Films\lrPtX_Gb8SH8OaXKghIOS0Xq.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2956
      • C:\Users\Admin\Pictures\Adobe Films\qTRyj3Z4uOtMFbVGJ35FPke5.exe
        "C:\Users\Admin\Pictures\Adobe Films\qTRyj3Z4uOtMFbVGJ35FPke5.exe"
        3⤵
        • Executes dropped EXE
        PID:2392
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:184656
        • C:\Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe
          "C:\Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2244
          • C:\Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe
            "C:\Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:5128
        • C:\Users\Admin\Pictures\Adobe Films\1K4dGgD18_IpnoAhp7irlCBO.exe
          "C:\Users\Admin\Pictures\Adobe Films\1K4dGgD18_IpnoAhp7irlCBO.exe"
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:2372
        • C:\Users\Admin\Pictures\Adobe Films\XTGb5xqUE7UViv5WwvlYAe5l.exe
          "C:\Users\Admin\Pictures\Adobe Films\XTGb5xqUE7UViv5WwvlYAe5l.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          PID:2908
          • C:\Users\Admin\Documents\CJkUoqm7lbZvg7RaRm4RatIe.exe
            "C:\Users\Admin\Documents\CJkUoqm7lbZvg7RaRm4RatIe.exe"
            4⤵
            • Executes dropped EXE
            PID:178352
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:184704
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:184760
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RqCC4
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1552
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:2
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2432
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nNrK4
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1060
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:275457 /prefetch:2
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2488
      • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
        "C:\Program Files (x86)\Company\NewProduct\jshainx.exe"
        2⤵
        • Executes dropped EXE
        PID:1604
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1nzwK4
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1596
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:2
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2456
      • C:\Program Files (x86)\Company\NewProduct\me.exe
        "C:\Program Files (x86)\Company\NewProduct\me.exe"
        2⤵
        • Executes dropped EXE
        PID:1648

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    1
    T1089

    Virtualization/Sandbox Evasion

    1
    T1497

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    5
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
      Filesize

      173KB

      MD5

      c5acc7e661db592ec6208d6147d5b165

      SHA1

      642f9ab10434a77ed016921401c9361b1bb36639

      SHA256

      98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

      SHA512

      92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

    • C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe
      Filesize

      173KB

      MD5

      c5acc7e661db592ec6208d6147d5b165

      SHA1

      642f9ab10434a77ed016921401c9361b1bb36639

      SHA256

      98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

      SHA512

      92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

    • C:\Program Files (x86)\Company\NewProduct\g3rgg.exe
      Filesize

      386KB

      MD5

      59be2ebcf6516dd07ee5df8eae402523

      SHA1

      e4e5b949a0c9721e4c89f124750d8a97e4d96c7e

      SHA256

      d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a

      SHA512

      9148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2

    • C:\Program Files (x86)\Company\NewProduct\g3rgg.exe
      Filesize

      386KB

      MD5

      59be2ebcf6516dd07ee5df8eae402523

      SHA1

      e4e5b949a0c9721e4c89f124750d8a97e4d96c7e

      SHA256

      d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a

      SHA512

      9148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2

    • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
      Filesize

      107KB

      MD5

      b754a7159fff494383d9e7de4709aa53

      SHA1

      a25f172b4ed0b0a567594ad693483c821f2af14d

      SHA256

      4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

      SHA512

      ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

    • C:\Program Files (x86)\Company\NewProduct\jshainx.exe
      Filesize

      107KB

      MD5

      b754a7159fff494383d9e7de4709aa53

      SHA1

      a25f172b4ed0b0a567594ad693483c821f2af14d

      SHA256

      4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

      SHA512

      ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.1MB

      MD5

      b0d7a19c257498a2ddf4ff73a9b6fbcf

      SHA1

      07233b967c956c3cfd5498c2db6a2251769704ff

      SHA256

      45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

      SHA512

      60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

    • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.1MB

      MD5

      b0d7a19c257498a2ddf4ff73a9b6fbcf

      SHA1

      07233b967c956c3cfd5498c2db6a2251769704ff

      SHA256

      45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

      SHA512

      60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

    • C:\Program Files (x86)\Company\NewProduct\me.exe
      Filesize

      289KB

      MD5

      ba9d6ca5408c517da107fd4ee6cec610

      SHA1

      cbf27fb8cca2aadc5378fd4f01a32178df222bfd

      SHA256

      b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834

      SHA512

      b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e

    • C:\Program Files (x86)\Company\NewProduct\me.exe
      Filesize

      289KB

      MD5

      ba9d6ca5408c517da107fd4ee6cec610

      SHA1

      cbf27fb8cca2aadc5378fd4f01a32178df222bfd

      SHA256

      b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834

      SHA512

      b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • C:\Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • C:\Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      e699a82cef03ea485495a78f74af733d

      SHA1

      c5d3719a8a05f27e4f733294b8b89838f204fc64

      SHA256

      206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

      SHA512

      887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

    • C:\Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      e699a82cef03ea485495a78f74af733d

      SHA1

      c5d3719a8a05f27e4f733294b8b89838f204fc64

      SHA256

      206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

      SHA512

      887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
      Filesize

      717B

      MD5

      ec8ff3b1ded0246437b1472c69dd1811

      SHA1

      d813e874c2524e3a7da6c466c67854ad16800326

      SHA256

      e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

      SHA512

      e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      60KB

      MD5

      6c6a24456559f305308cb1fb6c5486b3

      SHA1

      3273ac27d78572f16c3316732b9756ebc22cb6ed

      SHA256

      efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

      SHA512

      587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
      Filesize

      192B

      MD5

      d3617b3ab78a3c3747f9e77f9a1abc54

      SHA1

      da75b54956e86548be7a96b76a361285512247df

      SHA256

      fc3002473837180571457dce231f87ee8df6f60afc198746a6b8d3e3807bc9bf

      SHA512

      2fffba7f0747fb6b4fb5cb53e69d7bd8054cdaffc5e1a0ba2d436c26e77c58ad717eaeb72446b680827804851d4a2e670108269d69b9dd48fa7c0aef672f56da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0dd9eadb89b12fb111837b11412719e8

      SHA1

      dcaf87936347fc46a2d768afbc0a2763b9a4067b

      SHA256

      cba3154516a79e71e19d6f0f923f8b06276c72d9ac1d9eb61f42e919c073a94b

      SHA512

      8baeee050a4dde4cc5ad76c2451287c8ee17442043d4e3a26612994a43a11d8c947b6eaed95544ef78f7ab9e78b6f9cf28231f297541dc8a6d77f2e08ed3d43b

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{71493491-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      5KB

      MD5

      b60435bbc6093029ff862662d4751bab

      SHA1

      78e94fc5b28735c0b976ca20f55e5284e01c237c

      SHA256

      f0dd0c9fc5ea019a1b248e1bf7b41cb33350e526af2bf4afca38234be5be8e83

      SHA512

      7ce296356422cb18fc7396ad6d135fa9155ef4a60fb3d3113bceb57d3cb64d6dcfa07cc29e13443cb8b5157e375c841a4fb1621a29b9f4cab313b09c2949dd3a

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{71495BA1-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      3KB

      MD5

      f71c103e080d18e50bbf8583509b984f

      SHA1

      88c3c122f9e3c2585797cd030bac830090a80211

      SHA256

      a02f2913de1fc0e7639b86766934df0a6c012ec5e6a470a0ad4beeb6b8e6f2e6

      SHA512

      66a62d707277b4b4248b08a4577ee3fb12efa698e59d28cbd45457e7729dff3022fb6a6cbce2a018b9235e42dc47e8c2dc3b62d01020114ae2206d1f2ec1a0e6

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{71495BA1-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      5KB

      MD5

      acb5df22b0d3e2ccbafc62abf9f7ae3b

      SHA1

      af5a1bfae208beef33118da427aba193a46572b6

      SHA256

      4b04408ca8ce3c5efb95d765034364c7bafafd24b3ae065a5f93720ea87d618c

      SHA512

      eef27321029917a8bb697b0a255a823f809559c7ff17cc74426fc55e9dfa61cbfc3cdc6fb707c00c24ec42b96e4130ae8d18995905b89a4a2d1235430cf885de

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{714B95F1-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      3KB

