Malware Analysis Report

2024-11-15 09:17

Sample ID 230319-jt365shf4w
Target d16e87bd29ec89a18d8a477ad08b6f0b.exe
SHA256 809d5bdb8703636ee347d5faf1c775ce89240c394bb1078a84d890265548b4bc
Tags
amadey aurora redline rhadamanthys gena vint discovery evasion infostealer persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

809d5bdb8703636ee347d5faf1c775ce89240c394bb1078a84d890265548b4bc

Threat Level: Known bad

The file d16e87bd29ec89a18d8a477ad08b6f0b.exe was found to be: Known bad.

Malicious Activity Summary

amadey aurora redline rhadamanthys gena vint discovery evasion infostealer persistence spyware stealer trojan

Aurora

Detect rhadamanthys stealer shellcode

RedLine payload

Rhadamanthys

RedLine

Modifies Windows Defender Real-time Protection settings

Amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Looks for VirtualBox Guest Additions in registry

Enumerates VirtualBox registry keys

Downloads MZ/PE file

Looks for VMWare Tools registry key

Checks computer location settings

Windows security modification

Reads user/profile data of web browsers

Checks BIOS information in registry

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of NtSetInformationThreadHideFromDebugger

Checks system information in the registry

Checks for VirtualBox DLLs, possible anti-VM trick

Enumerates physical storage devices

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Checks SCSI registry key(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-19 07:58

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-19 07:58

Reported

2023-03-19 08:01

Platform

win7-20230220-en

Max time kernel

146s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe"

Signatures

Amadey

trojan amadey

Aurora

stealer aurora

Detect rhadamanthys stealer shellcode

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Rhadamanthys

stealer rhadamanthys

Enumerates VirtualBox registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Downloads MZ/PE file

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A

Checks installed software on the system

discovery

Checks system information in the registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 2024 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1992 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1952 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1744 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1944 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1952 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1992 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 2024 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1900 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1252 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe

"C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "legenda.exe" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "legenda.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\f22b669919" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\f22b669919" /P "Admin:R" /E

C:\Windows\system32\taskeng.exe

taskeng.exe {D6E7DE12-6F65-41D4-979B-8DB0635FFBE1} S-1-5-21-1914912747-3343861975-731272777-1000:TMRJMUQF\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

"C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe"

C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

"C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe"

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic os get Caption

C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

"C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /C "wmic path win32_VideoController get name"

C:\Windows\SysWOW64\Wbem\WMIC.exe

wmic path win32_VideoController get name

C:\Windows\SysWOW64\cmd.exe

cmd /C "wmic cpu get name"

C:\Windows\SysWOW64\Wbem\WMIC.exe

wmic cpu get name

C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe

"C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe"

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

Network

Country Destination Domain Proto
DE 193.233.20.30:4125 tcp
DE 193.233.20.30:4125 tcp
RU 62.204.41.87:80 62.204.41.87 tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
DE 144.76.136.153:443 transfer.sh tcp
NL 185.246.221.126:80 185.246.221.126 tcp
US 8.8.8.8:53 ebfertility.com udp
US 89.190.157.61:80 ebfertility.com tcp
NL 212.87.204.93:8081 tcp
RU 62.204.41.88:80 62.204.41.88 tcp
US 66.42.108.195:40499 tcp
US 66.42.108.195:40499 tcp

Files

\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

MD5 7e93bacbbc33e6652e147e7fe07572a0
SHA1 421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256 850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512 250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

MD5 7e93bacbbc33e6652e147e7fe07572a0
SHA1 421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256 850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512 250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

MD5 7e93bacbbc33e6652e147e7fe07572a0
SHA1 421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256 850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512 250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

memory/1744-92-0x0000000000900000-0x000000000090A000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

memory/1628-103-0x00000000003E0000-0x00000000003FA000-memory.dmp

memory/1628-104-0x0000000000240000-0x000000000026D000-memory.dmp

memory/1628-105-0x0000000007090000-0x00000000070D0000-memory.dmp

memory/1628-106-0x0000000007090000-0x00000000070D0000-memory.dmp

memory/1628-107-0x0000000002EB0000-0x0000000002EC8000-memory.dmp

memory/1628-108-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-109-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-111-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-113-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-115-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-117-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-119-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-121-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-123-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-125-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-127-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-129-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-131-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-133-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-135-0x0000000002EB0000-0x0000000002EC2000-memory.dmp

memory/1628-136-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/1628-137-0x0000000000400000-0x0000000002B0C000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

memory/1912-148-0x0000000004900000-0x0000000004946000-memory.dmp

memory/1912-149-0x00000000070C0000-0x0000000007104000-memory.dmp

memory/1912-150-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-151-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-153-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-155-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-157-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-159-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-161-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-163-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-169-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-171-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-175-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-181-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-179-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-183-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-177-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-205-0x0000000007100000-0x0000000007140000-memory.dmp

memory/1912-204-0x0000000007100000-0x0000000007140000-memory.dmp

memory/1912-203-0x00000000002C0000-0x000000000030B000-memory.dmp

memory/1912-173-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-167-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-165-0x00000000070C0000-0x00000000070FE000-memory.dmp

memory/1912-1059-0x0000000007100000-0x0000000007140000-memory.dmp

memory/1912-1061-0x0000000007100000-0x0000000007140000-memory.dmp

memory/1912-1062-0x0000000007100000-0x0000000007140000-memory.dmp

memory/1912-1063-0x0000000007100000-0x0000000007140000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

memory/1184-1071-0x0000000000850000-0x0000000000882000-memory.dmp

memory/1184-1072-0x0000000000A70000-0x0000000000AB0000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

C:\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

\Users\Admin\AppData\Local\Temp\1000066001\svchost.exe

MD5 a8a106555b9e1f92569d623c66ee8c12
SHA1 a5080c26b5f5911c10d80654c84239a226fc75d1
SHA256 84aac7290471d6aa883962c2e739b44adcea7f533cc0317e8d0d6f847def1f7a
SHA512 9b9813b0b47e84523fc96cc427aa234d4533e77483ddf28dae35449570373370fdde4380877870aca634a9746b58743ea3c1d9ea31d7162d61d645ca58f60b26

C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

C:\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

\Users\Admin\AppData\Local\Temp\1000067001\serv.exe

MD5 7907fe8d4471135629701e65b374e698
SHA1 05162c86a9b7d233dfd6a554bbd5f4ee580ae1a5
SHA256 1dd548bc944f83c4de45768fcc555c0cca6ec41998c1bc7b0de25e6b62c83983
SHA512 78850c2cfc9e697dfc0be40637df292a30590dedfbca4fd33561fbc5d48d4b97d147101cb3aa7813eb4d821b078897ef844852868706d78696c9b7bb2d41a56c

memory/1992-1128-0x00000000001D0000-0x00000000001FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

C:\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

\Users\Admin\AppData\Local\Temp\1000070001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

memory/1268-1145-0x00000000000F0000-0x0000000000122000-memory.dmp

memory/1268-1155-0x0000000004F70000-0x0000000004FB0000-memory.dmp

\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

C:\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

\Users\Admin\AppData\Local\Temp\1000071001\123ds.exe

MD5 20b01b94fec9143a2adf624945aa41c3
SHA1 3e3690bb58b1a42cea254a0eb039019c7ebbbf3f
SHA256 97a489a4b544ec0c4cd80ec7fba849e66e1f14a89733e23e2f56e29eb77ad2f9
SHA512 52b85eefceaf3589b34d831521f27517e6496cc9f26b6a05016b6df348211369a69c3c794af7ba245f2b161fdd2f7d28e1056185ffbf72384991680fd8e15a68

memory/1604-1163-0x00000000011D0000-0x0000000001202000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TeMaPEZQleQYhYzRyWJjPjzpfRFEgmot

MD5 e5e23f78017d1e6eddfc8480e1679ee4
SHA1 0667bd1b7129b105bd2c66ef6ad54c9648aec072
SHA256 4fed2f4c33a3876390d8520f184062927aca8e0ce3538127de3a2f66ea856d91
SHA512 b1260e7ba7ad6d5dd0daeabc5f7cc1fc7a2e9259092f8d70d3d9eed923ed8aa60adcce4c27e9cb20966d500ed59edaaba9570f01d6a84180f1fb83e7b5c20049

memory/1604-1194-0x0000000000800000-0x0000000000840000-memory.dmp

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

MD5 94cbeec5d4343918fd0e48760e40539c
SHA1 a049266c5c1131f692f306c8710d7e72586ae79d
SHA256 48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA512 4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

memory/1992-1221-0x00000000002A0000-0x00000000002BC000-memory.dmp

memory/1992-1222-0x0000000000200000-0x0000000000201000-memory.dmp

memory/1992-1228-0x00000000002A0000-0x00000000002BC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-19 07:58

Reported

2023-03-19 08:01

Platform

win10v2004-20230220-en

Max time kernel

143s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe"

Signatures

Amadey

trojan amadey

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3284 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 3284 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 3284 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe
PID 1356 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1356 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 1356 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe
PID 2836 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 2836 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 2836 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe
PID 3292 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 3292 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe
PID 3292 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 3292 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 3292 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe
PID 2836 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 2836 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 2836 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe
PID 1356 wrote to memory of 3428 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1356 wrote to memory of 3428 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 1356 wrote to memory of 3428 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe
PID 3284 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 3284 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 3284 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe
PID 1948 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1948 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 1948 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
PID 4604 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\cmd.exe
PID 4604 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\cmd.exe
PID 4604 wrote to memory of 1648 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 716 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 716 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 716 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 2248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 2248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 2248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 2220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 3548 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 3548 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 3548 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1648 wrote to memory of 632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 64 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 64 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 1648 wrote to memory of 64 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 4604 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\rundll32.exe
PID 4604 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\rundll32.exe
PID 4604 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe

"C:\Users\Admin\AppData\Local\Temp\d16e87bd29ec89a18d8a477ad08b6f0b.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3752 -ip 3752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 1192

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "legenda.exe" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "legenda.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\f22b669919" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\f22b669919" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 140.145.190.20.in-addr.arpa udp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 199.176.139.52.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 160.252.72.23.in-addr.arpa udp
DE 193.233.20.30:4125 tcp
US 20.189.173.12:443 tcp
US 8.8.8.8:53 30.20.233.193.in-addr.arpa udp
NL 8.238.20.126:80 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 131.253.33.203:80 tcp
DE 193.233.20.30:4125 tcp
US 8.8.8.8:53 64.13.109.52.in-addr.arpa udp
RU 62.204.41.87:80 62.204.41.87 tcp
US 8.8.8.8:53 87.41.204.62.in-addr.arpa udp
US 209.197.3.8:80 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will8268.exe

MD5 9fdaff13d4f89f261f1722bf94ae4bc2
SHA1 87a3adade38979ef026a5d282929e18a391f4ccc
SHA256 77f0d3e51180f77a67f7643d6ca673d34b5632c7919ae53d61478568eb2be581
SHA512 4bce5c3865ee1ba0033eda5db12c4168648c57928f1d8c367a1bd0ff876a936cda5337e31097ee74ca41fef93824972616dffb69869073bf0953819ffb41e614

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will2226.exe

MD5 07871531794fc724953a9ba368f7951d
SHA1 e9a82c509bb2d0d8b4a0d0ddfb58353d7a6e1f2b
SHA256 4a9772784085262ab613a791115f837f84ce6264ff5517a72b2653e8f7699bfd
SHA512 facad9a82e016d89bcad9b65f3f0126468b8739b3fb61b65d0f0ac56c467c2cc1ab929592e1c67940024bed60fd9682bb31e8312023604b59484d81451c103be

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will1619.exe

MD5 b5d8008e42c97fe466a1440c9553a2bb
SHA1 a8032ee4cddbc3784512c44761b9cb2e962e8788
SHA256 f2417dedb4a93e4672b955b21b4d6900dd43a33e00177dcda1d4828381e42023
SHA512 61ee78daad9eae1ac04d291fdaff81b78711dc43e8c012936c34511dcda7159606ad7a39266d88a958bbed819cedf9bd818aa9dd12eee6b695214aa24a6bab43

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

MD5 7e93bacbbc33e6652e147e7fe07572a0
SHA1 421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256 850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512 250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx1177jw.exe

MD5 7e93bacbbc33e6652e147e7fe07572a0
SHA1 421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256 850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512 250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

memory/1780-164-0x00000000002F0000-0x00000000002FA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns9609pH.exe

MD5 9a5b9872499b719a5687a38ccf296b5d
SHA1 fabf53c7926d6e48c7facdccbddc1c3e7ae2c4a6
SHA256 5b0ad1423450d2e51d1b7a1603fdefe5bb1cc6488dd6d78ad7cc45d0cc1b30fa
SHA512 483f235b1ee360d0ba2622c0b1e76ee5eb92619f3b3b5f8a98d3b70b1468be9e6b0808fc9dfe3d5479a93a253d64ac7d6b1d4fa10608b103fa7d32b94c35c291

memory/3916-170-0x0000000002B90000-0x0000000002BBD000-memory.dmp

memory/3916-171-0x00000000070B0000-0x0000000007654000-memory.dmp

memory/3916-172-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-173-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-175-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-177-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-179-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-181-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-183-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-185-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-187-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-189-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-192-0x00000000070A0000-0x00000000070B0000-memory.dmp

memory/3916-194-0x00000000070A0000-0x00000000070B0000-memory.dmp

memory/3916-191-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-198-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-196-0x00000000070A0000-0x00000000070B0000-memory.dmp

memory/3916-195-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-200-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-202-0x0000000007070000-0x0000000007082000-memory.dmp

memory/3916-203-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3916-205-0x0000000000400000-0x0000000002B0C000-memory.dmp

memory/3916-207-0x00000000070A0000-0x00000000070B0000-memory.dmp

memory/3916-206-0x00000000070A0000-0x00000000070B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py05km82.exe

MD5 54961599136072b5951bc91ece44987d
SHA1 d783aa0a436123c0fcd2a3dfdd1453b4afce79dc
SHA256 966228e0ba8627c4f6de84f2b18277abf862e766f8cf0caae340d55394cd0835
SHA512 c608d0f6eaeadb7120b9332b1c6ef6b8ac7fec9bfed311403f3fd5ec5ba0ce3bccac7ec5ac8dcf5be32e3db260427ece3b15581a5ab8f3fc0bcfcb9409777e2f

memory/3752-212-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-213-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-215-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-217-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-219-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-221-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-223-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-225-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-227-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-229-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-230-0x0000000004790000-0x00000000047DB000-memory.dmp

memory/3752-232-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-233-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-235-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-237-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-234-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-239-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-241-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-243-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-245-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-247-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-249-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

memory/3752-1122-0x0000000007870000-0x0000000007E88000-memory.dmp

memory/3752-1123-0x0000000007F00000-0x000000000800A000-memory.dmp

memory/3752-1124-0x0000000008040000-0x0000000008052000-memory.dmp

memory/3752-1125-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-1126-0x0000000008060000-0x000000000809C000-memory.dmp

memory/3752-1128-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-1129-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-1130-0x00000000049E0000-0x00000000049F0000-memory.dmp

memory/3752-1131-0x0000000008350000-0x00000000083E2000-memory.dmp

memory/3752-1132-0x00000000083F0000-0x0000000008456000-memory.dmp

memory/3752-1133-0x0000000008BF0000-0x0000000008C66000-memory.dmp

memory/3752-1134-0x0000000008C80000-0x0000000008CD0000-memory.dmp

memory/3752-1135-0x0000000008E50000-0x0000000009012000-memory.dmp

memory/3752-1136-0x0000000009020000-0x000000000954C000-memory.dmp

memory/3752-1137-0x00000000049E0000-0x00000000049F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs3906zu.exe

MD5 3389637c0d072121bf1b127629736d37
SHA1 300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA256 2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512 a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

memory/3428-1143-0x0000000000DF0000-0x0000000000E22000-memory.dmp

memory/3428-1144-0x00000000056F0000-0x0000000005700000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry78jE89.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

MD5 94cbeec5d4343918fd0e48760e40539c
SHA1 a049266c5c1131f692f306c8710d7e72586ae79d
SHA256 48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA512 4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 16cf28ebb6d37dbaba93f18320c6086e
SHA1 eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256 c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512 f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

MD5 5086db99de54fca268169a1c6cf26122
SHA1 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA512 90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5