Analysis

  • max time kernel
    115s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 06:58

General

  • Target

    3e8aeb0b3c821511146fde513e509ffbde29cde19f29f3fd5192d0c9e7f57eb9.exe

  • Size

    1020KB

  • MD5

    22bb23c0d1264897406f0ae8e4128663

  • SHA1

    0aee5a0bd208f25437624f3e25674fed291020dd

  • SHA256

    3e8aeb0b3c821511146fde513e509ffbde29cde19f29f3fd5192d0c9e7f57eb9

  • SHA512

    75e5818bfb9568628de8b33525586c652c9320eba5605861937280eed2789f2bc841ad69f316c80e9e1c0d5fcfa0234bccad4bab69f5881c3c8edd4e96d97af0

  • SSDEEP

    24576:hyeT20Pj+Td6J5N6N8Y1qgq8a/pOtrkS8GqaUac34RQ:UeNPj+EJ5N6Nt1qr8aYtrksjcI

Malware Config

Extracted

Family

redline

Botnet

luza

C2

185.161.248.37:4138

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 26 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e8aeb0b3c821511146fde513e509ffbde29cde19f29f3fd5192d0c9e7f57eb9.exe
    "C:\Users\Admin\AppData\Local\Temp\3e8aeb0b3c821511146fde513e509ffbde29cde19f29f3fd5192d0c9e7f57eb9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:600
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:580
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1784
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit
              6⤵
                PID:1028
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  7⤵
                    PID:1452
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "legends.exe" /P "Admin:N"
                    7⤵
                      PID:328
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "legends.exe" /P "Admin:R" /E
                      7⤵
                        PID:1640
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:1272
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\41bde21dc7" /P "Admin:N"
                          7⤵
                            PID:1724
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\41bde21dc7" /P "Admin:R" /E
                            7⤵
                              PID:564
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                            6⤵
                            • Loads dropped DLL
                            PID:1748
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {F59B8DBB-70F5-4D9A-A5D5-6196B3DD542A} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]
                  1⤵
                    PID:1896
                    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1020
                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        3⤵
                        • Executes dropped EXE
                        PID:1836
                    • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1032
                      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
                        3⤵
                        • Executes dropped EXE
                        PID:884

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe

                          Filesize

                          577KB

                          MD5

                          4553edfb8482fbf07a03dccf0b209716

                          SHA1

                          60ec2ea71bdfaed916a4867472c703e243583908

                          SHA256

                          d8de045455bd0ca9fe7940e8c4d17567b910aefad71b4d309f15e6c829af5b35

                          SHA512

                          24aa290e610115ab08a4ae15917c9943fa9c191b4f3283ecfdffb5215d6c7501a61cb2ca46136997dabcef7ee7c96269a0b26eef0c9ddad654c57902fae6aba2

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe

                          Filesize

                          577KB

                          MD5

                          4553edfb8482fbf07a03dccf0b209716

                          SHA1

                          60ec2ea71bdfaed916a4867472c703e243583908

                          SHA256

                          d8de045455bd0ca9fe7940e8c4d17567b910aefad71b4d309f15e6c829af5b35

                          SHA512

                          24aa290e610115ab08a4ae15917c9943fa9c191b4f3283ecfdffb5215d6c7501a61cb2ca46136997dabcef7ee7c96269a0b26eef0c9ddad654c57902fae6aba2

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe

                          Filesize

                          286KB

                          MD5

                          dcd4b22abaae17458aa7a63e42ebc084

                          SHA1

                          d15e85b55768622eda8d5b6600b0f9308db2031f

                          SHA256

                          3ed75cfcee797e1157f4efbd984e18be4aca5b19e7b5e3cd6f616bde0ad0ab58

                          SHA512

                          c2caeac1faa8aba1379114427fdcf7569b15d29502138c6cf0a62d66834efa1beeac1656ca71b955f8fd3f8cf9f881bbf8e71b07fd12ea6c93241002b2a3a49a

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe

                          Filesize

                          286KB

                          MD5

                          dcd4b22abaae17458aa7a63e42ebc084

                          SHA1

                          d15e85b55768622eda8d5b6600b0f9308db2031f

                          SHA256

                          3ed75cfcee797e1157f4efbd984e18be4aca5b19e7b5e3cd6f616bde0ad0ab58

                          SHA512

                          c2caeac1faa8aba1379114427fdcf7569b15d29502138c6cf0a62d66834efa1beeac1656ca71b955f8fd3f8cf9f881bbf8e71b07fd12ea6c93241002b2a3a49a