      MD5

      628774dab296261b0ffe52ab2a2e9f6e

      SHA1

      5609287aabae22c6928fac7d82ff516911ac1d26

      SHA256

      f7175ae80eed7bb48b197c61fd106874ec8e6a2bacde0a16f7fc708bf53dec99

      SHA512

      9e191ee83c092f94f77d52f97932e7805b010eeb55ac3ef0717234499d2fefc06c5f96da1b614aab6142373cd84f40fb6473aefd10c90273643572d4dd6e6a1d

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7266D991-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      5KB

      MD5

      2819301fe09cfdcec87b2e14c6e7903b

      SHA1

      4d3235f355271e79edfa572ddb1e9fa560285315

      SHA256

      c5c5c6e025fac64ed9e2de9132254d55fcdf26c434a3d60fd12a8c3061edb0db

      SHA512

      9713844246701a7c04396d2a691e9d6309ebe3dc854cbd42930de53f628a62a10192ab1af3ae8f6b88c078f931a78480c1e180b999c92c33ed974c8c5822c97d

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{72705F11-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      5KB

      MD5

      e8fee9cd5e6f8a68f544b3e09526a4e1

      SHA1

      3c1619fc5cc7426b5aecd5d0361971ec2309c9ed

      SHA256

      d998f1812367c163faac0510753cc49324c77decf03360936fee047eac54114a

      SHA512

      2c9569e26a6119e533434a1a4284712aaa2b47d358a37f7456aeaf560e35bb21ea9dbd6b13a28377eea90ce2c71588ea0eb789d6d4757888dcdface2f0e67b9f

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7285CB71-3908-11ED-8C11-42FEA5F7B9B2}.dat
      Filesize

      3KB

      MD5

      1179d7e776de7850110dc21b2720e493

      SHA1

      35ca47c4eb3792b0c21db3c4de296b3a049fa5ba

      SHA256

      4eec37606a0f7c97da04dbd51144eeaece4da818ed98188a6510982779b629fa

      SHA512

      2189d7f7299f3a72fa9b5887f8f0a3c2401979880b299dd61ef0a850a53115efe5cd6a51ea247b1e88c06cad1cdf578ff37637b261ae13bde7f49929a400c607

    • C:\Users\Admin\Pictures\Adobe Films\av_i0LphtcmrgDd11XbSkaDr.exe
      Filesize

      2.8MB

      MD5

      798329fec74c27855f9aa3280bc62e60

      SHA1

      79b3c001db159891b45977789e055d98c83a8994

      SHA256

      d34d9744eb3ebc420cb831db1cf6ebd51c8ac7d1952d83d4dc192a9d57d906b2

      SHA512

      93effa121dcd5f639790b5745508e3d0b17cc1dfa985926e4a9efa01f4fa15f385572c6252b7948c9a089dbbfee264f084e10e444c3cddeafc4cc7cf2f0991b6

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • \Program Files (x86)\Company\NewProduct\F0geI.exe
      Filesize

      290KB

      MD5

      8ab8fc20b7ab8b18bf0f474cc0156523

      SHA1

      21b922f6dcd49b67b5b3abc9603ec90835e7a20d

      SHA256

      b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca

      SHA512

      ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2

    • \Program Files (x86)\Company\NewProduct\ffnameedit.exe
      Filesize

      173KB

      MD5

      c5acc7e661db592ec6208d6147d5b165

      SHA1

      642f9ab10434a77ed016921401c9361b1bb36639

      SHA256

      98169ab9ee35cdca15321683fe25378988a02350c9c09236d022c1202714fa4d

      SHA512

      92f06ee866222d47496d43ac4228e43aad2886c1a6195015d6ffa40f95fef2f803f2754e4efe620fde60808cb55a42e5c9a294098718d63f419a2e282d912161

    • \Program Files (x86)\Company\NewProduct\g3rgg.exe
      Filesize

      386KB

      MD5

      59be2ebcf6516dd07ee5df8eae402523

      SHA1

      e4e5b949a0c9721e4c89f124750d8a97e4d96c7e

      SHA256

      d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a

      SHA512

      9148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2

    • \Program Files (x86)\Company\NewProduct\jshainx.exe
      Filesize

      107KB

      MD5

      b754a7159fff494383d9e7de4709aa53

      SHA1

      a25f172b4ed0b0a567594ad693483c821f2af14d

      SHA256

      4eaae9daa081304d9281c56bc508ebdb5b83f7d717784da04a08d934304f06f4

      SHA512

      ec244aa45a717c7374d564930a48b9b2eb151fbf2643711a9658dbb4df830d60651179a652f9281b1f56f1490e6796fb8e0ecb8fb5167fb6921f424549dddb33

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.1MB

      MD5

      b0d7a19c257498a2ddf4ff73a9b6fbcf

      SHA1

      07233b967c956c3cfd5498c2db6a2251769704ff

      SHA256

      45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

      SHA512

      60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

    • \Program Files (x86)\Company\NewProduct\kukurzka9000.exe
      Filesize

      1.1MB

      MD5

      b0d7a19c257498a2ddf4ff73a9b6fbcf

      SHA1

      07233b967c956c3cfd5498c2db6a2251769704ff

      SHA256

      45bb46dc46d924cba64dfb24d80656a9e11c0d83d506431c86ddc58e3487b1f3

      SHA512

      60ed892b712b69befb78138cc096a6cb17d367cd1a2e6ab9010d485d9e583aff226aff67cf23d04170bbbd679652ed03ec72cdd67507db8450dab3fc9ecd7147

    • \Program Files (x86)\Company\NewProduct\me.exe
      Filesize

      289KB

      MD5

      ba9d6ca5408c517da107fd4ee6cec610

      SHA1

      cbf27fb8cca2aadc5378fd4f01a32178df222bfd

      SHA256

      b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834

      SHA512

      b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e

    • \Program Files (x86)\Company\NewProduct\me.exe
      Filesize

      289KB

      MD5

      ba9d6ca5408c517da107fd4ee6cec610

      SHA1

      cbf27fb8cca2aadc5378fd4f01a32178df222bfd

      SHA256

      b8d34c685e42f7db3219a45d06ff76fce32db0c62b7f87987a834fc79046f834

      SHA512

      b402eca0bf73bf3e2090042d5498aec6c1d85b5a8b712a4b01c7c6ea3ffb91b61ea0f848881704d71f3fcf3b2d7fb02485852b90cf3c5fb484921e580675ca3e

    • \Program Files (x86)\Company\NewProduct\namdoitntn.exe
      Filesize

      245KB

      MD5

      b16134159e66a72fb36d93bc703b4188

      SHA1

      e869e91a2b0f77e7ac817e0b30a9a23d537b3001

      SHA256

      b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c

      SHA512

      3fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • \Program Files (x86)\Company\NewProduct\real.exe
      Filesize

      289KB

      MD5

      cf25b95144c2766ff8d6af9439b77596

      SHA1

      467cfb3e63b9da2b1c03bc712ab08cdb8fa71034

      SHA256

      df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c

      SHA512

      bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d

    • \Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      e699a82cef03ea485495a78f74af733d

      SHA1

      c5d3719a8a05f27e4f733294b8b89838f204fc64

      SHA256

      206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

      SHA512

      887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

    • \Program Files (x86)\Company\NewProduct\romb_ro.exe
      Filesize

      289KB

      MD5

      e699a82cef03ea485495a78f74af733d

      SHA1

      c5d3719a8a05f27e4f733294b8b89838f204fc64

      SHA256

      206104c8b944adca4068bf6d7c89fb28c68884f63d013f7dd0f67270a8220b97

      SHA512

      887c81ef11f4c4b5d4e135e9b6d740ce1cbfce873302c0ef80ae636492ff53a763b4ea7ad961c2bbc8b967de7a78e3ac8d3965acb679fbf69dd396466c0950a0

    • \Program Files (x86)\Company\NewProduct\safert44.exe
      Filesize

      244KB

      MD5

      dbe947674ea388b565ae135a09cc6638

      SHA1

      ae8e1c69bd1035a92b7e06baad5e387de3a70572

      SHA256

      86aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709

      SHA512

      67441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893

    • \Program Files (x86)\Company\NewProduct\tag.exe
      Filesize

      107KB

      MD5

      2ebc22860c7d9d308c018f0ffb5116ff

      SHA1

      78791a83f7161e58f9b7df45f9be618e9daea4cd

      SHA256

      8e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89

      SHA512

      d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e

    • \Users\Admin\Pictures\Adobe Films\1K4dGgD18_IpnoAhp7irlCBO.exe
      Filesize

      274KB

      MD5

      04c17a46451549dc481f45b161322744

      SHA1

      6a69b46336de2bbdce5d58396a5f41adc6747ab3

      SHA256

      cd5ea97075885b74547285f69cfc20191c13f669cec2b9b1274674260fd228af

      SHA512

      84fa7deb9b08488772f976048b7c83537c34cad75cde1cede3c2a4ff5226248c702e6b50a418fc0bac7ac6f05f995c6f434e3e58ba43196dc86c4d6b8e57e029

    • \Users\Admin\Pictures\Adobe Films\1K4dGgD18_IpnoAhp7irlCBO.exe
      Filesize

      274KB

      MD5

      04c17a46451549dc481f45b161322744

      SHA1

      6a69b46336de2bbdce5d58396a5f41adc6747ab3

      SHA256

      cd5ea97075885b74547285f69cfc20191c13f669cec2b9b1274674260fd228af

      SHA512

      84fa7deb9b08488772f976048b7c83537c34cad75cde1cede3c2a4ff5226248c702e6b50a418fc0bac7ac6f05f995c6f434e3e58ba43196dc86c4d6b8e57e029

    • \Users\Admin\Pictures\Adobe Films\KnCRPa9kAFQ1SkJRQoAuVR3U.exe
      Filesize

      1.6MB

      MD5

      b4b4c9851632ce05e71e17a8406396e6

      SHA1

      cfa8e222e14b2af0739613190924a957ccb23234

      SHA256

      1c4bb6054dc315840ce6fc87b77dfa3921db434962bd1b9a8da62830a5368c07

      SHA512

      758adba1cd5c9e9dfc6ec10386bf7fdf01eb96b686cbaa6c0a6cc61b3eceb913d88d129b5f2b180308400f2e234aef41a6435afbb5f38eaef873ca35a44c05e7

    • \Users\Admin\Pictures\Adobe Films\PNK2qDH4B2zHtjEFakizB6zN.exe
      Filesize

      2.6MB

      MD5

      7bc7d60e8178d0a04a756200675f0ece

      SHA1

      a5cab5575a499e8bcf96cdbd5bca5af5f167cf9d

      SHA256

      fb0816b55ce0416b43f909bd41ec2083d8b1715b0765c04cd09eac6ef5c804e5

      SHA512

      5042f8c126a3ff911177e3ac5643a4626f9e85e1b0d009a356e543420446fe751921377dc1436e23b40b8f90ab96ad0e23af5d001f3c6eaf31fb758cafa4c424

    • \Users\Admin\Pictures\Adobe Films\SKZkmTvvk0vKW6vBjCG5uQIc.exe
      Filesize

      2.8MB

      MD5

      5c2e2d2013567a6f66fb9628647e2032

      SHA1

      49a538c91bd048fa965a7aba149dc877fd7e3468

      SHA256

      8489216ba6ebef2beae044f188cf01114cc8d91546fe6a00ccb8651558990925

      SHA512

      007bbdb6b34bc09e65eb224855dd8e0f4de14fe670d7e853f057846b13aa79aca3d866c79ec2a21a92c79ca04cb8dbd7b91f889689b2f977081572201332f191

    • \Users\Admin\Pictures\Adobe Films\XTGb5xqUE7UViv5WwvlYAe5l.exe
      Filesize

      400KB

      MD5

      9519c85c644869f182927d93e8e25a33

      SHA1

      eadc9026e041f7013056f80e068ecf95940ea060

      SHA256

      f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b

      SHA512

      dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23

    • \Users\Admin\Pictures\Adobe Films\av_i0LphtcmrgDd11XbSkaDr.exe
      Filesize

      2.8MB

      MD5

      798329fec74c27855f9aa3280bc62e60

      SHA1

      79b3c001db159891b45977789e055d98c83a8994

      SHA256

      d34d9744eb3ebc420cb831db1cf6ebd51c8ac7d1952d83d4dc192a9d57d906b2

      SHA512

      93effa121dcd5f639790b5745508e3d0b17cc1dfa985926e4a9efa01f4fa15f385572c6252b7948c9a089dbbfee264f084e10e444c3cddeafc4cc7cf2f0991b6

    • \Users\Admin\Pictures\Adobe Films\fItcJPCWHWEnhZxJU7_gA0lr.exe
      Filesize

      3.5MB

      MD5

      3ef1efcd53897047ad9df7308cc61508

      SHA1

      103e7cc7c508ceaaad664d48213f3d152e6d6bc6

      SHA256

      3d39fd3cfbe7b34f275f5b37b74fc9de1ebec01429b35b25cc536d5b481e341e

      SHA512

      25081415d7d1a402af233161e8461094ab89b610aaf8f486b85b64a37838b506d846e2927a7f97383e6ffe89d9291b77ddcc735857ac21aee118c22c972e69b4

    • \Users\Admin\Pictures\Adobe Films\fItcJPCWHWEnhZxJU7_gA0lr.exe
      Filesize

      3.5MB

      MD5

      3ef1efcd53897047ad9df7308cc61508

      SHA1

      103e7cc7c508ceaaad664d48213f3d152e6d6bc6

      SHA256

      3d39fd3cfbe7b34f275f5b37b74fc9de1ebec01429b35b25cc536d5b481e341e

      SHA512

      25081415d7d1a402af233161e8461094ab89b610aaf8f486b85b64a37838b506d846e2927a7f97383e6ffe89d9291b77ddcc735857ac21aee118c22c972e69b4

    • \Users\Admin\Pictures\Adobe Films\lrPtX_Gb8SH8OaXKghIOS0Xq.exe
      Filesize

      2.9MB

      MD5

      8d4be2f5f13cb1ac37633b8234ef7c81

      SHA1

      c20b5f2ea9751ea3d45398bf537c44901c1eef50

      SHA256

      0b4d04bdb49a1ed4e29fc5bbdea6ece0929b32f3ffb70e8310113b902f15ac3c

      SHA512

      b96588920695177da6e9ada58f22ed6774ee110b22520e7a67a259fffb1b6b4de5d191726457a24f5a78da4fe9f41dfd5f2b2c281ef2ee15d4be5337a433bc4a

    • \Users\Admin\Pictures\Adobe Films\qTRyj3Z4uOtMFbVGJ35FPke5.exe
      Filesize

      2.6MB

      MD5

      3949afafd6b2d55bbd470f0813b073ba

      SHA1

      587a38bc3d6b3983ba2a939b3d3000185c10a4ec

      SHA256

      01ce83b7e32196986dd84e14bbd522894c8af24af182471f88601337da1fcfab

      SHA512

      f11b73b43709b42bcb2091992bb5a49a56f0516abb75abbec91fae3c75d98eadf1d57c7c0cdfda19dce67958415126f4cb62ed8e7f498b6b6732313d653ce02a

    • \Users\Admin\Pictures\Adobe Films\qTRyj3Z4uOtMFbVGJ35FPke5.exe
      Filesize

      2.6MB

      MD5

      3949afafd6b2d55bbd470f0813b073ba

      SHA1

      587a38bc3d6b3983ba2a939b3d3000185c10a4ec

      SHA256

      01ce83b7e32196986dd84e14bbd522894c8af24af182471f88601337da1fcfab

      SHA512

      f11b73b43709b42bcb2091992bb5a49a56f0516abb75abbec91fae3c75d98eadf1d57c7c0cdfda19dce67958415126f4cb62ed8e7f498b6b6732313d653ce02a

    • \Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe
      Filesize

      665KB

      MD5

      516121312b354eabb61a689397d31f94

      SHA1

      445352ff8f0a122674671371eb5ca479520ae2ae

      SHA256

      9dfb4ea160a498af205f9c0dc8e3e1c0f0db246723741fc3fc4c920d0c884e6f

      SHA512

      93a43ff0faa0e278f12088b46f1f9d49a30a7c59c824dfcec699a4fe276fc7614ecbc4d5d01132ce6b4f71560a3685b7da1f268d288fdf808482138fd5c5b8a9

    • \Users\Admin\Pictures\Adobe Films\yml5SKBWTGTUqrtSKFtAXPTf.exe
      Filesize

      665KB

      MD5

      516121312b354eabb61a689397d31f94

      SHA1

      445352ff8f0a122674671371eb5ca479520ae2ae

      SHA256

      9dfb4ea160a498af205f9c0dc8e3e1c0f0db246723741fc3fc4c920d0c884e6f

      SHA512

      93a43ff0faa0e278f12088b46f1f9d49a30a7c59c824dfcec699a4fe276fc7614ecbc4d5d01132ce6b4f71560a3685b7da1f268d288fdf808482138fd5c5b8a9

    • memory/392-196-0x0000000000000000-mapping.dmp
    • memory/692-86-0x0000000000000000-mapping.dmp
    • memory/692-114-0x00000000010A0000-0x00000000010E4000-memory.dmp
      Filesize

      272KB

    • memory/972-92-0x0000000000000000-mapping.dmp
    • memory/972-110-0x00000000002DC000-0x0000000000302000-memory.dmp
      Filesize

      152KB

    • memory/972-134-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/972-174-0x00000000056E0000-0x0000000005E9D000-memory.dmp
      Filesize

      7.7MB

    • memory/972-175-0x0000000006290000-0x0000000006A46000-memory.dmp
      Filesize

      7.7MB

    • memory/972-197-0x0000000003730000-0x0000000003984000-memory.dmp
      Filesize

      2.3MB

    • memory/972-199-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/972-198-0x00000000002DC000-0x0000000000302000-memory.dmp
      Filesize

      152KB

    • memory/972-140-0x0000000003730000-0x0000000003984000-memory.dmp
      Filesize

      2.3MB

    • memory/972-133-0x00000000002DC000-0x0000000000302000-memory.dmp
      Filesize

      152KB

    • memory/972-177-0x00000000052F0000-0x0000000005AF5000-memory.dmp
      Filesize

      8.0MB

    • memory/972-112-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/972-111-0x00000000004E0000-0x0000000000539000-memory.dmp
      Filesize

      356KB

    • memory/1052-68-0x0000000000000000-mapping.dmp
    • memory/1108-57-0x0000000000000000-mapping.dmp
    • memory/1352-117-0x0000000000CC0000-0x0000000000CE0000-memory.dmp
      Filesize

      128KB

    • memory/1352-74-0x0000000000000000-mapping.dmp
    • memory/1368-116-0x0000000000950000-0x0000000000994000-memory.dmp
      Filesize

      272KB

    • memory/1368-71-0x0000000000000000-mapping.dmp
    • memory/1368-119-0x0000000000410000-0x0000000000416000-memory.dmp
      Filesize

      24KB

    • memory/1496-113-0x0000000001190000-0x00000000011C0000-memory.dmp
      Filesize

      192KB

    • memory/1496-84-0x0000000000000000-mapping.dmp
    • memory/1604-115-0x0000000000E60000-0x0000000000E80000-memory.dmp
      Filesize

      128KB

    • memory/1604-95-0x0000000000000000-mapping.dmp
    • memory/1648-99-0x0000000000000000-mapping.dmp
    • memory/1720-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp
      Filesize

      8KB

    • memory/1796-64-0x0000000000000000-mapping.dmp
    • memory/1796-118-0x0000000000450000-0x0000000000456000-memory.dmp
      Filesize

      24KB

    • memory/1884-81-0x0000000000000000-mapping.dmp
    • memory/1884-109-0x0000000000400000-0x0000000000522000-memory.dmp
      Filesize

      1.1MB

    • memory/1884-108-0x00000000002A0000-0x00000000002B5000-memory.dmp
      Filesize

      84KB

    • memory/1928-104-0x000000000062C000-0x000000000063C000-memory.dmp
      Filesize

      64KB

    • memory/1928-61-0x0000000000000000-mapping.dmp
    • memory/1928-106-0x0000000000400000-0x0000000000454000-memory.dmp
      Filesize

