Analysis

  • max time kernel
    113s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2023, 10:55

General

  • Target

    debugger576.exe

  • Size

    1021KB

  • MD5

    8a32e2ac9bb62b0808a2de4598886e89

  • SHA1

    fc2a1e3fcc06b2b97cf3f8142a792e850135ade5

  • SHA256

    d8e0ca07eb62ac716e1631d632c2045271e1129a3187806decafae330ebc0cea

  • SHA512

    bfbf6f7b3f088efd038be5dec85286bc33cd2afb92b568532f813db848f1858f8a5dd96b7928cd0549fd26b68d54e5fd59927de588f12fb5420040faa87bf8d3

  • SSDEEP

    24576:kypG9Yi6XJuCGH8GcqLfeiA/wAMpDojUt1IGCKjLZao:zpG9Yi6XQVH8GcqLzA/wbtojUt1I2jM

Malware Config

Extracted

Family

redline

Botnet

luza

C2

185.161.248.37:4138

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 24 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\debugger576.exe
    "C:\Users\Admin\AppData\Local\Temp\debugger576.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1008
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1364
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1792
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
                PID:1616
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:1988
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:N"
                    7⤵
                      PID:1676
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "legends.exe" /P "Admin:R" /E
                      7⤵
                        PID:1008
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:1300
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:N"
                          7⤵
                            PID:2028
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\41bde21dc7" /P "Admin:R" /E
                            7⤵
                              PID:1900
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                            6⤵
                            • Loads dropped DLL
                            PID:2024
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {2D4D196F-D1D2-4CFD-8E9C-47D323FE1366} S-1-5-21-1914912747-3343861975-731272777-1000:TMRJMUQF\Admin:Interactive:[1]
                  1⤵
                    PID:1496
                    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1996
                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        3⤵
                        • Executes dropped EXE
                        PID:1540

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe

                    Filesize

                    576KB

                    MD5

                    e532f2ca17bd701ad2073a2ba39c9730

                    SHA1

                    2546a8107e1da285318554c4e856dc0b67c6bfa5

                    SHA256

                    f861d03d3eed3c256733267dfb9b48d1c78fa4babbd7794f99cbf500561fec9e

                    SHA512

                    d722692b1a01caf615db811f3339269edfa2270fa0f0bfa2ae9503be5b4820bce72f20e7ff52f8a38aa5ee3d2fb8348433ad520d354bf6fbc6c05ffdfa1fffe4

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe

                    Filesize

                    576KB

                    MD5

                    e532f2ca17bd701ad2073a2ba39c9730

                    SHA1

                    2546a8107e1da285318554c4e856dc0b67c6bfa5

                    SHA256

                    f861d03d3eed3c256733267dfb9b48d1c78fa4babbd7794f99cbf500561fec9e

                    SHA512

                    d722692b1a01caf615db811f3339269edfa2270fa0f0bfa2ae9503be5b4820bce72f20e7ff52f8a38aa5ee3d2fb8348433ad520d354bf6fbc6c05ffdfa1fffe4

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe

                    Filesize

                    285KB

                    MD5

                    744cddc00a44127fb784d0e20c9257b7

                    SHA1

                    60cc7261a9b0c5001352d72c8e3bc76cdcd0c7e5

                    SHA256

                    bf7669b2bb6a8dc1f7d7fbc179ebcd1c198484d3a715027fa94efd109bbbaf49

                    SHA512

                    2fec1d99eeca652fc2a1380176424c80a4f13a517c5321136aa02987e42b518e200a129397e7f9b7f44814afcc9441796065fc3f9a11c7e0864607bb01e43ebf

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe

                    Filesize

                    285KB

                    MD5

                    744cddc00a44127fb784d0e20c9257b7

                    SHA1

                    60cc7261a9b0c5001352d72c8e3bc76cdcd0c7e5

                    SHA256

                    bf7669b2bb6a8dc1f7d7fbc179ebcd1c198484d3a715027fa94efd109bbbaf49

                    SHA512

                    2fec1d99eeca652fc2a1380176424c80a4f13a517c5321136aa02987e42b518e200a129397e7f9b7f44814afcc9441796065fc3f9a11c7e0864607bb01e43ebf

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe

                    Filesize

                    305KB

                    MD5

                    7bc0d6e4df5198f08e6fb0210c47480a

                    SHA1

                    8a483bd2f98e0be0f7d06051610e768560c4e6d5

                    SHA256

                    1757060fd727f43059fc207c490d00ee541e28897a9e6af05a5d57b6d2721756

                    SHA512

                    e9081d7bd8345f3798954e0d47a9436be9b7b1b0e1f5bcbc45b8ebc7bfa4624b714184d34ce0b192325966fc394a8e87ec075586d600b3c6a6ccb8084bcc06a8

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe

                    Filesize

                    305KB

                    MD5

                    7bc0d6e4df5198f08e6fb0210c47480a

                    SHA1

                    8a483bd2f98e0be0f7d06051610e768560c4e6d5

                    SHA256

                    1757060fd727f43059fc207c490d00ee541e28897a9e6af05a5d57b6d2721756

                    SHA512

                    e9081d7bd8345f3798954e0d47a9436be9b7b1b0e1f5bcbc45b8ebc7bfa4624b714184d34ce0b192325966fc394a8e87ec075586d600b3c6a6ccb8084bcc06a8

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe

                    Filesize

                    185KB

                    MD5

                    2f351c71309ac42d679ce6a6f484d5bf

                    SHA1

                    4166cb7a5c5789cdfe752ce8c7d0e5ff6989d8bc

                    SHA256

                    28b72483d4bb25a8d4ee5246d3b6c1b0a80d73b5f75798b65bd3fd0c8a86d9ca

                    SHA512

                    b71ff8f8e79bb4455fbefdaddba71d4301bb10cf01b7496cd5f33e6ce42aeb6d31ebc15d1581276654a4f8796f6311641d7c97c2f9876312f30c66e1219db85a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe

                    Filesize

                    185KB

                    MD5

                    2f351c71309ac42d679ce6a6f484d5bf

                    SHA1

                    4166cb7a5c5789cdfe752ce8c7d0e5ff6989d8bc

                    SHA256

                    28b72483d4bb25a8d4ee5246d3b6c1b0a80d73b5f75798b65bd3fd0c8a86d9ca

                    SHA512

                    b71ff8f8e79bb4455fbefdaddba71d4301bb10cf01b7496cd5f33e6ce42aeb6d31ebc15d1581276654a4f8796f6311641d7c97c2f9876312f30c66e1219db85a

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe

                    Filesize

                    145KB

                    MD5

                    271b9c28015c4185f6f6a8b72a7cf7f9

                    SHA1

                    3ff2834268478c19df34eba7e01eaff0caf98c95

                    SHA256

                    4c0482fd51bb836e6bbc2233070051fab76dd9f7b9fba708c9dfeb0b3ff2b886

                    SHA512

                    9975ccc927ff3fced7323a5bd456f3cc91b263e78c849cde58a16724e97fd7d0feb63ab77dab5971110adb756a2a2640bc5d84736862bc53ffc70bef1e8486fa

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe

                    Filesize

                    145KB

                    MD5

                    271b9c28015c4185f6f6a8b72a7cf7f9

                    SHA1

                    3ff2834268478c19df34eba7e01eaff0caf98c95

                    SHA256

                    4c0482fd51bb836e6bbc2233070051fab76dd9f7b9fba708c9dfeb0b3ff2b886

                    SHA512

                    9975ccc927ff3fced7323a5bd456f3cc91b263e78c849cde58a16724e97fd7d0feb63ab77dab5971110adb756a2a2640bc5d84736862bc53ffc70bef1e8486fa

                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s6652699.exe

                    Filesize

                    962KB

                    MD5

                    bb8d2df185fd7ddf61b7fd4aa1a57ea2

                    SHA1

                    4435ad458d05544b936522f2ceeab2ca1db2b321

                    SHA256

                    e5cfa42e53d4da01224d4687826d73cb428025f1aead46294766c5a27deb6d61

                    SHA512

                    34ae62f61f83aa361f4b64db2ce7792306c882214b5f8211cc86d692859ef40a2036c7b6dfaf5ce1def078777dba81454594305f9b2a8c7fbdec011a9b6cb878

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe

                    Filesize

                    576KB

                    MD5

                    e532f2ca17bd701ad2073a2ba39c9730

                    SHA1

                    2546a8107e1da285318554c4e856dc0b67c6bfa5

                    SHA256

                    f861d03d3eed3c256733267dfb9b48d1c78fa4babbd7794f99cbf500561fec9e

                    SHA512

                    d722692b1a01caf615db811f3339269edfa2270fa0f0bfa2ae9503be5b4820bce72f20e7ff52f8a38aa5ee3d2fb8348433ad520d354bf6fbc6c05ffdfa1fffe4

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8066697.exe

                    Filesize

                    576KB

                    MD5

                    e532f2ca17bd701ad2073a2ba39c9730

                    SHA1

                    2546a8107e1da285318554c4e856dc0b67c6bfa5

                    SHA256

                    f861d03d3eed3c256733267dfb9b48d1c78fa4babbd7794f99cbf500561fec9e

                    SHA512

                    d722692b1a01caf615db811f3339269edfa2270fa0f0bfa2ae9503be5b4820bce72f20e7ff52f8a38aa5ee3d2fb8348433ad520d354bf6fbc6c05ffdfa1fffe4

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe

                    Filesize

                    285KB

                    MD5

                    744cddc00a44127fb784d0e20c9257b7

                    SHA1

                    60cc7261a9b0c5001352d72c8e3bc76cdcd0c7e5

                    SHA256

                    bf7669b2bb6a8dc1f7d7fbc179ebcd1c198484d3a715027fa94efd109bbbaf49

                    SHA512

                    2fec1d99eeca652fc2a1380176424c80a4f13a517c5321136aa02987e42b518e200a129397e7f9b7f44814afcc9441796065fc3f9a11c7e0864607bb01e43ebf

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r6954829.exe

                    Filesize

                    285KB

                    MD5

                    744cddc00a44127fb784d0e20c9257b7

                    SHA1

                    60cc7261a9b0c5001352d72c8e3bc76cdcd0c7e5

                    SHA256

                    bf7669b2bb6a8dc1f7d7fbc179ebcd1c198484d3a715027fa94efd109bbbaf49

                    SHA512

                    2fec1d99eeca652fc2a1380176424c80a4f13a517c5321136aa02987e42b518e200a129397e7f9b7f44814afcc9441796065fc3f9a11c7e0864607bb01e43ebf

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe

                    Filesize

                    305KB

                    MD5

                    7bc0d6e4df5198f08e6fb0210c47480a

                    SHA1

                    8a483bd2f98e0be0f7d06051610e768560c4e6d5

                    SHA256

                    1757060fd727f43059fc207c490d00ee541e28897a9e6af05a5d57b6d2721756

                    SHA512

                    e9081d7bd8345f3798954e0d47a9436be9b7b1b0e1f5bcbc45b8ebc7bfa4624b714184d34ce0b192325966fc394a8e87ec075586d600b3c6a6ccb8084bcc06a8

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3551942.exe

                    Filesize

                    305KB

                    MD5

                    7bc0d6e4df5198f08e6fb0210c47480a

                    SHA1

                    8a483bd2f98e0be0f7d06051610e768560c4e6d5

                    SHA256

                    1757060fd727f43059fc207c490d00ee541e28897a9e6af05a5d57b6d2721756

                    SHA512

                    e9081d7bd8345f3798954e0d47a9436be9b7b1b0e1f5bcbc45b8ebc7bfa4624b714184d34ce0b192325966fc394a8e87ec075586d600b3c6a6ccb8084bcc06a8

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe

                    Filesize

                    185KB

                    MD5

                    2f351c71309ac42d679ce6a6f484d5bf

                    SHA1

                    4166cb7a5c5789cdfe752ce8c7d0e5ff6989d8bc

                    SHA256

                    28b72483d4bb25a8d4ee5246d3b6c1b0a80d73b5f75798b65bd3fd0c8a86d9ca

                    SHA512

                    b71ff8f8e79bb4455fbefdaddba71d4301bb10cf01b7496cd5f33e6ce42aeb6d31ebc15d1581276654a4f8796f6311641d7c97c2f9876312f30c66e1219db85a

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o9710725.exe

                    Filesize

                    185KB

                    MD5

                    2f351c71309ac42d679ce6a6f484d5bf

                    SHA1

                    4166cb7a5c5789cdfe752ce8c7d0e5ff6989d8bc

                    SHA256

                    28b72483d4bb25a8d4ee5246d3b6c1b0a80d73b5f75798b65bd3fd0c8a86d9ca

                    SHA512

                    b71ff8f8e79bb4455fbefdaddba71d4301bb10cf01b7496cd5f33e6ce42aeb6d31ebc15d1581276654a4f8796f6311641d7c97c2f9876312f30c66e1219db85a

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe

                    Filesize

                    145KB

                    MD5

                    271b9c28015c4185f6f6a8b72a7cf7f9

                    SHA1

                    3ff2834268478c19df34eba7e01eaff0caf98c95

                    SHA256

                    4c0482fd51bb836e6bbc2233070051fab76dd9f7b9fba708c9dfeb0b3ff2b886

                    SHA512

                    9975ccc927ff3fced7323a5bd456f3cc91b263e78c849cde58a16724e97fd7d0feb63ab77dab5971110adb756a2a2640bc5d84736862bc53ffc70bef1e8486fa

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9191757.exe

                    Filesize

                    145KB

                    MD5

                    271b9c28015c4185f6f6a8b72a7cf7f9

                    SHA1

                    3ff2834268478c19df34eba7e01eaff0caf98c95

                    SHA256

                    4c0482fd51bb836e6bbc2233070051fab76dd9f7b9fba708c9dfeb0b3ff2b886

                    SHA512

                    9975ccc927ff3fced7323a5bd456f3cc91b263e78c849cde58a16724e97fd7d0feb63ab77dab5971110adb756a2a2640bc5d84736862bc53ffc70bef1e8486fa

                  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                    Filesize

                    89KB

                    MD5

                    73c0c85e39b9a63b42f6c4ff6d634f8b

                    SHA1

                    efb047b4177ad78268f6fc8bf959f58f1123eb51

                    SHA256

                    477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                    SHA512

                    ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                  • memory/1160-1077-0x0000000000FE0000-0x00000000010D8000-memory.dmp

                    Filesize

                    992KB

                  • memory/1160-1079-0x00000000071D0000-0x0000000007210000-memory.dmp

                    Filesize

                    256KB

                  • memory/1180-123-0x0000000000A70000-0x0000000000AB0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1180-122-0x00000000003E0000-0x000000000040A000-memory.dmp

                    Filesize

                    168KB

                  • memory/1364-1086-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/1364-1092-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/1476-1054-0x0000000000970000-0x00000000009B0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1476-1052-0x0000000001080000-0x0000000001178000-memory.dmp

                    Filesize

                    992KB

                  • memory/1500-149-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-130-0x0000000000E50000-0x0000000000E94000-memory.dmp

                    Filesize

                    272KB

                  • memory/1500-159-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-161-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-165-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-167-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-163-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-487-0x0000000004900000-0x0000000004940000-memory.dmp

                    Filesize

                    256KB

                  • memory/1500-489-0x0000000004900000-0x0000000004940000-memory.dmp

                    Filesize

                    256KB

                  • memory/1500-1042-0x0000000004900000-0x0000000004940000-memory.dmp

                    Filesize

                    256KB

                  • memory/1500-155-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-153-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-151-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-147-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-145-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-143-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-141-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-139-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-137-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-135-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-133-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-157-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-132-0x0000000000EE0000-0x0000000000F1C000-memory.dmp

                    Filesize

                    240KB

                  • memory/1500-131-0x0000000000EE0000-0x0000000000F20000-memory.dmp

                    Filesize

                    256KB

                  • memory/1540-1124-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/1644-97-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-95-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-113-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-84-0x0000000000320000-0x000000000033E000-memory.dmp

                    Filesize

                    120KB

                  • memory/1644-111-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-109-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-85-0x0000000004A70000-0x0000000004AB0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1644-105-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-103-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-101-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-115-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-107-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-88-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-93-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-91-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-89-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-99-0x00000000005D0000-0x00000000005E6000-memory.dmp

                    Filesize

                    88KB

                  • memory/1644-87-0x00000000005D0000-0x00000000005EC000-memory.dmp

                    Filesize

                    112KB

                  • memory/1644-86-0x0000000004A70000-0x0000000004AB0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1996-1117-0x0000000000FE0000-0x00000000010D8000-memory.dmp

                    Filesize

                    992KB

                  • memory/1996-1119-0x0000000000920000-0x0000000000960000-memory.dmp

                    Filesize

                    256KB

                  • memory/2040-1068-0x00000000001F0000-0x00000000001F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2040-1073-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/2040-1061-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB