Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19/05/2023, 13:01

General

  • Target

    a910223a596d707632c404b4e1ac3ce1.exe

  • Size

    1021KB

  • MD5

    a910223a596d707632c404b4e1ac3ce1

  • SHA1

    cc1481465266be2bf0d2d7469753c778d46603d3

  • SHA256

    ec8e9e94d99bbf7bbdb33b5d003b736a65f0446b5bde067857922eb7044c58b4

  • SHA512

    7437b4e7ce556108e4ab2f5f2c18796ac0395317ca4d156b7a0a9b99768488c7286e33f6ce2656fc2533dce26c250cf12b159711946a7170307ad2e027d93049

  • SSDEEP

    12288:3MrBy90vNnbxZ7+Dj6DFrh0kZhwpU1dAZ2xWotsfGk51+6/pmsND5Tk4Pp2w1wL1:+yeNfSm9mCyU102yi6/pmsdTk4HQ

Malware Config

Extracted

Family

redline

Botnet

luper

C2

77.91.68.253:19065

Attributes
  • auth_value

    474f8e2f629b7bc1a8c7ea1dc39ca043

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 27 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a910223a596d707632c404b4e1ac3ce1.exe
    "C:\Users\Admin\AppData\Local\Temp\a910223a596d707632c404b4e1ac3ce1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:772
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:1184
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1612
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1688
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
                PID:384
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:1516
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:N"
                    7⤵
                      PID:1452
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "legends.exe" /P "Admin:R" /E
                      7⤵
                        PID:1468
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:1532
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:N"
                          7⤵
                            PID:2036
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\41bde21dc7" /P "Admin:R" /E
                            7⤵
                              PID:1460
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                            6⤵
                            • Loads dropped DLL
                            PID:272
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {735A1B73-DE9A-4079-A6FC-702AB71222F2} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]
                  1⤵
                    PID:1900
                    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1880
                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        3⤵
                        • Executes dropped EXE
                        PID:1704

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe

                          Filesize

                          576KB

                          MD5

                          ee6c23eb8368789f6b0fcfa9043ba544

                          SHA1

                          6c4e991f38c69b828bac18f78549c50dddf515e8

                          SHA256

                          af4f4d4f21a2de7168c06ed210dabb1b615594327f2b04a57e398cf5a761af5b

                          SHA512

                          fec15b110845cb241070c6310d13a65ec1826fb8f28b2ca8a30654aae220be2e29354143467c453b191ae4d78097635173efad435b90e312bd12df2b3fccd062

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe

                          Filesize

                          576KB

                          MD5

                          ee6c23eb8368789f6b0fcfa9043ba544

                          SHA1

                          6c4e991f38c69b828bac18f78549c50dddf515e8

                          SHA256

                          af4f4d4f21a2de7168c06ed210dabb1b615594327f2b04a57e398cf5a761af5b

                          SHA512

                          fec15b110845cb241070c6310d13a65ec1826fb8f28b2ca8a30654aae220be2e29354143467c453b191ae4d78097635173efad435b90e312bd12df2b3fccd062

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe

                          Filesize

                          284KB

                          MD5

                          5e7d3be2b8a650df3d590e97297c47c1

                          SHA1

                          f0f6ce37913b8c6ec020c8f62caa15b91dc2fdbe

                          SHA256

                          8c8afd07139b9cebf67bebae8813aca8848b9e1402a0639efc4acdeb2c85971e

                          SHA512

                          36e4af18699454091bda0d24343d5cb31f7f649674deab3ffdc01ce093e7b0a55b9ffd4d32ce511f6fd0fb1c2b9f21dbc0c52cefa474413a45bb44b02f994610

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe

                          Filesize

                          284KB

                          MD5

                          5e7d3be2b8a650df3d590e97297c47c1

                          SHA1

                          f0f6ce37913b8c6ec020c8f62caa15b91dc2fdbe

                          SHA256

                          8c8afd07139b9cebf67bebae8813aca8848b9e1402a0639efc4acdeb2c85971e

                          SHA512

                          36e4af18699454091bda0d24343d5cb31f7f649674deab3ffdc01ce093e7b0a55b9ffd4d32ce511f6fd0fb1c2b9f21dbc0c52cefa474413a45bb44b02f994610

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe

                          Filesize

                          305KB

                          MD5

                          460e2723790f10cb7a5fc0277d09a5cf

                          SHA1

                          270014cec76c82dc906fb98d452f9b7d970b99cb

                          SHA256

                          f5eab1c4024333a2716fde20b7efa399af14488debd7c46567cfb75f97b48ef4

                          SHA512

                          01354c30a64c058e622bce3a547c99aa147634909e66d9bc073518a8c70cb530586e88ce59e0c2f575f977a8738825bdf85b18ea63a77f2248be78f32a206aab

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe

                          Filesize

                          305KB

                          MD5

                          460e2723790f10cb7a5fc0277d09a5cf

                          SHA1

                          270014cec76c82dc906fb98d452f9b7d970b99cb

                          SHA256

                          f5eab1c4024333a2716fde20b7efa399af14488debd7c46567cfb75f97b48ef4

                          SHA512

                          01354c30a64c058e622bce3a547c99aa147634909e66d9bc073518a8c70cb530586e88ce59e0c2f575f977a8738825bdf85b18ea63a77f2248be78f32a206aab

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe

                          Filesize

                          184KB

                          MD5

                          d316a24ea6dff1d9f9b009689251d98c

                          SHA1

                          d06a7071691d88e7a482ca7a6bb3636e6c52a0a6

                          SHA256

                          72286ff6def26a0bafbac7cba5a78afa9619d287f64f8896f9278a0743ac115d

                          SHA512

                          00ee2f2dd709285fba21924a7cd3db3a8705e9b3894c372ae9141eb0296e2565c13207859c89ffaeb075352f7bf892a1915f6f95b10d27b0e47e4fd41c952fcf

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe

                          Filesize

                          184KB

                          MD5

                          d316a24ea6dff1d9f9b009689251d98c

                          SHA1

                          d06a7071691d88e7a482ca7a6bb3636e6c52a0a6

                          SHA256

                          72286ff6def26a0bafbac7cba5a78afa9619d287f64f8896f9278a0743ac115d

                          SHA512

                          00ee2f2dd709285fba21924a7cd3db3a8705e9b3894c372ae9141eb0296e2565c13207859c89ffaeb075352f7bf892a1915f6f95b10d27b0e47e4fd41c952fcf

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe

                          Filesize

                          145KB

                          MD5

                          aeffe8be570f6d167ab4adde7fc6b98b

                          SHA1

                          f4b1458440483308b399694c5fe95e9d1f810aa9

                          SHA256

                          3075ebb4f4f2503858499f8064d496edf2d6e49081f8103142fa7cdb4019bed9

                          SHA512

                          702eb53e26af92336559a27a696ecd7ad18944f290c9ceb41b0f2f9d8467efc39e05888bcc09a79292290ca70d6c20b8d0b96bc13b4f59d6f34e3dcebcb3ff89

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe

                          Filesize

                          145KB

                          MD5

                          aeffe8be570f6d167ab4adde7fc6b98b

                          SHA1

                          f4b1458440483308b399694c5fe95e9d1f810aa9

                          SHA256

                          3075ebb4f4f2503858499f8064d496edf2d6e49081f8103142fa7cdb4019bed9

                          SHA512

                          702eb53e26af92336559a27a696ecd7ad18944f290c9ceb41b0f2f9d8467efc39e05888bcc09a79292290ca70d6c20b8d0b96bc13b4f59d6f34e3dcebcb3ff89

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                          Filesize

                          162B

                          MD5

                          1b7c22a214949975556626d7217e9a39

                          SHA1

                          d01c97e2944166ed23e47e4a62ff471ab8fa031f

                          SHA256

                          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                          SHA512

                          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s4652586.exe

                          Filesize

                          962KB

                          MD5

                          b7fd4476dd01c1d8e8db38c5b67f308f

                          SHA1

                          376f99bf029aa745b3ec0875fed2a29f26433437

                          SHA256

                          431853abe6183de9b0297fcb81ff867854c5699caaeb5d98bbde375f18176078

                          SHA512

                          f507f17f21ea18132bad08e677eecd9d0fa744801a8cc6b3b1638609dea934a024b7bf62cd4a0e2f82d818f7bb72022c748ef3dff2e88986e507327759c13518

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe

                          Filesize

                          576KB

                          MD5

                          ee6c23eb8368789f6b0fcfa9043ba544

                          SHA1

                          6c4e991f38c69b828bac18f78549c50dddf515e8

                          SHA256

                          af4f4d4f21a2de7168c06ed210dabb1b615594327f2b04a57e398cf5a761af5b

                          SHA512

                          fec15b110845cb241070c6310d13a65ec1826fb8f28b2ca8a30654aae220be2e29354143467c453b191ae4d78097635173efad435b90e312bd12df2b3fccd062

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4785108.exe

                          Filesize

                          576KB

                          MD5

                          ee6c23eb8368789f6b0fcfa9043ba544

                          SHA1

                          6c4e991f38c69b828bac18f78549c50dddf515e8

                          SHA256

                          af4f4d4f21a2de7168c06ed210dabb1b615594327f2b04a57e398cf5a761af5b

                          SHA512

                          fec15b110845cb241070c6310d13a65ec1826fb8f28b2ca8a30654aae220be2e29354143467c453b191ae4d78097635173efad435b90e312bd12df2b3fccd062

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe

                          Filesize

                          284KB

                          MD5

                          5e7d3be2b8a650df3d590e97297c47c1

                          SHA1

                          f0f6ce37913b8c6ec020c8f62caa15b91dc2fdbe

                          SHA256

                          8c8afd07139b9cebf67bebae8813aca8848b9e1402a0639efc4acdeb2c85971e

                          SHA512

                          36e4af18699454091bda0d24343d5cb31f7f649674deab3ffdc01ce093e7b0a55b9ffd4d32ce511f6fd0fb1c2b9f21dbc0c52cefa474413a45bb44b02f994610

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r5964166.exe

                          Filesize

                          284KB

                          MD5

                          5e7d3be2b8a650df3d590e97297c47c1

                          SHA1

                          f0f6ce37913b8c6ec020c8f62caa15b91dc2fdbe

                          SHA256

                          8c8afd07139b9cebf67bebae8813aca8848b9e1402a0639efc4acdeb2c85971e

                          SHA512

                          36e4af18699454091bda0d24343d5cb31f7f649674deab3ffdc01ce093e7b0a55b9ffd4d32ce511f6fd0fb1c2b9f21dbc0c52cefa474413a45bb44b02f994610

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe

                          Filesize

                          305KB

                          MD5

                          460e2723790f10cb7a5fc0277d09a5cf

                          SHA1

                          270014cec76c82dc906fb98d452f9b7d970b99cb

                          SHA256

                          f5eab1c4024333a2716fde20b7efa399af14488debd7c46567cfb75f97b48ef4

                          SHA512

                          01354c30a64c058e622bce3a547c99aa147634909e66d9bc073518a8c70cb530586e88ce59e0c2f575f977a8738825bdf85b18ea63a77f2248be78f32a206aab

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1603742.exe

                          Filesize

                          305KB

                          MD5

                          460e2723790f10cb7a5fc0277d09a5cf

                          SHA1

                          270014cec76c82dc906fb98d452f9b7d970b99cb

                          SHA256

                          f5eab1c4024333a2716fde20b7efa399af14488debd7c46567cfb75f97b48ef4

                          SHA512

                          01354c30a64c058e622bce3a547c99aa147634909e66d9bc073518a8c70cb530586e88ce59e0c2f575f977a8738825bdf85b18ea63a77f2248be78f32a206aab

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe

                          Filesize

                          184KB

                          MD5

                          d316a24ea6dff1d9f9b009689251d98c

                          SHA1

                          d06a7071691d88e7a482ca7a6bb3636e6c52a0a6

                          SHA256

                          72286ff6def26a0bafbac7cba5a78afa9619d287f64f8896f9278a0743ac115d

                          SHA512

                          00ee2f2dd709285fba21924a7cd3db3a8705e9b3894c372ae9141eb0296e2565c13207859c89ffaeb075352f7bf892a1915f6f95b10d27b0e47e4fd41c952fcf

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o4825287.exe

                          Filesize

                          184KB

                          MD5

                          d316a24ea6dff1d9f9b009689251d98c

                          SHA1

                          d06a7071691d88e7a482ca7a6bb3636e6c52a0a6

                          SHA256

                          72286ff6def26a0bafbac7cba5a78afa9619d287f64f8896f9278a0743ac115d

                          SHA512

                          00ee2f2dd709285fba21924a7cd3db3a8705e9b3894c372ae9141eb0296e2565c13207859c89ffaeb075352f7bf892a1915f6f95b10d27b0e47e4fd41c952fcf

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe

                          Filesize

                          145KB

                          MD5

                          aeffe8be570f6d167ab4adde7fc6b98b

                          SHA1

                          f4b1458440483308b399694c5fe95e9d1f810aa9

                          SHA256

                          3075ebb4f4f2503858499f8064d496edf2d6e49081f8103142fa7cdb4019bed9

                          SHA512

                          702eb53e26af92336559a27a696ecd7ad18944f290c9ceb41b0f2f9d8467efc39e05888bcc09a79292290ca70d6c20b8d0b96bc13b4f59d6f34e3dcebcb3ff89

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p1898208.exe

                          Filesize

                          145KB

                          MD5

                          aeffe8be570f6d167ab4adde7fc6b98b

                          SHA1

                          f4b1458440483308b399694c5fe95e9d1f810aa9

                          SHA256

                          3075ebb4f4f2503858499f8064d496edf2d6e49081f8103142fa7cdb4019bed9

                          SHA512

                          702eb53e26af92336559a27a696ecd7ad18944f290c9ceb41b0f2f9d8467efc39e05888bcc09a79292290ca70d6c20b8d0b96bc13b4f59d6f34e3dcebcb3ff89

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • memory/520-1050-0x0000000001170000-0x0000000001268000-memory.dmp

                          Filesize

                          992KB

                        • memory/520-1052-0x00000000071E0000-0x0000000007220000-memory.dmp

                          Filesize

                          256KB

                        • memory/1108-122-0x0000000004FC0000-0x0000000005000000-memory.dmp

                          Filesize

                          256KB

                        • memory/1108-121-0x0000000000A60000-0x0000000000A8A000-memory.dmp

                          Filesize

                          168KB

                        • memory/1204-1069-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1268-108-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-94-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-84-0x0000000000B20000-0x0000000000B3E000-memory.dmp

                          Filesize

                          120KB

                        • memory/1268-85-0x0000000000B90000-0x0000000000BAC000-memory.dmp

                          Filesize

                          112KB

                        • memory/1268-86-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-87-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-90-0x00000000021F0000-0x0000000002230000-memory.dmp

                          Filesize

                          256KB

                        • memory/1268-89-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-92-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-114-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-96-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-98-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-100-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-102-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-104-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-106-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-110-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1268-112-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1436-1075-0x00000000070F0000-0x0000000007130000-memory.dmp

                          Filesize

                          256KB

                        • memory/1436-1073-0x00000000000B0000-0x00000000001A8000-memory.dmp

                          Filesize

                          992KB

                        • memory/1492-130-0x0000000002210000-0x0000000002250000-memory.dmp

                          Filesize

                          256KB

                        • memory/1492-158-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-131-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-160-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-129-0x00000000020C0000-0x0000000002104000-memory.dmp

                          Filesize

                          272KB

                        • memory/1492-134-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-136-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-138-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-140-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-142-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-144-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-146-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-148-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-162-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-164-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-150-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-152-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-154-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-156-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-132-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1492-1040-0x0000000004A90000-0x0000000004AD0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1492-495-0x0000000004A90000-0x0000000004AD0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1492-166-0x0000000002210000-0x000000000224C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1612-1089-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1612-1086-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1704-1121-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1880-1114-0x00000000000B0000-0x00000000001A8000-memory.dmp

                          Filesize

                          992KB

                        • memory/1880-1116-0x0000000006D00000-0x0000000006D40000-memory.dmp

                          Filesize

                          256KB