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe

                          Filesize

                          305KB

                          MD5

                          cbf7c2f89b1c7922196687c3ff3c1226

                          SHA1

                          8bccbc9f830bb086db15607eb175df1ae927019c

                          SHA256

                          c6106fb6370472c001a16f13fa23d1d669caf641c61ffe1633c5109c1f7f3305

                          SHA512

                          f26a2931cffa945792faa450e5193f0d44509e5c5d11bc3a9d398d6bf76752085e21ea80f135759e26b3f675b2b9899e6c220abdd5b11cf9b2afb158cf694860

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe

                          Filesize

                          305KB

                          MD5

                          cbf7c2f89b1c7922196687c3ff3c1226

                          SHA1

                          8bccbc9f830bb086db15607eb175df1ae927019c

                          SHA256

                          c6106fb6370472c001a16f13fa23d1d669caf641c61ffe1633c5109c1f7f3305

                          SHA512

                          f26a2931cffa945792faa450e5193f0d44509e5c5d11bc3a9d398d6bf76752085e21ea80f135759e26b3f675b2b9899e6c220abdd5b11cf9b2afb158cf694860

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe

                          Filesize

                          186KB

                          MD5

                          4636a8c504a31405835d8a6258700170

                          SHA1

                          dc6de09b27e1111397d73a65a3cf6cc8b47ace79

                          SHA256

                          cef24dcfd8a1c7ad8a399b3ed7ea8a5a098340e74790b9fd7ca8dfb14efc68cd

                          SHA512

                          960df3b8a75898df048c5c0b8511ec8e318e6a8c46966d5f80ef522d1da07692cb85bc01f0fae21dc4cdea3a63a22923729d430d71d043f4a91a9b5888e279e4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe

                          Filesize

                          186KB

                          MD5

                          4636a8c504a31405835d8a6258700170

                          SHA1

                          dc6de09b27e1111397d73a65a3cf6cc8b47ace79

                          SHA256

                          cef24dcfd8a1c7ad8a399b3ed7ea8a5a098340e74790b9fd7ca8dfb14efc68cd

                          SHA512

                          960df3b8a75898df048c5c0b8511ec8e318e6a8c46966d5f80ef522d1da07692cb85bc01f0fae21dc4cdea3a63a22923729d430d71d043f4a91a9b5888e279e4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe

                          Filesize

                          145KB

                          MD5

                          b65e3c7c579639f49b60697020caa326

                          SHA1

                          8f43e44ee950e627c5aa020e281a93fe2dd56bae

                          SHA256

                          77aeafc056ea5b79a7103768edac7911b6e9df8ed425f884edba126f9a832e99

                          SHA512

                          bfc0434b4f34c166ffa3294d4705841f58df48fb3f481a7622ad50799ca313ea48ba5ee897f7c4c434ae2459fbf9517d406342bfca2925cab51fa40e5bca0b12

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe

                          Filesize

                          145KB

                          MD5

                          b65e3c7c579639f49b60697020caa326

                          SHA1

                          8f43e44ee950e627c5aa020e281a93fe2dd56bae

                          SHA256

                          77aeafc056ea5b79a7103768edac7911b6e9df8ed425f884edba126f9a832e99

                          SHA512

                          bfc0434b4f34c166ffa3294d4705841f58df48fb3f481a7622ad50799ca313ea48ba5ee897f7c4c434ae2459fbf9517d406342bfca2925cab51fa40e5bca0b12

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                          Filesize

                          162B

                          MD5

                          1b7c22a214949975556626d7217e9a39

                          SHA1

                          d01c97e2944166ed23e47e4a62ff471ab8fa031f

                          SHA256

                          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                          SHA512

                          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\s5397534.exe

                          Filesize

                          963KB

                          MD5

                          bc8ceec446d6d6499f92deccbc693aec

                          SHA1

                          a4ad5b1dcac384919439ed76440d7d6d08eef86c

                          SHA256

                          b1c1d8784c58300f18d46157abb4510b79d4d41c4f9ce777defc4bdd3f381299

                          SHA512

                          d24a5a08c7be93ab8541c90d1706c5b05a5d801149d6b26bece121ca7d090892eba8150b491a4be57d8df46cf11bbb9270d5ed7ba830554dee4185addf7d8ccf

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe

                          Filesize

                          577KB

                          MD5

                          4553edfb8482fbf07a03dccf0b209716

                          SHA1

                          60ec2ea71bdfaed916a4867472c703e243583908

                          SHA256

                          d8de045455bd0ca9fe7940e8c4d17567b910aefad71b4d309f15e6c829af5b35

                          SHA512

                          24aa290e610115ab08a4ae15917c9943fa9c191b4f3283ecfdffb5215d6c7501a61cb2ca46136997dabcef7ee7c96269a0b26eef0c9ddad654c57902fae6aba2

                        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4868007.exe

                          Filesize

                          577KB

                          MD5

                          4553edfb8482fbf07a03dccf0b209716

                          SHA1

                          60ec2ea71bdfaed916a4867472c703e243583908

                          SHA256

                          d8de045455bd0ca9fe7940e8c4d17567b910aefad71b4d309f15e6c829af5b35

                          SHA512

                          24aa290e610115ab08a4ae15917c9943fa9c191b4f3283ecfdffb5215d6c7501a61cb2ca46136997dabcef7ee7c96269a0b26eef0c9ddad654c57902fae6aba2

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe

                          Filesize

                          286KB

                          MD5

                          dcd4b22abaae17458aa7a63e42ebc084

                          SHA1

                          d15e85b55768622eda8d5b6600b0f9308db2031f

                          SHA256

                          3ed75cfcee797e1157f4efbd984e18be4aca5b19e7b5e3cd6f616bde0ad0ab58

                          SHA512

                          c2caeac1faa8aba1379114427fdcf7569b15d29502138c6cf0a62d66834efa1beeac1656ca71b955f8fd3f8cf9f881bbf8e71b07fd12ea6c93241002b2a3a49a

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\r7960183.exe

                          Filesize

                          286KB

                          MD5

                          dcd4b22abaae17458aa7a63e42ebc084

                          SHA1

                          d15e85b55768622eda8d5b6600b0f9308db2031f

                          SHA256

                          3ed75cfcee797e1157f4efbd984e18be4aca5b19e7b5e3cd6f616bde0ad0ab58

                          SHA512

                          c2caeac1faa8aba1379114427fdcf7569b15d29502138c6cf0a62d66834efa1beeac1656ca71b955f8fd3f8cf9f881bbf8e71b07fd12ea6c93241002b2a3a49a

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe

                          Filesize

                          305KB

                          MD5

                          cbf7c2f89b1c7922196687c3ff3c1226

                          SHA1

                          8bccbc9f830bb086db15607eb175df1ae927019c

                          SHA256

                          c6106fb6370472c001a16f13fa23d1d669caf641c61ffe1633c5109c1f7f3305

                          SHA512

                          f26a2931cffa945792faa450e5193f0d44509e5c5d11bc3a9d398d6bf76752085e21ea80f135759e26b3f675b2b9899e6c220abdd5b11cf9b2afb158cf694860

                        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5144384.exe

                          Filesize

                          305KB

                          MD5

                          cbf7c2f89b1c7922196687c3ff3c1226

                          SHA1

                          8bccbc9f830bb086db15607eb175df1ae927019c

                          SHA256

                          c6106fb6370472c001a16f13fa23d1d669caf641c61ffe1633c5109c1f7f3305

                          SHA512

                          f26a2931cffa945792faa450e5193f0d44509e5c5d11bc3a9d398d6bf76752085e21ea80f135759e26b3f675b2b9899e6c220abdd5b11cf9b2afb158cf694860

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe

                          Filesize

                          186KB

                          MD5

                          4636a8c504a31405835d8a6258700170

                          SHA1

                          dc6de09b27e1111397d73a65a3cf6cc8b47ace79

                          SHA256

                          cef24dcfd8a1c7ad8a399b3ed7ea8a5a098340e74790b9fd7ca8dfb14efc68cd

                          SHA512

                          960df3b8a75898df048c5c0b8511ec8e318e6a8c46966d5f80ef522d1da07692cb85bc01f0fae21dc4cdea3a63a22923729d430d71d043f4a91a9b5888e279e4

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o6087731.exe

                          Filesize

                          186KB

                          MD5

                          4636a8c504a31405835d8a6258700170

                          SHA1

                          dc6de09b27e1111397d73a65a3cf6cc8b47ace79

                          SHA256

                          cef24dcfd8a1c7ad8a399b3ed7ea8a5a098340e74790b9fd7ca8dfb14efc68cd

                          SHA512

                          960df3b8a75898df048c5c0b8511ec8e318e6a8c46966d5f80ef522d1da07692cb85bc01f0fae21dc4cdea3a63a22923729d430d71d043f4a91a9b5888e279e4

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe

                          Filesize

                          145KB

                          MD5

                          b65e3c7c579639f49b60697020caa326

                          SHA1

                          8f43e44ee950e627c5aa020e281a93fe2dd56bae

                          SHA256

                          77aeafc056ea5b79a7103768edac7911b6e9df8ed425f884edba126f9a832e99

                          SHA512

                          bfc0434b4f34c166ffa3294d4705841f58df48fb3f481a7622ad50799ca313ea48ba5ee897f7c4c434ae2459fbf9517d406342bfca2925cab51fa40e5bca0b12

                        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p3870519.exe

                          Filesize

                          145KB

                          MD5

                          b65e3c7c579639f49b60697020caa326

                          SHA1

                          8f43e44ee950e627c5aa020e281a93fe2dd56bae

                          SHA256

                          77aeafc056ea5b79a7103768edac7911b6e9df8ed425f884edba126f9a832e99

                          SHA512

                          bfc0434b4f34c166ffa3294d4705841f58df48fb3f481a7622ad50799ca313ea48ba5ee897f7c4c434ae2459fbf9517d406342bfca2925cab51fa40e5bca0b12

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          73c0c85e39b9a63b42f6c4ff6d634f8b

                          SHA1

                          efb047b4177ad78268f6fc8bf959f58f1123eb51

                          SHA256

                          477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368

                          SHA512

                          ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643

                        • memory/524-109-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-88-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-113-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-84-0x0000000000830000-0x000000000084E000-memory.dmp

                          Filesize

                          120KB

                        • memory/524-111-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-86-0x0000000002200000-0x0000000002240000-memory.dmp

                          Filesize

                          256KB

                        • memory/524-107-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-85-0x0000000000A10000-0x0000000000A2C000-memory.dmp

                          Filesize

                          112KB

                        • memory/524-87-0x0000000002200000-0x0000000002240000-memory.dmp

                          Filesize

                          256KB

                        • memory/524-103-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-89-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-91-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-93-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-95-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-97-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-115-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-99-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-105-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/524-101-0x0000000000A10000-0x0000000000A26000-memory.dmp

                          Filesize

                          88KB

                        • memory/580-1098-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/580-1086-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/600-1079-0x0000000007220000-0x0000000007260000-memory.dmp

                          Filesize

                          256KB

                        • memory/600-1077-0x0000000001210000-0x0000000001308000-memory.dmp

                          Filesize

                          992KB

                        • memory/672-1052-0x0000000001000000-0x00000000010F8000-memory.dmp

                          Filesize

                          992KB

                        • memory/672-1054-0x0000000000A40000-0x0000000000A80000-memory.dmp

                          Filesize

                          256KB

                        • memory/884-1130-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1020-1090-0x0000000001210000-0x0000000001308000-memory.dmp

                          Filesize

                          992KB

                        • memory/1020-1092-0x0000000000A10000-0x0000000000A50000-memory.dmp

                          Filesize

                          256KB

                        • memory/1032-1123-0x0000000001210000-0x0000000001308000-memory.dmp

                          Filesize

                          992KB

                        • memory/1032-1125-0x0000000006F60000-0x0000000006FA0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1600-145-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-167-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-149-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-151-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-153-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-157-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-130-0x0000000004840000-0x0000000004884000-memory.dmp

                          Filesize

                          272KB

                        • memory/1600-131-0x0000000004880000-0x00000000048C0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1600-132-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-133-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-135-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-137-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-139-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-141-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-143-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-159-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-147-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-1042-0x0000000002090000-0x00000000020D0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1600-380-0x0000000002090000-0x00000000020D0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1600-381-0x0000000002090000-0x00000000020D0000-memory.dmp

                          Filesize

                          256KB

                        • memory/1600-155-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-161-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-163-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1600-165-0x0000000004880000-0x00000000048BC000-memory.dmp

                          Filesize

                          240KB

                        • memory/1688-122-0x0000000000F10000-0x0000000000F3A000-memory.dmp

                          Filesize

                          168KB

                        • memory/1688-123-0x00000000009D0000-0x0000000000A10000-memory.dmp

                          Filesize

                          256KB

                        • memory/1836-1097-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1996-1067-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1996-1068-0x0000000000360000-0x0000000000361000-memory.dmp

                          Filesize

                          4KB

                        • memory/1996-1074-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB