Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:13

General

  • Target

    315210b2e4a9d0e072bae919377ff43aa9e8834313335cabef4a048b48a8bbec.exe

  • Size

    1.0MB

  • MD5

    2411653655b03e21b87a7684d6ab1539

  • SHA1

    2a296c22ca1f499fb8735fcae8c2be6064a4cbcf

  • SHA256

    315210b2e4a9d0e072bae919377ff43aa9e8834313335cabef4a048b48a8bbec

  • SHA512

    f8e3fd805951a0a9d9b47789f9d118c60bc2b954a634cf6a727f88e5e076c33f4302543857f87d357e6a92f1b4d46be02f5df68a537daced74b36eab0f667d26

  • SSDEEP

    24576:3y5Hm2RBA5C5+L/sb/perCZcbxEhP2H9M/U1ef:CN8tkb/peWONc2H9a

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

fort

C2

193.233.20.33:4125

Attributes
  • auth_value

    5ea5673154a804d8c80f565f7276f720

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Extracted

Family

raccoon

Botnet

301867536c206e3dae52e6d17c16cc9b

C2

http://213.226.100.108/

rc4.plain

Extracted

Family

aurora

C2

212.87.204.93:8081

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\315210b2e4a9d0e072bae919377ff43aa9e8834313335cabef4a048b48a8bbec.exe
    "C:\Users\Admin\AppData\Local\Temp\315210b2e4a9d0e072bae919377ff43aa9e8834313335cabef4a048b48a8bbec.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6867.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6867.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4443.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8822.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8822.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0780.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0780.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4784DE.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4784DE.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10PR43.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10PR43.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1696
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1968
            5⤵
            • Program crash
            PID:3396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xeRXv17.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xeRXv17.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y87qc67.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y87qc67.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3372
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4776
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4748
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:1720
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:1088
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:5096
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:5040
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:1804
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4048
                    • C:\Users\Admin\AppData\Local\Temp\1000188001\2.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000188001\2.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:3860
                    • C:\Users\Admin\AppData\Local\Temp\1000191001\2023.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000191001\2023.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4884
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c "wmic csproduct get uuid"
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4512
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          wmic csproduct get uuid
                          6⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4500
                      • C:\Windows\SysWOW64\Wbem\wmic.exe
                        wmic os get Caption
                        5⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2144
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C "wmic path win32_VideoController get name"
                        5⤵
                          PID:3376
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic path win32_VideoController get name
                            6⤵
                              PID:3280
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C "wmic cpu get name"
                            5⤵
                              PID:3236
                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                wmic cpu get name
                                6⤵
                                  PID:1992
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd "/c " systeminfo
                                5⤵
                                  PID:424
                                  • C:\Windows\SysWOW64\systeminfo.exe
                                    systeminfo
                                    6⤵
                                    • Gathers system information
                                    PID:1436
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1324
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5080
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""
                                  5⤵
                                    PID:4072
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1696 -ip 1696
                            1⤵
                              PID:3604
                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              1⤵
                              • Executes dropped EXE
                              PID:3272
                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              1⤵
                              • Executes dropped EXE
                              PID:400

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              1KB

                              MD5

                              5315900105942deb090a358a315b06fe

                              SHA1

                              22fe5d2e1617c31afbafb91c117508d41ef0ce44

                              SHA256

                              e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                              SHA512

                              77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              15KB

                              MD5

                              82d55fbdaf8f1b03150a9096316eca69

                              SHA1

                              45e045997ce447e565111d41096a150d494fd199

                              SHA256

                              5c7494c0342c823f11bad9a56d5d4a3a81cc9bd45f4696550b95f21e6a988567

                              SHA512

                              f1d6a21dccbe79d94940260b418c2a6ef1c9d04929a3bdeb87a127d716078fb55da730af71e1a0fc20ef0361fc7929a26f488c4070940c6a87a4565a2a74ba74

                            • C:\Users\Admin\AppData\Local\Temp\1000188001\2.exe

                              Filesize

                              110KB

                              MD5

                              bc338e23e5411697561306eabb29bd9c

                              SHA1

                              2503a1d824af32214f3102d6e0d2e52d439b91f8

                              SHA256

                              fc89f7167628e95935070f6a72c859da69a91655e72c4d8c8e31fbac73c2d379

                              SHA512

                              f5fa3d4f0d611225393f9ff33de6657c1c47c89e11695b44fd35c840ea6ed0545c7b1da7ce4009d8cca76cf9587cb1c4586c992cb646d4cbeb816ef72e8c9254

                            • C:\Users\Admin\AppData\Local\Temp\1000188001\2.exe

                              Filesize

                              110KB

                              MD5

                              bc338e23e5411697561306eabb29bd9c

                              SHA1

                              2503a1d824af32214f3102d6e0d2e52d439b91f8

                              SHA256

                              fc89f7167628e95935070f6a72c859da69a91655e72c4d8c8e31fbac73c2d379

                              SHA512

                              f5fa3d4f0d611225393f9ff33de6657c1c47c89e11695b44fd35c840ea6ed0545c7b1da7ce4009d8cca76cf9587cb1c4586c992cb646d4cbeb816ef72e8c9254

                            • C:\Users\Admin\AppData\Local\Temp\1000188001\2.exe

                              Filesize

                              110KB

                              MD5

                              bc338e23e5411697561306eabb29bd9c

                              SHA1

                              2503a1d824af32214f3102d6e0d2e52d439b91f8

                              SHA256

                              fc89f7167628e95935070f6a72c859da69a91655e72c4d8c8e31fbac73c2d379

                              SHA512

                              f5fa3d4f0d611225393f9ff33de6657c1c47c89e11695b44fd35c840ea6ed0545c7b1da7ce4009d8cca76cf9587cb1c4586c992cb646d4cbeb816ef72e8c9254

                            • C:\Users\Admin\AppData\Local\Temp\1000191001\2023.exe

                              Filesize

                              3.1MB

                              MD5

                              027a60b4337dd0847d0414aa8719ffec

                              SHA1

                              80f78f880e891adfa8f71fb1447ed19734077062

                              SHA256

                              3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                              SHA512

                              009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

                            • C:\Users\Admin\AppData\Local\Temp\1000191001\2023.exe

                              Filesize

                              3.1MB

                              MD5

                              027a60b4337dd0847d0414aa8719ffec

                              SHA1

                              80f78f880e891adfa8f71fb1447ed19734077062

                              SHA256

                              3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                              SHA512

                              009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

                            • C:\Users\Admin\AppData\Local\Temp\1000191001\2023.exe

                              Filesize

                              3.1MB

                              MD5

                              027a60b4337dd0847d0414aa8719ffec

                              SHA1

                              80f78f880e891adfa8f71fb1447ed19734077062

                              SHA256

                              3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168

                              SHA512

                              009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y87qc67.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y87qc67.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6867.exe

                              Filesize

                              852KB

                              MD5

                              5bb5459b73512a04cabfa9b990fdc48f

                              SHA1

                              115cb80364d1fb2654dc68ac954d48651df1872f

                              SHA256

                              7443521372931ef3b8436c4250147ecb05a4135ee85ffca8aa3c1935659c095d

                              SHA512

                              efcb2443ababd16997005addf83400dd0439e0db7ebe37ee91c1bbf040d2194486fd5e00a7e4d2219d00f5bbed66da1d85dc77a1437adfb2f38259371e1fffdf

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6867.exe

                              Filesize

                              852KB

                              MD5

                              5bb5459b73512a04cabfa9b990fdc48f

                              SHA1

                              115cb80364d1fb2654dc68ac954d48651df1872f

                              SHA256

                              7443521372931ef3b8436c4250147ecb05a4135ee85ffca8aa3c1935659c095d

                              SHA512

                              efcb2443ababd16997005addf83400dd0439e0db7ebe37ee91c1bbf040d2194486fd5e00a7e4d2219d00f5bbed66da1d85dc77a1437adfb2f38259371e1fffdf

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xeRXv17.exe

                              Filesize

                              175KB

                              MD5

                              bd71bdbe08a695b14d15021fb0d289c8

                              SHA1

                              0b72f7a2560db6be98b3e1efe20a50cc4c204b77

                              SHA256

                              31651c6b1434701d54e31f3263cae9e87914d43f2f52e53d6479fd028a3a83ae

                              SHA512

                              9107d07ff91d80c3fb205eb3add953feda52b182fd9257ed1e950de6f14072f9815142661b4a34fab7a1a12db7e202cc1a92486ebae79fe2dac7c76c8b9e94ca

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xeRXv17.exe

                              Filesize

                              175KB

                              MD5

                              bd71bdbe08a695b14d15021fb0d289c8

                              SHA1

                              0b72f7a2560db6be98b3e1efe20a50cc4c204b77

                              SHA256

                              31651c6b1434701d54e31f3263cae9e87914d43f2f52e53d6479fd028a3a83ae

                              SHA512

                              9107d07ff91d80c3fb205eb3add953feda52b182fd9257ed1e950de6f14072f9815142661b4a34fab7a1a12db7e202cc1a92486ebae79fe2dac7c76c8b9e94ca

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4443.exe

                              Filesize

                              710KB

                              MD5

                              04bf709e682340396abc199082ab9b84

                              SHA1

                              2dccee10e7246a3d9c2b2999193e91c342f4e122

                              SHA256

                              8d09aa6f6bd9d989e7f208946988d54e50b6d12e07b56fde93ee786f56b07af8

                              SHA512

                              1be864b9231adc96f7857e87556d49befe393602139b7218e911e2a35247118f1a2da8e0b86ded4e66c4272301ff285556e79a06dc52f12d99835a36f81d7298

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4443.exe

                              Filesize

                              710KB

                              MD5

                              04bf709e682340396abc199082ab9b84

                              SHA1

                              2dccee10e7246a3d9c2b2999193e91c342f4e122

                              SHA256

                              8d09aa6f6bd9d989e7f208946988d54e50b6d12e07b56fde93ee786f56b07af8

                              SHA512

                              1be864b9231adc96f7857e87556d49befe393602139b7218e911e2a35247118f1a2da8e0b86ded4e66c4272301ff285556e79a06dc52f12d99835a36f81d7298

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10PR43.exe

                              Filesize

                              384KB

                              MD5

                              90e704a3a764474efff25d05578d9660

                              SHA1

                              959cf8fce98c7b5217c0ad0d3a51ad1a459741c8

                              SHA256

                              986770d236125b5112c995dae85a505745f2405208c281c9c8fe54509fa24883

                              SHA512

                              64fbe7fc8032fbb86c574872f18bc49749f7d63e963e3527c579451d1df11754daaafd9c213a8394bf285e665f0e69cbb24f5de676b22f6d33cc07bc31b7dc18

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w10PR43.exe

                              Filesize

                              384KB

                              MD5

                              90e704a3a764474efff25d05578d9660

                              SHA1

                              959cf8fce98c7b5217c0ad0d3a51ad1a459741c8

                              SHA256

                              986770d236125b5112c995dae85a505745f2405208c281c9c8fe54509fa24883

                              SHA512

                              64fbe7fc8032fbb86c574872f18bc49749f7d63e963e3527c579451d1df11754daaafd9c213a8394bf285e665f0e69cbb24f5de676b22f6d33cc07bc31b7dc18

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8822.exe

                              Filesize

                              351KB

                              MD5

                              945ee709ebc386a14a936cef0ee47478

                              SHA1

                              258c9b470b4708ce6649c8ec4b189e77f84487db

                              SHA256

                              7cb90341d5f6386c1db892b23d6acde98bc59207979df68973d83f0d4ca70b0f

                              SHA512

                              26a052dbda603d206e9dcbed8b950a89f16a5b36d5eabf7b3afad3c1aa230ea8ab7887496dc6461cf98d637342ed1d534c922dc04c4734669bac3b1e799c5aa1

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8822.exe

                              Filesize

                              351KB

                              MD5

                              945ee709ebc386a14a936cef0ee47478

                              SHA1

                              258c9b470b4708ce6649c8ec4b189e77f84487db

                              SHA256

                              7cb90341d5f6386c1db892b23d6acde98bc59207979df68973d83f0d4ca70b0f

                              SHA512

                              26a052dbda603d206e9dcbed8b950a89f16a5b36d5eabf7b3afad3c1aa230ea8ab7887496dc6461cf98d637342ed1d534c922dc04c4734669bac3b1e799c5aa1

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0780.exe

                              Filesize

                              12KB

                              MD5

                              f62f75dab7b6710f8d7761d2c3c46ca6

                              SHA1

                              e8ed453589210ffb0ee025ade335d16823395c98

                              SHA256

                              f8f447265eaf5b2a3967e879e59a5ec653317751f7685dca104458810bd18405

                              SHA512

                              0fb9cf61e41a6f123c9e58201b95e2121035d4f759fe1b605fd401aae1dbd17097757ac9659764262ce277192e9c08414da743f2a2e05ec5776ecc3319d5d2d6

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0780.exe

                              Filesize

                              12KB

                              MD5

                              f62f75dab7b6710f8d7761d2c3c46ca6

                              SHA1

                              e8ed453589210ffb0ee025ade335d16823395c98

                              SHA256

                              f8f447265eaf5b2a3967e879e59a5ec653317751f7685dca104458810bd18405

                              SHA512

                              0fb9cf61e41a6f123c9e58201b95e2121035d4f759fe1b605fd401aae1dbd17097757ac9659764262ce277192e9c08414da743f2a2e05ec5776ecc3319d5d2d6

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4784DE.exe

                              Filesize

                              325KB

                              MD5

                              2ce2efa8997e759013222bb30a4cf545

                              SHA1

                              6bd0e0c6596aa2fb42e1b48bf5ac417bc753b4d8

                              SHA256

                              f6a81bc8888880909c59b587387b6b130933459078afcf7ea3f1ca178232728c

                              SHA512

                              fed57852b4bcd4c4e2cfa565f6f61a2e124c4ae1ae8a7307e906d7970047b7e57f841b45252c7ac4e3002b0bd1bfcaaa575052cd28f812fa2d4dec285d174a64

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4784DE.exe

                              Filesize

                              325KB

                              MD5

                              2ce2efa8997e759013222bb30a4cf545

                              SHA1

                              6bd0e0c6596aa2fb42e1b48bf5ac417bc753b4d8

                              SHA256

                              f6a81bc8888880909c59b587387b6b130933459078afcf7ea3f1ca178232728c

                              SHA512

                              fed57852b4bcd4c4e2cfa565f6f61a2e124c4ae1ae8a7307e906d7970047b7e57f841b45252c7ac4e3002b0bd1bfcaaa575052cd28f812fa2d4dec285d174a64

                            • C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx

                              Filesize

                              71KB

                              MD5

                              46988a922937a39036d6b71e62d0f966

                              SHA1

                              4a997f2a0360274ec7990aac156870a5a7030665

                              SHA256

                              5954db23a8424f6cb1e933387d0866910c45615f54342aa0f6dd597174393de6

                              SHA512

                              dd7774668cd24c303e670e7d096794aca67593b8d8a9b3b38aa08c148f67e74c07041f25941465b3ae030bafd76384b4b79d41c1eeebe5bd11d94ab25ef00e9d

                            • C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC

                              Filesize

                              148KB

                              MD5

                              90a1d4b55edf36fa8b4cc6974ed7d4c4

                              SHA1

                              aba1b8d0e05421e7df5982899f626211c3c4b5c1

                              SHA256

                              7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                              SHA512

                              ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ouzu3hst.db3.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                              Filesize

                              236KB

                              MD5

                              0fca7d967f70f51ebd29080a49c14c00

                              SHA1

                              fe440b91f1b3f958d588a5ac0b5509231073e737

                              SHA256

                              edf7388779bbafbd11cf6ef56dfe16ee03787554fb009783ef2958a7fa5f4b96

                              SHA512

                              104558fe68d0bdcf7e20fa415287217402e913fb6b8c54dda9461fc6eb7c45e9169f3e75b877094ba7a9d6389aba2bd6a52db4e1fbc94a49be400b308fb3eda1

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                              Filesize

                              223B

                              MD5

                              94cbeec5d4343918fd0e48760e40539c

                              SHA1

                              a049266c5c1131f692f306c8710d7e72586ae79d

                              SHA256

                              48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                              SHA512

                              4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                            • memory/1324-1221-0x00000000021E0000-0x00000000021F0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1324-1224-0x0000000006090000-0x00000000060AA000-memory.dmp

                              Filesize

                              104KB

                            • memory/1324-1223-0x0000000006D40000-0x0000000006DD6000-memory.dmp

                              Filesize

                              600KB

                            • memory/1324-1222-0x0000000005B80000-0x0000000005B9E000-memory.dmp

                              Filesize

                              120KB

                            • memory/1324-1225-0x00000000060E0000-0x0000000006102000-memory.dmp

                              Filesize

                              136KB

                            • memory/1324-1207-0x0000000002270000-0x00000000022A6000-memory.dmp

                              Filesize

                              216KB

                            • memory/1324-1208-0x0000000004D80000-0x00000000053A8000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/1324-1209-0x00000000053E0000-0x0000000005402000-memory.dmp

                              Filesize

                              136KB

                            • memory/1324-1212-0x0000000005480000-0x00000000054E6000-memory.dmp

                              Filesize

                              408KB

                            • memory/1324-1220-0x00000000021E0000-0x00000000021F0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1556-1140-0x0000000005A20000-0x0000000005A30000-memory.dmp

                              Filesize

                              64KB

                            • memory/1556-1139-0x0000000000E80000-0x0000000000EB2000-memory.dmp

                              Filesize

                              200KB

                            • memory/1696-242-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-216-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-234-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-236-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-238-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-240-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-230-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-270-0x0000000002CD0000-0x0000000002D1B000-memory.dmp

                              Filesize

                              300KB

                            • memory/1696-272-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-273-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-275-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-1119-0x0000000007910000-0x0000000007F28000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/1696-1120-0x0000000007F70000-0x000000000807A000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/1696-1121-0x00000000080B0000-0x00000000080C2000-memory.dmp

                              Filesize

                              72KB

                            • memory/1696-1122-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-1123-0x00000000080D0000-0x000000000810C000-memory.dmp

                              Filesize

                              240KB

                            • memory/1696-1125-0x00000000083C0000-0x0000000008452000-memory.dmp

                              Filesize

                              584KB

                            • memory/1696-1126-0x0000000008460000-0x00000000084C6000-memory.dmp

                              Filesize

                              408KB

                            • memory/1696-1127-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-1128-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-1129-0x0000000008DD0000-0x0000000008F92000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/1696-1130-0x0000000008FB0000-0x00000000094DC000-memory.dmp

                              Filesize

                              5.2MB

                            • memory/1696-1131-0x0000000007350000-0x0000000007360000-memory.dmp

                              Filesize

                              64KB

                            • memory/1696-1132-0x0000000004930000-0x00000000049A6000-memory.dmp

                              Filesize

                              472KB

                            • memory/1696-1133-0x000000000A780000-0x000000000A7D0000-memory.dmp

                              Filesize

                              320KB

                            • memory/1696-228-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-226-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-224-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-222-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-220-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-218-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-232-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-214-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-212-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-210-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/1696-209-0x0000000007160000-0x000000000719E000-memory.dmp

                              Filesize

                              248KB

                            • memory/3632-161-0x00000000009D0000-0x00000000009DA000-memory.dmp

                              Filesize

                              40KB

                            • memory/3732-185-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-200-0x0000000000400000-0x0000000002B7F000-memory.dmp

                              Filesize

                              39.5MB

                            • memory/3732-181-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-179-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-198-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/3732-197-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-195-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-193-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-191-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-189-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-187-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-204-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/3732-203-0x0000000000400000-0x0000000002B7F000-memory.dmp

                              Filesize

                              39.5MB

                            • memory/3732-201-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/3732-199-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/3732-177-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-175-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-173-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-171-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-170-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-169-0x0000000007120000-0x00000000076C4000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/3732-168-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/3732-183-0x0000000004C00000-0x0000000004C12000-memory.dmp

                              Filesize

                              72KB

                            • memory/3732-167-0x0000000002C50000-0x0000000002C7D000-memory.dmp

                              Filesize

                              180KB

                            • memory/5080-1232-0x0000000003100000-0x0000000003110000-memory.dmp

                              Filesize

                              64KB

                            • memory/5080-1231-0x0000000003100000-0x0000000003110000-memory.dmp

                              Filesize

                              64KB