Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26-03-2023 23:46
Static task
static1
General
-
Target
d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe
-
Size
1.0MB
-
MD5
ca7cd211f56dea50bf77dd6763e66d0f
-
SHA1
de4efdc0ed612f71aa898955c9bf330ad6ff42a4
-
SHA256
d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3
-
SHA512
79c32f043c3dc562f811cca6e0f204bd956e2baddd09393c882eb91af623652f28cb7d454fd792618d4d841b457473f62b3fabe619b7f98220f4a9ae791bad59
-
SSDEEP
24576:cyJTNTUcuTMCmBvSdcm/CY9H4b0xv+ygWx4HM:Lj9uQC0Kdd9H4bQNfw
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
fort
193.233.20.33:4125
-
auth_value
5ea5673154a804d8c80f565f7276f720
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
aurora
212.87.204.93:8081
Signatures
-
Processes:
v8435jX.exetz8851.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8851.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/3136-199-0x0000000004850000-0x0000000004896000-memory.dmp family_redline behavioral1/memory/3136-200-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/3136-202-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-201-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-204-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-206-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-208-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-210-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-212-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-214-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-216-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-218-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-220-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-222-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-224-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-228-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-231-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-234-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-236-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-238-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/3136-1124-0x0000000007380000-0x0000000007390000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
zap6682.exezap7324.exezap2827.exetz8851.exev8435jX.exew96QX55.exexxeav37.exey93dW72.exelegenda.exe2023.exelegenda.exelegenda.exepid process 3276 zap6682.exe 4168 zap7324.exe 4140 zap2827.exe 4196 tz8851.exe 2084 v8435jX.exe 3136 w96QX55.exe 3620 xxeav37.exe 4436 y93dW72.exe 3116 legenda.exe 3264 2023.exe 1416 legenda.exe 4860 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3148 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz8851.exev8435jX.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8851.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v8435jX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v8435jX.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap6682.exezap7324.exezap2827.exed8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap6682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap6682.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap7324.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap2827.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
tz8851.exev8435jX.exew96QX55.exexxeav37.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4196 tz8851.exe 4196 tz8851.exe 2084 v8435jX.exe 2084 v8435jX.exe 3136 w96QX55.exe 3136 w96QX55.exe 3620 xxeav37.exe 3620 xxeav37.exe 1972 powershell.exe 1972 powershell.exe 1972 powershell.exe 3720 powershell.exe 3720 powershell.exe 3720 powershell.exe 4380 powershell.exe 4380 powershell.exe 4380 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1332 powershell.exe 1332 powershell.exe 1332 powershell.exe 3536 powershell.exe 3536 powershell.exe 3536 powershell.exe 4836 powershell.exe 4836 powershell.exe 4836 powershell.exe 420 powershell.exe 420 powershell.exe 420 powershell.exe 2044 powershell.exe 2044 powershell.exe 2044 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 3676 powershell.exe 3676 powershell.exe 3676 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tz8851.exev8435jX.exew96QX55.exexxeav37.exeWMIC.exewmic.exedescription pid process Token: SeDebugPrivilege 4196 tz8851.exe Token: SeDebugPrivilege 2084 v8435jX.exe Token: SeDebugPrivilege 3136 w96QX55.exe Token: SeDebugPrivilege 3620 xxeav37.exe Token: SeIncreaseQuotaPrivilege 3496 WMIC.exe Token: SeSecurityPrivilege 3496 WMIC.exe Token: SeTakeOwnershipPrivilege 3496 WMIC.exe Token: SeLoadDriverPrivilege 3496 WMIC.exe Token: SeSystemProfilePrivilege 3496 WMIC.exe Token: SeSystemtimePrivilege 3496 WMIC.exe Token: SeProfSingleProcessPrivilege 3496 WMIC.exe Token: SeIncBasePriorityPrivilege 3496 WMIC.exe Token: SeCreatePagefilePrivilege 3496 WMIC.exe Token: SeBackupPrivilege 3496 WMIC.exe Token: SeRestorePrivilege 3496 WMIC.exe Token: SeShutdownPrivilege 3496 WMIC.exe Token: SeDebugPrivilege 3496 WMIC.exe Token: SeSystemEnvironmentPrivilege 3496 WMIC.exe Token: SeRemoteShutdownPrivilege 3496 WMIC.exe Token: SeUndockPrivilege 3496 WMIC.exe Token: SeManageVolumePrivilege 3496 WMIC.exe Token: 33 3496 WMIC.exe Token: 34 3496 WMIC.exe Token: 35 3496 WMIC.exe Token: 36 3496 WMIC.exe Token: SeIncreaseQuotaPrivilege 3496 WMIC.exe Token: SeSecurityPrivilege 3496 WMIC.exe Token: SeTakeOwnershipPrivilege 3496 WMIC.exe Token: SeLoadDriverPrivilege 3496 WMIC.exe Token: SeSystemProfilePrivilege 3496 WMIC.exe Token: SeSystemtimePrivilege 3496 WMIC.exe Token: SeProfSingleProcessPrivilege 3496 WMIC.exe Token: SeIncBasePriorityPrivilege 3496 WMIC.exe Token: SeCreatePagefilePrivilege 3496 WMIC.exe Token: SeBackupPrivilege 3496 WMIC.exe Token: SeRestorePrivilege 3496 WMIC.exe Token: SeShutdownPrivilege 3496 WMIC.exe Token: SeDebugPrivilege 3496 WMIC.exe Token: SeSystemEnvironmentPrivilege 3496 WMIC.exe Token: SeRemoteShutdownPrivilege 3496 WMIC.exe Token: SeUndockPrivilege 3496 WMIC.exe Token: SeManageVolumePrivilege 3496 WMIC.exe Token: 33 3496 WMIC.exe Token: 34 3496 WMIC.exe Token: 35 3496 WMIC.exe Token: 36 3496 WMIC.exe Token: SeIncreaseQuotaPrivilege 880 wmic.exe Token: SeSecurityPrivilege 880 wmic.exe Token: SeTakeOwnershipPrivilege 880 wmic.exe Token: SeLoadDriverPrivilege 880 wmic.exe Token: SeSystemProfilePrivilege 880 wmic.exe Token: SeSystemtimePrivilege 880 wmic.exe Token: SeProfSingleProcessPrivilege 880 wmic.exe Token: SeIncBasePriorityPrivilege 880 wmic.exe Token: SeCreatePagefilePrivilege 880 wmic.exe Token: SeBackupPrivilege 880 wmic.exe Token: SeRestorePrivilege 880 wmic.exe Token: SeShutdownPrivilege 880 wmic.exe Token: SeDebugPrivilege 880 wmic.exe Token: SeSystemEnvironmentPrivilege 880 wmic.exe Token: SeRemoteShutdownPrivilege 880 wmic.exe Token: SeUndockPrivilege 880 wmic.exe Token: SeManageVolumePrivilege 880 wmic.exe Token: 33 880 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exezap6682.exezap7324.exezap2827.exey93dW72.exelegenda.execmd.exe2023.execmd.exedescription pid process target process PID 3240 wrote to memory of 3276 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe zap6682.exe PID 3240 wrote to memory of 3276 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe zap6682.exe PID 3240 wrote to memory of 3276 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe zap6682.exe PID 3276 wrote to memory of 4168 3276 zap6682.exe zap7324.exe PID 3276 wrote to memory of 4168 3276 zap6682.exe zap7324.exe PID 3276 wrote to memory of 4168 3276 zap6682.exe zap7324.exe PID 4168 wrote to memory of 4140 4168 zap7324.exe zap2827.exe PID 4168 wrote to memory of 4140 4168 zap7324.exe zap2827.exe PID 4168 wrote to memory of 4140 4168 zap7324.exe zap2827.exe PID 4140 wrote to memory of 4196 4140 zap2827.exe tz8851.exe PID 4140 wrote to memory of 4196 4140 zap2827.exe tz8851.exe PID 4140 wrote to memory of 2084 4140 zap2827.exe v8435jX.exe PID 4140 wrote to memory of 2084 4140 zap2827.exe v8435jX.exe PID 4140 wrote to memory of 2084 4140 zap2827.exe v8435jX.exe PID 4168 wrote to memory of 3136 4168 zap7324.exe w96QX55.exe PID 4168 wrote to memory of 3136 4168 zap7324.exe w96QX55.exe PID 4168 wrote to memory of 3136 4168 zap7324.exe w96QX55.exe PID 3276 wrote to memory of 3620 3276 zap6682.exe xxeav37.exe PID 3276 wrote to memory of 3620 3276 zap6682.exe xxeav37.exe PID 3276 wrote to memory of 3620 3276 zap6682.exe xxeav37.exe PID 3240 wrote to memory of 4436 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe y93dW72.exe PID 3240 wrote to memory of 4436 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe y93dW72.exe PID 3240 wrote to memory of 4436 3240 d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe y93dW72.exe PID 4436 wrote to memory of 3116 4436 y93dW72.exe legenda.exe PID 4436 wrote to memory of 3116 4436 y93dW72.exe legenda.exe PID 4436 wrote to memory of 3116 4436 y93dW72.exe legenda.exe PID 3116 wrote to memory of 4900 3116 legenda.exe schtasks.exe PID 3116 wrote to memory of 4900 3116 legenda.exe schtasks.exe PID 3116 wrote to memory of 4900 3116 legenda.exe schtasks.exe PID 3116 wrote to memory of 3776 3116 legenda.exe cmd.exe PID 3116 wrote to memory of 3776 3116 legenda.exe cmd.exe PID 3116 wrote to memory of 3776 3116 legenda.exe cmd.exe PID 3776 wrote to memory of 5064 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 5064 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 5064 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4932 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4932 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4932 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 5068 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 5068 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 5068 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4968 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4968 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4968 3776 cmd.exe cmd.exe PID 3776 wrote to memory of 4896 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4896 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4896 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4960 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4960 3776 cmd.exe cacls.exe PID 3776 wrote to memory of 4960 3776 cmd.exe cacls.exe PID 3116 wrote to memory of 3264 3116 legenda.exe 2023.exe PID 3116 wrote to memory of 3264 3116 legenda.exe 2023.exe PID 3116 wrote to memory of 3264 3116 legenda.exe 2023.exe PID 3264 wrote to memory of 4064 3264 2023.exe cmd.exe PID 3264 wrote to memory of 4064 3264 2023.exe cmd.exe PID 3264 wrote to memory of 4064 3264 2023.exe cmd.exe PID 4064 wrote to memory of 3496 4064 cmd.exe WMIC.exe PID 4064 wrote to memory of 3496 4064 cmd.exe WMIC.exe PID 4064 wrote to memory of 3496 4064 cmd.exe WMIC.exe PID 3264 wrote to memory of 880 3264 2023.exe wmic.exe PID 3264 wrote to memory of 880 3264 2023.exe wmic.exe PID 3264 wrote to memory of 880 3264 2023.exe wmic.exe PID 3264 wrote to memory of 484 3264 2023.exe cmd.exe PID 3264 wrote to memory of 484 3264 2023.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe"C:\Users\Admin\AppData\Local\Temp\d8f4b315df8263c66e339dcf7e80bbd78ff256c277e9fa47498da257f04117e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6682.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2827.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2827.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8851.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8851.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8435jX.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8435jX.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w96QX55.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w96QX55.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxeav37.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxeav37.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y93dW72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y93dW72.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Roaming\1000177000\2023.exe"C:\Users\Admin\AppData\Roaming\1000177000\2023.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name6⤵
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo5⤵
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo6⤵
- Gathers system information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5c558fdaa3884f969f1ec904ae7bbd991
SHA1b4f85d04f6bf061a17f52c264c065b786cfd33ff
SHA2563e2559b6ca355d011b05b1fcf35ed8b2375586fe6bb01bc367f24eb8ac82975e
SHA5126523c778fd9fab0085fafe7b4049e591403865212cc25109cb11f11584c7258bc15e0a5524d089d0f662151b22f3f8e6f871091cec57064c69a9a95903f9e7d4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5f813ac1d6cc509f2d4b2d5afab8fe114
SHA19de8e27e8f5ce42adef2ed3950a124db8d58c994
SHA2567ce0f6776945560629d054725caf81e5983befa71a584b9bb08bbf842fd00f85
SHA5126a7f838a4469b28d9976ccb56eb40cf3fa47b1909b853e71568b0d35aca1bcdd0bb82581ae779543c137fa84631708f11b9baad23acf03bfaec53645ad8bcdf0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5217eb0a6d1aa4f7d4505c52430086e62
SHA133114f657623bb3a94e623850a48ca98f781ccbd
SHA256d715e04556e0cc19ccccf0e54eacc39e58a0a62c15405616acd459cdd674ffb5
SHA512858d53dcbe9e27718e88dcff471956daa8f10a0690238ffa8560a18b4ea1d65de87249dc60152d2c544da398abd3180fa4c48e98d9bd590599a3d503a94a29db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5c082e6f769610382a9cab62fdafd9175
SHA1c75bafaafe2f0d63f6cbecc52d492bf72d53d2e7
SHA2560ee830226e055c48b36d92fe0be5c531c326e19eb4f18d72fed4f78af25cafa6
SHA5123bd72645844724b4d82a117d0afc330a36e3be1db2786f1db97d898afcaecc564ff098e38b714ac4571b11957e3dc371179500d75e3c22b54e3ce33f2f60293f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5fdf361e95d3662c4c8abc499802f8b47
SHA14991da19c9ca02caa84d52b89b15b3f9d16801c3
SHA256ce35a032ebdb1f9e489c06b09cf2a5d53e3af778132ce170e8539c01c6283b68
SHA5128bc409dd18da825151b99e6606811f1bb10f2f0d654679cd79febb744d25ed01f1f3fd874b8a05a0878353baecd1791efad5bb10b36588eadbe4057d39069510
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5cfa93a4b82ebdb5494b45aa4e7f523d1
SHA1994a266faae0511728f7126c1f16c78f72b64fe9
SHA256fba7a599b078b6b7dca477bb4d25ae32b5fcfd0ddbf0bd41bcd22da23019c209
SHA512654543f373184200a7743ddd8e6ceec11544babf0244cbbe3a8b4fd175414ad9110a031594d1403a7c0a504c72582b688218abe6cd8d0c2fe62c02e70e314572
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD59e5d2485db3576fa56b2a7298af84218
SHA160df8c54879e72ce3d9946fc1b94bfbfd79b7dbf
SHA2565842829f8e8625af7b3a70fa3fccbd846e49d93a420349d79c3f91ba081c62fe
SHA512bb4fbfe7febc168f37d91922eacd1dfb7dbf7a1c759c338e629351c005b5cf8cf368a737aeebf459e6094d4ffbd1e63bb73f4f3ed871bd4bab118b7c0ac8f9bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD51f40311bfecdabcf44d4df4d2908f4e8
SHA12f9dc3cc57f4396f9fe21aee4502e7153a23d657
SHA2568d2435ada7e571699370d933dcf134ba469d7487c706cd8bf010adf08d59fe5c
SHA5120822fded9aa1134679b8c265b4455b3e6aa461fb7c03d1b632d731336d6293e17cd732db8c866d08fc9cb67818b43d0e3b4694b9b0f36c5120bd1fcfd142ae2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD52fb86206df7ddd10611f5564d70e7ecc
SHA166383dc7d7ae7e9fc1dc4de7efb05d68434f1076
SHA256e22820aaff278621f5dd09647885141128350b08516be5cf05da28f352e19b96
SHA512dece63ccd074e102d7f4a45006d00c5c761551b53e42018c7e233107bdd8cceb58fd0e84f0e430068cbde7126fc9321e33d35ef5e2b1fdf16ed2ba713c1f88f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5feef339bba09e558bd5dd9aac41eec5c
SHA1a1901f7065e3c73ecf0a70f2d7ce7b0da0438856
SHA256e2650bc47352760fdf09ad02c49a85cc589e4ce493e19ac1ec3acd7c8f0772df
SHA512cfc6d9f93782fa44822387e588ef196bec379726a5ebd75829fbdbff8ce6c5150d7febffaf977e6c284bfe959d9fbee3d75bb0e3a324fa88a00d0d90c9e29ffa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5d119dc41e1327cd98ece79a83152f7db
SHA16210334bbb60d360cfe7f164103c7744c1d7c463
SHA256d2d77a105ee53cef270a6979c1962510b9d20ecf5500109a5c4e1a30d9fbba9e
SHA51239f2117114f55075d10ae45c1a62be67b23a67a5748401773c15ad80e8e6bccf022c0d95fa4985799e91d3050db80979e60b558130b422a9252d47a795ce8099
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y93dW72.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y93dW72.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6682.exeFilesize
846KB
MD54cbad89d449c12a3f8fbdebec6f02f7b
SHA106386f1198bd060e1adbc86b220994c6f6da2129
SHA25680f3811708ab31aa7b302e8a893f3b7f8e6372bb235347898312f475dfd93290
SHA5121267c619993c9ae64b46f68450d8b687c281622864e90b309749b20a55a01ef9a21507d2f24ff63dc2611c876704efbd8e48ca3070fa33556b7c492a206e0308
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6682.exeFilesize
846KB
MD54cbad89d449c12a3f8fbdebec6f02f7b
SHA106386f1198bd060e1adbc86b220994c6f6da2129
SHA25680f3811708ab31aa7b302e8a893f3b7f8e6372bb235347898312f475dfd93290
SHA5121267c619993c9ae64b46f68450d8b687c281622864e90b309749b20a55a01ef9a21507d2f24ff63dc2611c876704efbd8e48ca3070fa33556b7c492a206e0308
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxeav37.exeFilesize
175KB
MD505560ba5036883a0ccffff7dc89f66a9
SHA13c4fa461ce4b6423113ceed6f3da61a01c6a4945
SHA256c5fce778253ae204b648942cd7cf168eb90fe6303ae830fff49059dc380b6082
SHA512464de2ee037052436c572cbb28f243762bf2b38f52063d35f83f98a6184243457dc2370460fa86d458b611f648029ea685412a260343f35803665bb4cd3cfe63
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xxeav37.exeFilesize
175KB
MD505560ba5036883a0ccffff7dc89f66a9
SHA13c4fa461ce4b6423113ceed6f3da61a01c6a4945
SHA256c5fce778253ae204b648942cd7cf168eb90fe6303ae830fff49059dc380b6082
SHA512464de2ee037052436c572cbb28f243762bf2b38f52063d35f83f98a6184243457dc2370460fa86d458b611f648029ea685412a260343f35803665bb4cd3cfe63
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7324.exeFilesize
704KB
MD5384e8462d06700801eb2fb00409d752d
SHA1c12172b1423e8dd091a43f6eeb7dfcafe860fb09
SHA2565f34192d9d730bd1cdf10894936a245242456efe02e4774d35d34240b13d574a
SHA512b57842906c44f52417c10295a10e28e00e13d33b527448d4c67a4773efbab7a19ce58e1c1173a3bf862d05dbccffb80f54173984075833edbfa8c2beef2e0961
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7324.exeFilesize
704KB
MD5384e8462d06700801eb2fb00409d752d
SHA1c12172b1423e8dd091a43f6eeb7dfcafe860fb09
SHA2565f34192d9d730bd1cdf10894936a245242456efe02e4774d35d34240b13d574a
SHA512b57842906c44f52417c10295a10e28e00e13d33b527448d4c67a4773efbab7a19ce58e1c1173a3bf862d05dbccffb80f54173984075833edbfa8c2beef2e0961
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w96QX55.exeFilesize
379KB
MD57f1a33ef151a95fea90dc2ba24b04e57
SHA1d812a839d50fb0c715fd7720e2d16e830d01ec88
SHA256840055dfd1679e934e9b8480dbe7617ecc81bd46ee7b0c9d20b94b820b704d83
SHA512ceb9eb31dec797c8e4b95421717747741956a696ab9aebb5084cb309c28d2000b0e45a0073e9596b69573a3c9c5da9ffb58329692170f7a3d7150a2c40a5eade
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w96QX55.exeFilesize
379KB
MD57f1a33ef151a95fea90dc2ba24b04e57
SHA1d812a839d50fb0c715fd7720e2d16e830d01ec88
SHA256840055dfd1679e934e9b8480dbe7617ecc81bd46ee7b0c9d20b94b820b704d83
SHA512ceb9eb31dec797c8e4b95421717747741956a696ab9aebb5084cb309c28d2000b0e45a0073e9596b69573a3c9c5da9ffb58329692170f7a3d7150a2c40a5eade
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2827.exeFilesize
349KB
MD54301e7a51e34c112108bbac26cee1476
SHA1dc40d775f4202748b51d4d1371428b32f9d7a4b5
SHA256bd8fba4e8d37e6e2cc6cf0b29c75c2e9cc593cec6ecae5dbef1d16bf78f7227a
SHA512508bd21c8b4ba249361f1d8b8937952a1ed8cfeb3b256e42de9a4d2ea1024d2d3cb8f27578693d6dee3d71c75af207b09d2f64d1220ab393535076e749b477e2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2827.exeFilesize
349KB
MD54301e7a51e34c112108bbac26cee1476
SHA1dc40d775f4202748b51d4d1371428b32f9d7a4b5
SHA256bd8fba4e8d37e6e2cc6cf0b29c75c2e9cc593cec6ecae5dbef1d16bf78f7227a
SHA512508bd21c8b4ba249361f1d8b8937952a1ed8cfeb3b256e42de9a4d2ea1024d2d3cb8f27578693d6dee3d71c75af207b09d2f64d1220ab393535076e749b477e2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8851.exeFilesize
12KB
MD59e916a025fdc09976d545373ca508f3f
SHA1ef1e951616b48dff32ba49462d2767cf9a35a00b
SHA256957e5c710ad38b073d989bb5a73c4d2077657fcb8d01ca44c67350d60dc6d0b7
SHA512266502f2cb8a2fd61b05a11394d12a77d15daafaa96a4613f95d1e44ff978afdad81987c0aa80a6c8089a6cfeda79fc18272f74be1c658314e9c1b3ea24a3300
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8851.exeFilesize
12KB
MD59e916a025fdc09976d545373ca508f3f
SHA1ef1e951616b48dff32ba49462d2767cf9a35a00b
SHA256957e5c710ad38b073d989bb5a73c4d2077657fcb8d01ca44c67350d60dc6d0b7
SHA512266502f2cb8a2fd61b05a11394d12a77d15daafaa96a4613f95d1e44ff978afdad81987c0aa80a6c8089a6cfeda79fc18272f74be1c658314e9c1b3ea24a3300
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8435jX.exeFilesize
322KB
MD5658a1a780e67256e95bca173c8e5ad13
SHA1e3a1b87244435bd3b0c65814b2017136ca657c9a
SHA2560c8e04b08d8bb9e693c20c92bc199ead1034971f2cc3a87a5d7602aa04b2fac2
SHA512afc62df213607ea09c7b844534a5be8344668943a7478732fbc97fa854bfdb9db4c93b301a5287e82fa33a0606ed9a558ae27ee75b5f3fa751a092fe768651d5
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8435jX.exeFilesize
322KB
MD5658a1a780e67256e95bca173c8e5ad13
SHA1e3a1b87244435bd3b0c65814b2017136ca657c9a
SHA2560c8e04b08d8bb9e693c20c92bc199ead1034971f2cc3a87a5d7602aa04b2fac2
SHA512afc62df213607ea09c7b844534a5be8344668943a7478732fbc97fa854bfdb9db4c93b301a5287e82fa33a0606ed9a558ae27ee75b5f3fa751a092fe768651d5
-
C:\Users\Admin\AppData\Local\Temp\LDnJObCsNVFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAxFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxPFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiCFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjzFilesize
92KB
MD55f9db631ae86e51d656563a43e697894
SHA179ca32704877a23ea6e7c6c7224901cecf33e8e1
SHA256f0f54b45862402d4594ba170993dffd1beb626901251d0a4bf0128ae4c79eb31
SHA512cc81cfe65fb84a5946d6d4b014d77f4c1aa64545c65615a911a1fc7f37fead7d590cc8a1a28a1075b066900650f677313dd5deacf004825ea8d5370b109c1d98
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_igcsymac.ehy.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
236KB
MD5a8b32d7b6eb0ec1bf5c7e686257c0736
SHA185b34102b5eac3289b95788b9114113a80ac1642
SHA256aded2ea2b1d8278fb8e98d0f9192030bbbfd8f60c5f429dcfc24ac5e8676fe72
SHA512b922f8369f8ee22705c902d1e6e583ed9250491252683235242f83338bc022c8f9de1ea89dfaaf63ac32308d3f12157ef5113a9dfa6320ae4f68c7dbc411ab1a
-
C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpLFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBAFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYhFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHsFilesize
72KB
MD52b8e1b75b4d4fdf0c640838191ac3946
SHA1dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f
SHA25617a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e
SHA5123c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038
-
C:\Users\Admin\AppData\Roaming\1000177000\2023.exeFilesize
3.1MB
MD5027a60b4337dd0847d0414aa8719ffec
SHA180f78f880e891adfa8f71fb1447ed19734077062
SHA2563dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168
SHA512009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d
-
C:\Users\Admin\AppData\Roaming\1000177000\2023.exeFilesize
3.1MB
MD5027a60b4337dd0847d0414aa8719ffec
SHA180f78f880e891adfa8f71fb1447ed19734077062
SHA2563dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168
SHA512009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d
-
C:\Users\Admin\AppData\Roaming\1000177000\2023.exeFilesize
3.1MB
MD5027a60b4337dd0847d0414aa8719ffec
SHA180f78f880e891adfa8f71fb1447ed19734077062
SHA2563dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168
SHA512009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
memory/420-1338-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/420-1337-0x0000000004B30000-0x0000000004B40000-memory.dmpFilesize
64KB
-
memory/420-1335-0x0000000007D40000-0x0000000008090000-memory.dmpFilesize
3.3MB
-
memory/1332-1267-0x0000000006F00000-0x0000000006F10000-memory.dmpFilesize
64KB
-
memory/1332-1266-0x0000000006F00000-0x0000000006F10000-memory.dmpFilesize
64KB
-
memory/1488-1243-0x0000000005110000-0x0000000005120000-memory.dmpFilesize
64KB
-
memory/1488-1244-0x0000000005110000-0x0000000005120000-memory.dmpFilesize
64KB
-
memory/1972-1162-0x0000000004FA0000-0x0000000004FD6000-memory.dmpFilesize
216KB
-
memory/1972-1167-0x00000000082C0000-0x00000000082DC000-memory.dmpFilesize
112KB
-
memory/1972-1168-0x00000000087C0000-0x000000000880B000-memory.dmpFilesize
300KB
-
memory/1972-1163-0x0000000007B00000-0x0000000008128000-memory.dmpFilesize
6.2MB
-
memory/1972-1166-0x00000000083F0000-0x0000000008740000-memory.dmpFilesize
3.3MB
-
memory/1972-1183-0x0000000009B60000-0x0000000009BF4000-memory.dmpFilesize
592KB
-
memory/1972-1184-0x00000000098A0000-0x00000000098BA000-memory.dmpFilesize
104KB
-
memory/1972-1165-0x0000000007A90000-0x0000000007AF6000-memory.dmpFilesize
408KB
-
memory/1972-1164-0x00000000079D0000-0x00000000079F2000-memory.dmpFilesize
136KB
-
memory/1972-1185-0x00000000098F0000-0x0000000009912000-memory.dmpFilesize
136KB
-
memory/2044-1360-0x0000000006690000-0x00000000066A0000-memory.dmpFilesize
64KB
-
memory/2084-164-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-162-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-161-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-160-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/2084-159-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/2084-158-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/2084-166-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-168-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-170-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-156-0x00000000070C0000-0x00000000070D8000-memory.dmpFilesize
96KB
-
memory/2084-172-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-157-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/2084-155-0x00000000071B0000-0x00000000076AE000-memory.dmpFilesize
5.0MB
-
memory/2084-174-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-176-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-178-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-154-0x0000000002E00000-0x0000000002E1A000-memory.dmpFilesize
104KB
-
memory/2084-180-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-182-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-192-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/2084-184-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-186-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-188-0x00000000070C0000-0x00000000070D2000-memory.dmpFilesize
72KB
-
memory/2084-189-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2084-190-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/2084-194-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2084-191-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/3136-1122-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-220-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-199-0x0000000004850000-0x0000000004896000-memory.dmpFilesize
280KB
-
memory/3136-200-0x0000000004BB0000-0x0000000004BF4000-memory.dmpFilesize
272KB
-
memory/3136-1127-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-1126-0x0000000009550000-0x00000000095A0000-memory.dmpFilesize
320KB
-
memory/3136-1125-0x00000000094D0000-0x0000000009546000-memory.dmpFilesize
472KB
-
memory/3136-1124-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-1123-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-1121-0x0000000008D30000-0x000000000925C000-memory.dmpFilesize
5.2MB
-
memory/3136-1120-0x0000000008B60000-0x0000000008D22000-memory.dmpFilesize
1.8MB
-
memory/3136-1119-0x0000000007D40000-0x0000000007DA6000-memory.dmpFilesize
408KB
-
memory/3136-202-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-201-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-1118-0x0000000007CA0000-0x0000000007D32000-memory.dmpFilesize
584KB
-
memory/3136-204-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-206-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-208-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-1116-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-210-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-1115-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/3136-1114-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB
-
memory/3136-1113-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/3136-1112-0x0000000007890000-0x000000000799A000-memory.dmpFilesize
1.0MB
-
memory/3136-1111-0x0000000007EA0000-0x00000000084A6000-memory.dmpFilesize
6.0MB
-
memory/3136-238-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-236-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-234-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-232-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-229-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-212-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-214-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-231-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-226-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/3136-216-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-218-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-228-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-227-0x0000000007380000-0x0000000007390000-memory.dmpFilesize
64KB
-
memory/3136-224-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3136-222-0x0000000004BB0000-0x0000000004BEE000-memory.dmpFilesize
248KB
-
memory/3536-1291-0x0000000000FC0000-0x0000000000FD0000-memory.dmpFilesize
64KB
-
memory/3536-1290-0x0000000000FC0000-0x0000000000FD0000-memory.dmpFilesize
64KB
-
memory/3620-1135-0x00000000048D0000-0x00000000048E0000-memory.dmpFilesize
64KB
-
memory/3620-1134-0x00000000048E0000-0x000000000492B000-memory.dmpFilesize
300KB
-
memory/3620-1133-0x0000000000020000-0x0000000000052000-memory.dmpFilesize
200KB
-
memory/3720-1206-0x0000000006960000-0x0000000006970000-memory.dmpFilesize
64KB
-
memory/3720-1205-0x0000000006960000-0x0000000006970000-memory.dmpFilesize
64KB
-
memory/4196-148-0x0000000000920000-0x000000000092A000-memory.dmpFilesize
40KB
-
memory/4380-1219-0x00000000074F0000-0x0000000007840000-memory.dmpFilesize
3.3MB
-
memory/4380-1218-0x00000000066A0000-0x00000000066B0000-memory.dmpFilesize
64KB
-
memory/4380-1217-0x00000000066A0000-0x00000000066B0000-memory.dmpFilesize
64KB
-
memory/4380-1221-0x0000000007E50000-0x0000000007E9B000-memory.dmpFilesize
300KB
-
memory/4836-1325-0x0000000000F20000-0x0000000000F30000-memory.dmpFilesize
64KB
-
memory/4836-1326-0x0000000000F20000-0x0000000000F30000-memory.dmpFilesize
64KB