      336KB

    • memory/1928-105-0x0000000000230000-0x000000000023E000-memory.dmp
      Filesize

      56KB

    • memory/2244-166-0x0000000000000000-mapping.dmp
    • memory/2244-193-0x0000000000220000-0x00000000002B2000-memory.dmp
      Filesize

      584KB

    • memory/2244-181-0x0000000000220000-0x00000000002B2000-memory.dmp
      Filesize

      584KB

    • memory/2244-194-0x0000000000600000-0x000000000071B000-memory.dmp
      Filesize

      1.1MB

    • memory/2372-214-0x0000000000400000-0x0000000000449000-memory.dmp
      Filesize

      292KB

    • memory/2372-209-0x0000000000400000-0x0000000000449000-memory.dmp
      Filesize

      292KB

    • memory/2372-204-0x000000000055B000-0x000000000056C000-memory.dmp
      Filesize

      68KB

    • memory/2372-207-0x0000000000220000-0x0000000000229000-memory.dmp
      Filesize

      36KB

    • memory/2372-163-0x0000000000000000-mapping.dmp
    • memory/2392-170-0x0000000000000000-mapping.dmp
    • memory/2908-164-0x0000000000000000-mapping.dmp
    • memory/2956-202-0x0000000002920000-0x000000000296A000-memory.dmp
      Filesize

      296KB

    • memory/2956-178-0x0000000000400000-0x0000000000C05000-memory.dmp
      Filesize

      8.0MB

    • memory/2956-216-0x0000000000400000-0x0000000000C05000-memory.dmp
      Filesize

      8.0MB

    • memory/2956-188-0x0000000000400000-0x0000000000C05000-memory.dmp
      Filesize

      8.0MB

    • memory/2956-168-0x0000000000000000-mapping.dmp
    • memory/2956-185-0x0000000000400000-0x0000000000C05000-memory.dmp
      Filesize

      8.0MB

    • memory/2956-192-0x0000000077130000-0x00000000772B0000-memory.dmp
      Filesize

      1.5MB

    • memory/2956-183-0x0000000000400000-0x0000000000C05000-memory.dmp
      Filesize

      8.0MB

    • memory/2956-221-0x0000000077130000-0x00000000772B0000-memory.dmp
      Filesize

      1.5MB

    • memory/3424-151-0x0000000000000000-mapping.dmp
    • memory/3432-149-0x0000000000000000-mapping.dmp
    • memory/3432-176-0x0000000000400000-0x0000000000BBD000-memory.dmp
      Filesize

      7.7MB

    • memory/3516-191-0x0000000000400000-0x0000000000BB6000-memory.dmp
      Filesize

      7.7MB

    • memory/3516-180-0x0000000000400000-0x0000000000BB6000-memory.dmp
      Filesize

      7.7MB

    • memory/3516-195-0x0000000077130000-0x00000000772B0000-memory.dmp
      Filesize

      1.5MB

    • memory/3516-205-0x0000000004CF0000-0x0000000004D38000-memory.dmp
      Filesize

      288KB

    • memory/3516-189-0x0000000000400000-0x0000000000BB6000-memory.dmp
      Filesize

      7.7MB

    • memory/3516-201-0x00000000029E0000-0x0000000002A2A000-memory.dmp
      Filesize

      296KB

    • memory/3516-150-0x0000000000000000-mapping.dmp
    • memory/3516-219-0x0000000000400000-0x0000000000BB6000-memory.dmp
      Filesize

      7.7MB

    • memory/3516-186-0x0000000000400000-0x0000000000BB6000-memory.dmp
      Filesize

      7.7MB

    • memory/3760-182-0x0000000140000000-0x0000000140606000-memory.dmp
      Filesize

      6.0MB

    • memory/3760-156-0x0000000000000000-mapping.dmp
    • memory/3828-171-0x0000000000000000-mapping.dmp
    • memory/5128-206-0x0000000000424141-mapping.dmp
    • memory/5128-213-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/5128-212-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/5128-203-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/178352-217-0x0000000000000000-mapping.dmp
    • memory/184704-220-0x0000000000000000-mapping.dmp
    • memory/184760-222-0x0000000000000000-mapping.dmp