Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe
Resource
win10v2004-20231215-en
General
-
Target
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe
-
Size
790KB
-
MD5
b7668e16e00cfa7aab4fd5833311a9d3
-
SHA1
81f2ecd89774c56e0cc9cdb9dfe273df76dfefa7
-
SHA256
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366
-
SHA512
7e2146e5e8b28830208a92ddcb57075fd0e046856c0564e3faf5f0d71a6dbe5454c16b45664da4277de795eb53f1be447de4aae2a0a5a0d12eefe9d5be6d96e4
-
SSDEEP
12288:r9SJ++jmIFElFpRqH1YWGn1Io7YNQZDzdYD/jGW/nSkxgsDggauUPnIpm68fuvQR:r0g9/nREmWGn/wQFRHW/nSkx4dk4qo
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
redline
@RLREBORN Cloud TG: @FATHEROFCARDERS)
141.95.211.148:46011
Extracted
redline
2024
195.20.16.103:20440
Extracted
redline
@Pixelscloud
94.156.66.203:13781
Extracted
redline
LiveTraffic
20.113.35.45:38357
Extracted
redline
Legaa
185.172.128.33:38294
Extracted
amadey
http://185.215.113.68
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3500-138-0x0000000000400000-0x0000000000458000-memory.dmp family_zgrat_v1 behavioral2/memory/1104-165-0x0000000000900000-0x000000000095A000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000521001\store.exe family_zgrat_v1 behavioral2/memory/2808-322-0x0000000000750000-0x0000000000D70000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 14 IoCs
Processes:
resource yara_rule behavioral2/memory/680-50-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exe family_redline behavioral2/memory/4804-84-0x0000000000B60000-0x0000000000BB2000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exe family_redline behavioral2/memory/4684-106-0x0000000002330000-0x0000000002370000-memory.dmp family_redline behavioral2/memory/4684-109-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral2/memory/3500-138-0x0000000000400000-0x0000000000458000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exe family_redline behavioral2/memory/5116-210-0x0000000000AC0000-0x0000000000B14000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exe family_redline behavioral2/memory/3716-351-0x0000000000400000-0x0000000000454000-memory.dmp family_redline behavioral2/memory/1816-356-0x0000000000B00000-0x0000000000B52000-memory.dmp family_redline -
XMRig Miner payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2224-288-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2224-293-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2224-284-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 56 2336 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Miner-XMR1.exeiojmibhyhiws.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Miner-XMR1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Miner-XMR1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exeexplorhe.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 17 IoCs
Processes:
explorhe.exerdx1122.exe2024.exelegnew.exeMsBuild.exeConhost.exe322321.exepixelcloudnew2.exeqemu-ga.exeMiner-XMR1.exeiojmibhyhiws.exestore.exegold1234.exeleg221.exeleg221.exeexplorhe.exeexplorhe.exepid process 4824 explorhe.exe 4896 rdx1122.exe 4804 2024.exe 4684 legnew.exe 1964 MsBuild.exe 1104 Conhost.exe 2800 322321.exe 5116 pixelcloudnew2.exe 4092 qemu-ga.exe 2624 Miner-XMR1.exe 1960 iojmibhyhiws.exe 2808 store.exe 1568 gold1234.exe 640 leg221.exe 536 leg221.exe 2052 explorhe.exe 4732 explorhe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exestore.exepid process 2336 rundll32.exe 2808 store.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exeexplorhe.exepid process 4400 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe 4824 explorhe.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
rdx1122.exeMsBuild.exeiojmibhyhiws.exegold1234.exe322321.exestore.exedescription pid process target process PID 4896 set thread context of 680 4896 rdx1122.exe RegAsm.exe PID 1964 set thread context of 3500 1964 MsBuild.exe RegAsm.exe PID 1960 set thread context of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 set thread context of 2224 1960 iojmibhyhiws.exe conhost.exe PID 1568 set thread context of 3716 1568 gold1234.exe RegAsm.exe PID 2800 set thread context of 1816 2800 322321.exe jsc.exe PID 2808 set thread context of 1964 2808 store.exe MsBuild.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 1120 sc.exe 2776 sc.exe 2348 sc.exe 1228 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
legnew.exeRegAsm.exeConhost.exeRegAsm.exe2024.exeMiner-XMR1.exeiojmibhyhiws.exepixelcloudnew2.execonhost.exeleg221.exeleg221.exeRegAsm.exejsc.exepid process 4684 legnew.exe 4684 legnew.exe 3500 RegAsm.exe 3500 RegAsm.exe 1104 Conhost.exe 1104 Conhost.exe 680 RegAsm.exe 680 RegAsm.exe 680 RegAsm.exe 680 RegAsm.exe 680 RegAsm.exe 680 RegAsm.exe 680 RegAsm.exe 4804 2024.exe 4804 2024.exe 4804 2024.exe 4804 2024.exe 4804 2024.exe 4804 2024.exe 4804 2024.exe 2624 Miner-XMR1.exe 2624 Miner-XMR1.exe 2624 Miner-XMR1.exe 2624 Miner-XMR1.exe 2624 Miner-XMR1.exe 1960 iojmibhyhiws.exe 1960 iojmibhyhiws.exe 5116 pixelcloudnew2.exe 5116 pixelcloudnew2.exe 5116 pixelcloudnew2.exe 5116 pixelcloudnew2.exe 5116 pixelcloudnew2.exe 5116 pixelcloudnew2.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 5116 pixelcloudnew2.exe 640 leg221.exe 640 leg221.exe 2224 conhost.exe 2224 conhost.exe 536 leg221.exe 536 leg221.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 2224 conhost.exe 3716 RegAsm.exe 3716 RegAsm.exe 2224 conhost.exe 2224 conhost.exe 3716 RegAsm.exe 3716 RegAsm.exe 3716 RegAsm.exe 3716 RegAsm.exe 1816 jsc.exe 1816 jsc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
legnew.exeRegAsm.exeConhost.exeRegAsm.exe2024.execonhost.exepixelcloudnew2.exeleg221.exeleg221.exeRegAsm.exejsc.exedescription pid process Token: SeDebugPrivilege 4684 legnew.exe Token: SeDebugPrivilege 3500 RegAsm.exe Token: SeDebugPrivilege 1104 Conhost.exe Token: SeDebugPrivilege 680 RegAsm.exe Token: SeDebugPrivilege 4804 2024.exe Token: SeLockMemoryPrivilege 2224 conhost.exe Token: SeDebugPrivilege 5116 pixelcloudnew2.exe Token: SeDebugPrivilege 640 leg221.exe Token: SeDebugPrivilege 536 leg221.exe Token: SeDebugPrivilege 3716 RegAsm.exe Token: SeDebugPrivilege 1816 jsc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exeexplorhe.exeexplorhe.exeexplorhe.exepid process 4400 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe 4824 explorhe.exe 2052 explorhe.exe 4732 explorhe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exeexplorhe.exerdx1122.exeMsBuild.exeRegAsm.execmd.exeiojmibhyhiws.exedescription pid process target process PID 4400 wrote to memory of 4824 4400 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe explorhe.exe PID 4400 wrote to memory of 4824 4400 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe explorhe.exe PID 4400 wrote to memory of 4824 4400 3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe explorhe.exe PID 4824 wrote to memory of 3860 4824 explorhe.exe schtasks.exe PID 4824 wrote to memory of 3860 4824 explorhe.exe schtasks.exe PID 4824 wrote to memory of 3860 4824 explorhe.exe schtasks.exe PID 4824 wrote to memory of 4896 4824 explorhe.exe rdx1122.exe PID 4824 wrote to memory of 4896 4824 explorhe.exe rdx1122.exe PID 4824 wrote to memory of 4896 4824 explorhe.exe rdx1122.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4896 wrote to memory of 680 4896 rdx1122.exe RegAsm.exe PID 4824 wrote to memory of 4804 4824 explorhe.exe 2024.exe PID 4824 wrote to memory of 4804 4824 explorhe.exe 2024.exe PID 4824 wrote to memory of 4804 4824 explorhe.exe 2024.exe PID 4824 wrote to memory of 4684 4824 explorhe.exe legnew.exe PID 4824 wrote to memory of 4684 4824 explorhe.exe legnew.exe PID 4824 wrote to memory of 4684 4824 explorhe.exe legnew.exe PID 4824 wrote to memory of 1964 4824 explorhe.exe MsBuild.exe PID 4824 wrote to memory of 1964 4824 explorhe.exe MsBuild.exe PID 4824 wrote to memory of 1964 4824 explorhe.exe MsBuild.exe PID 1964 wrote to memory of 4664 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 4664 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 4664 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 1964 wrote to memory of 3500 1964 MsBuild.exe RegAsm.exe PID 4824 wrote to memory of 1104 4824 explorhe.exe Conhost.exe PID 4824 wrote to memory of 1104 4824 explorhe.exe Conhost.exe PID 4824 wrote to memory of 1104 4824 explorhe.exe Conhost.exe PID 4824 wrote to memory of 2800 4824 explorhe.exe 322321.exe PID 4824 wrote to memory of 2800 4824 explorhe.exe 322321.exe PID 4824 wrote to memory of 5116 4824 explorhe.exe pixelcloudnew2.exe PID 4824 wrote to memory of 5116 4824 explorhe.exe pixelcloudnew2.exe PID 4824 wrote to memory of 5116 4824 explorhe.exe pixelcloudnew2.exe PID 3500 wrote to memory of 4092 3500 RegAsm.exe qemu-ga.exe PID 3500 wrote to memory of 4092 3500 RegAsm.exe qemu-ga.exe PID 4824 wrote to memory of 2624 4824 explorhe.exe Miner-XMR1.exe PID 4824 wrote to memory of 2624 4824 explorhe.exe Miner-XMR1.exe PID 2100 wrote to memory of 1680 2100 cmd.exe choice.exe PID 2100 wrote to memory of 1680 2100 cmd.exe choice.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 4620 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 2224 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 2224 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 2224 1960 iojmibhyhiws.exe conhost.exe PID 1960 wrote to memory of 2224 1960 iojmibhyhiws.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe"C:\Users\Admin\AppData\Local\Temp\3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\1000508001\rdx1122.exe"C:\Users\Admin\AppData\Local\Temp\1000508001\rdx1122.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exe"C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\1000511001\legnew.exe"C:\Users\Admin\AppData\Local\Temp\1000511001\legnew.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\1000512001\crypteddaisy.exe"C:\Users\Admin\AppData\Local\Temp\1000512001\crypteddaisy.exe"3⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\1000514001\flesh.exe"C:\Users\Admin\AppData\Local\Temp\1000514001\flesh.exe"3⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\1000515001\322321.exe"C:\Users\Admin\AppData\Local\Temp\1000515001\322321.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exe"C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exe"C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"4⤵
- Launches sc.exe
PID:2776 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2348 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"4⤵
- Launches sc.exe
PID:1228 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"4⤵
- Launches sc.exe
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\1000521001\store.exe"C:\Users\Admin\AppData\Local\Temp\1000521001\store.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1000522001\gold1234.exe"C:\Users\Admin\AppData\Local\Temp\1000522001\gold1234.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\1000525001\leg221.exe"C:\Users\Admin\AppData\Local\Temp\1000525001\leg221.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\1000526001\leg221.exe"C:\Users\Admin\AppData\Local\Temp\1000526001\leg221.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2336
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"2⤵
- Executes dropped EXE
PID:4092
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"1⤵PID:4664
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:1680
-
C:\Windows\system32\conhost.execonhost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe1⤵PID:4620
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
16KB
MD5ac858ce94871cdbd1718a54d45df7fac
SHA196d4c587b6b7676e67efeb6aa6a8db061b9ade0a
SHA25688c840011c3a086c808a5a4e6ddd3444ebd97a7bb93350d98ab856049c53281c
SHA5125be8816d59811683e12db27ea4b736ef18ad767fe4de31874310c3862d52c60da23866abe0187b69edf40c7073a2d9c26ab7448fa41ac291dcc7f76312cc3f7a
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
142KB
MD59b9f08300fe6f18a220c0c123411e2d7
SHA1f6cc8052442f0728a5336802c0083c689456396c
SHA2569d1418261538645daada37f82d6c8cfba46eef97da0cf341190a92ff9d3ca84a
SHA512909660f06aac234045a09c4527fd525a459f4ee2babc922d4420d6e2a413cb619e82e77bd8fb464d77676cbc40442e7b9f5ca8b5b037bf0ba851279c65d52415
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
2KB
MD5ad68f33a66c80e861fed6856ab97bf36
SHA1e99bcc57df288502d58cd17de5935002d5af4aef
SHA25675ca46727d525b4e1f5fdd4c5bdf60b23d481cec7562e1fe7fa198eee29fccc5
SHA5120406f2760044e6fae64f4f6ec4bab4a19dd73fa8a566ac4badf3be2eb7b7d23a6358c2f48a5a7772eb4abb2626b69e55e1ff6afe244650a0b870c6f355b2fadb
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\leg221.exe.logFilesize
2KB
MD5dc98d835b78a2b1c32a0a1743d639b96
SHA102cb8b728270a2f1e8dc89b4ab48ff9dfc59b9c2
SHA256494b72088e8abddb47547f005a33a2a978d150938aedb4103e430ae972517e53
SHA5120a298142e605bb3e6f75d6407e8fa3e571847ade581af8cd5f48851b13640d8ad303f268f506c1076f181d950b31843cc7866686fcd9b4b20af25f081e3aa2fe
-
C:\Users\Admin\AppData\Local\Temp\1000508001\rdx1122.exeFilesize
133KB
MD5685a4ddd3d55f94a49dcdceea65afb1a
SHA1b734e35118abb94e7c7aa7ebee9f9251981ae312
SHA256bde4687589bc588b4b50c092fe8e1e7665be07d8f5b5c1614514cdd744e37ea5
SHA512966002606e2caf72fe5aeb2b2471442a8b635316ca040faffdd46545fd3852fca60d79b63b7cfda14d68495426b6e3b47113e55bb87ccbea20d3152ec4ae5a64
-
C:\Users\Admin\AppData\Local\Temp\1000508001\rdx1122.exeFilesize
42KB
MD537b99dc14a8aa6e81d338f29c87316e2
SHA173da661a4e33ddbf06f9492603a03691f9351f59
SHA2563a83cf135e9a5f5200860ae4ecdf72d628a75339eb77584dc0573346a32a0e69
SHA512eb66a54d7531f0fc5af11a8f2e997b0731299ea5c13ca35bab879fce884bac50ee0f1fcefd159216167af4ee847f7fbf33cb1fbbfde1f5d0c9d919dcb60d1601
-
C:\Users\Admin\AppData\Local\Temp\1000508001\rdx1122.exeFilesize
184KB
MD514f0bb71dbc4a7b8d2bab07b4f47e35c
SHA10e22fa6c21defec7fc17e916d5951f43e97acefb
SHA2565f48ef87a96be659766c099cb77308b9219eb29f8c0ae5072cb9d570328899ab
SHA5127bd3673cb2f447f6a40968dc0facf364c1f0f717fcd70a718d895b30efa76f43ae69f1638dfe30eba6a182d8fd2a14b31b46d134176110ebddafe13aca31766c
-
C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exeFilesize
275KB
MD5e98289c579b5fdfd21a86525910e2ce7
SHA1d1643240f6d72246faeef296da9a3a2bc9c510e8
SHA2566127652041d880168c0ba411579641c323693ffe7fd5982be4557445f83b9bcd
SHA512569f6f83dae831324cf3bff8ca958dbc521329c693b13fd3724a6414fa0d7f70709be1c60d2eb5bbeabf61a0ea94b56287d83fe476033d43ef29ae9ef6303347
-
C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exeFilesize
179KB
MD5d10e8febf623375b2cae8d378b12ea41
SHA18014e14750cee36fbf494a17e4ae56f251f6bd93
SHA256a600bb53d3c81d45b3a5768bea69337cef3e925274c9bcc3a78bf072c54a1ec9
SHA51251b51322561164fa43754421214f44c7ec81d2c42abfa2d6ce4a978526b72e0909db88ab23ab1b5a87fd1a4712f1affd16b6ae8c5bf2b9459a7e55cb442d22d1
-
C:\Users\Admin\AppData\Local\Temp\1000509001\2024.exeFilesize
137KB
MD58811dd7245ab5cf02b8df4775a552575
SHA1a9916b700b5065117d8e127f032db5c384a2618a
SHA2562bcc161a18327aae52bb3b8ceb0aad228c689510ad0b5f404a1f7857c0365b18
SHA512a2b85a3dc665d8238ec5cf15a15251140cb0b0f296fd19fd43924f8e806cb7c82736e47c2539c0996989f5c2f484d9bbf6aec00298c4accc561d83f56ee760ec
-
C:\Users\Admin\AppData\Local\Temp\1000511001\legnew.exeFilesize
208KB
MD5aa129d4cb62a3cdc3aaef4d00dd0fb09
SHA122315f160db579299981f0258dee24048d6315bd
SHA256959c0665b2761e61578da1a0821750a5f14427cf7f7bba4631976d571c07886f
SHA512c7af2d9a2f58bfcbe76a1bc9a7a6681bedf86731c99147c6755d5ae1f7fb8c389ad43168ded744625f9e9423715b975e90f9ed1b7a0f7030e31ba72d42ead51d
-
C:\Users\Admin\AppData\Local\Temp\1000511001\legnew.exeFilesize
289KB
MD53b8212d9d6fdc390c9f5c9262563c34f
SHA11e609b7396ccff4efa6c4a58f00f1826afb10c70
SHA256b7bc7db05aeb57af30283f118d3fb8d3406862de660552dbe6c930516dc6a579
SHA512c0ebb917369977c5de47a4c4081817f9a9b09ddabf990170b60e836cc971aa937c3ad073bdb5e40f301890e5511d950e54b8952fc310fb42dada27f439fc713c
-
C:\Users\Admin\AppData\Local\Temp\1000511001\legnew.exeFilesize
57KB
MD5d3688e678d2e0f2089e7a37c46bc5929
SHA1b7f4d777fe9b88b91302c5eaaf25840aa33587db
SHA256c42469d3ad3001403d88044efa93c31e25f4a39c50b7cb84de9ac7cb2aaf5edf
SHA5123995a10adbbb433276c3d7083615526feffb87ccd30199653f3f2b6c247cd80733a28f2222d4ec7fb26c950afc389ea4e8fcfcb081e3b8319a5096e906363033
-
C:\Users\Admin\AppData\Local\Temp\1000512001\crypteddaisy.exeFilesize
126KB
MD58e439d3aa81f8cd972876ecc21f2b694
SHA11d7199dd441328490ec8a7147826d10b51d5aa8e
SHA256049c6350deb478ecdf1c227e8609f4309d51082bc39daa92de9ba2a106ebb5bd
SHA51295c25ba29e01dd59755731efae5f2cde1102bdb3550dbb37385b187ee500f3468bfa44aaed4c0a9c6a64880dcc7f320ce91a2da62a213ff86ecf6aee74072575
-
C:\Users\Admin\AppData\Local\Temp\1000512001\crypteddaisy.exeFilesize
121KB
MD5d5255ca9c15142482ded7841d0c32c39
SHA1f3de25602959437b0af0590995fe8aa5b2b161f9
SHA256f42d29cd24b289cdd29cc083012270ebc5a73f7eba156574dcf12bcc377b6fb2
SHA5120237423c1ddb46036dbe8613560af213c2f87d3d3c1a3efca313e57967fc80d7090e26975b423ac86a02aeb086eb31fdc2c63a0ed68b000cdf0e4bfa37d9f7ac
-
C:\Users\Admin\AppData\Local\Temp\1000512001\crypteddaisy.exeFilesize
116KB
MD5a1bef0f17fe59e451a50978adc0667dc
SHA1ab2dc84dd48e685fa9696cdbb4707759289f463b
SHA2560ea229e73ee8b9f468e2318bc06ee78d3e1773d2da54e8ebefdff49089c55b6b
SHA51283ff36569d6b07a0f163c7cd70ab8c6170afe53a24a2f0630d9c57c9e0ba8724d473f20623543cc8b85f3d585f65a7cb036585de2382d69c6d8cc34664af26bc
-
C:\Users\Admin\AppData\Local\Temp\1000514001\flesh.exeFilesize
109KB
MD5e102b0acd200679fdbef45008064d799
SHA1ca0492000622eef655c66eb28385849516bf705b
SHA256bf715cec62bd2b0ad2dca3ff3dac6155f22f7913faa8e05933b4c6bdd70db948
SHA512a8afce445955428f272df018b8c1f9516a892f5a64eb9fd9ed6abfa7a013b61df32af120ae1e98f267e97a95ea5142b7a51fa1bd13bd1fb768a1735612296adb
-
C:\Users\Admin\AppData\Local\Temp\1000514001\flesh.exeFilesize
105KB
MD5385dc24e1999dedead3aab0e46df3651
SHA1fc2509339678e28d8dffd368735f128a50d2cca1
SHA2565c88ca390e0fc5d27991bc42fb17f3b91b04233c7655ee524f8d619608c882f0
SHA512b6a8021234d5493d962dcd92c13609a43247119e6470a5c347c64692f310378e7a5e9ab7973757e525321b50c70138cd57348558fed96385f51a98a77537d489
-
C:\Users\Admin\AppData\Local\Temp\1000514001\flesh.exeFilesize
78KB
MD5bcee746cc578a275e8dec62cafe3fca0
SHA17519235775fa3f36fc9e8b8ebbe0686a2b901d25
SHA2563ac40754a15623a5c0a82c716225d0890edd93d1e41c892061d7fbc3d04c0366
SHA51267e6ecaba5fe402766237059b35dcd3c0ff6284d3593dca7d23d58bfcb501f3ca8cd943ace0d2a6c27088022f62174e4a384d25761a3b1f64b56e96450f984e6
-
C:\Users\Admin\AppData\Local\Temp\1000515001\322321.exeFilesize
73KB
MD5b674a85f3a9c5db4bbb95601a498d6ed
SHA116b4a71c8014e259882eddab9f9582fbc140b85e
SHA2568da1e693e78b255f91728dac17d5f7c6c163835fdcfa7ec622cd3d4ad67e698c
SHA5124c7e703c8909242faf67024187d4fd782f5016c3e1d0ad6e59a62cfa78548f98b8e76347d71c2f9df2e5947bfd8dca7112553cd0ae57d210ea3bb893a0cb87c0
-
C:\Users\Admin\AppData\Local\Temp\1000515001\322321.exeFilesize
213KB
MD55f3f50e290bc7c9459aaff7700cb7d9f
SHA18d7898bfa5f9824508213dfee6f4585c67076ac7
SHA256095d402b4522e1f6efbc00dcba32c0052f4bbe1d265e044e82e500518ee55fdc
SHA51238b1079fa40b47db4d4abdbf0ee6f91c2e91a1837c5e272134ff220fb9a0405f20ca75e9267e83ef3fe41d34b428c6d2842207b53d9bff69bc184f386dcbc697
-
C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exeFilesize
64KB
MD5c6aa6b0bcb80aaed4fadc9db40db1e70
SHA1857f53564cf5100c9a3004979726c3acd83a1981
SHA256b415781859c620c423165dc8e384088d5de956046368c402bf9212945c2dd7fd
SHA5122f1c7287f6e16c63ed9e2b791f4f45fad2653c4d2d4a622d89035f6566be900e671033a5dc74c1f33501ce6ecaa7638079a569077e6012aa87271d210d7b31f6
-
C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exeFilesize
63KB
MD5daa62ed02372bb8c7f0dbdc3e4f6c467
SHA1a05b396019cf3208b258080c30c9450e3cc42819
SHA256d32c272368770a00bbc25102bfb08918f60c1e2036421c4c2d1f3bd015696a6b
SHA512ab82aae6a741dbae0d27ad784922ecc5b646b408bdb4d2e42da2ad4e812c801890ffeae8823aedf0ff997898ea7d2497f92d9330b9b19fab599f584f8bcc0203
-
C:\Users\Admin\AppData\Local\Temp\1000516001\pixelcloudnew2.exeFilesize
57KB
MD5d97033bf19d63a7812a8c1e8bac31e35
SHA14b6a34daabfab8f77cedaa2f2c62ac2d500c3861
SHA256a1dda0bd6342520ce6798b0a0acecd0e62556dea47dce390d9cbf6b4a698d60f
SHA512fb72816bd1ba110bb5cf78baa92754beceb7c9a62726b77c3ac89be80abdc22574f88319b2db859a00b94818e2bd21b9514ce3e190adcce7370be213097ad4be
-
C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exeFilesize
47KB
MD5b863452967b7c38053d19c75e15e2142
SHA13299777abff58d2f67e413aeeac627b013bee52d
SHA2566c4992147faf6a60bfc433132d7fa5f9d4742cdf78768f8109904d371f032cd9
SHA5121ce5ebfe25640ed7e4c502b45bc1e23c69ffc8e4076d8155d658af8403fa5f6a97f6ae376d54e2c8ae7d3c345af1723272906d9d9a68af1c39d0cc8d8872ef05
-
C:\Users\Admin\AppData\Local\Temp\1000519001\Miner-XMR1.exeFilesize
66KB
MD58cacba16b3f7ee63792f8b57bc414da4
SHA113edfc7e3e20510fe01e0c9a3ef36a7cad30648b
SHA2567f169e132eab352cc666678168b2f45c582b1abe28976c0ccede01daf3c0a801
SHA5129df6912daee85b364c85d020c94874f9b9eb194b5fc686cd215640c16d2fc7f378a26145e8965535c4c5c19f6289b0199b76d7719dd72295a3c6cc623b45fdc7
-
C:\Users\Admin\AppData\Local\Temp\1000521001\store.exeFilesize
82KB
MD565392b9314cdf10f388e3e4052fb5588
SHA168ab00656e1064fd5ac12b4521c7a5c93fc2e894
SHA2563c95314ced782f5c021cec71df5b273ff971bdb4daf762105a2a8518ea52f5af
SHA5120c2f0da9eb53e9d8b75d8a2a35998948dcaddda9377489b3c413a1aa9ca82f4633212e465ff959d0b4936cb75b2875b2717a6d667268611b4235c5a7a1c7a72e
-
C:\Users\Admin\AppData\Local\Temp\1000521001\store.exeFilesize
29KB
MD5d4e417daa13b5b10cb28b95009df5d0f
SHA1ce439f7538210d8df1abfa9b7dd9a8a1dee916e0
SHA256a3c1356d88c580d7ddd42b85759516ad7ccb8464c45cad0b06bcd0b76af4d51c
SHA5122b695338ac2f5c9052076c29c84c242f9670ea7a76feadfbab4d2fe0115d0857ea4fae9e08e55fed8c42acd9d23928ce2e75a73207d9fd6cc3aefdc5bb580976
-
C:\Users\Admin\AppData\Local\Temp\1000521001\store.exeFilesize
6KB
MD55ed818b7f6fd404477886dd131720c12
SHA139b2ea694bcf9d7de25ffcb0c8445e3f4dee70f2
SHA2563e0ede888b5a56d2dc794c86f177f2a5b2bd693df0c78c15214c2204ea07db7f
SHA51212986a39f8f5c970873ab0176ba39f36e2063fdacc4d780d1e49dbdaf49719a8503d9f975df6049f3346c748937ef98256bfa93311642e51ac5e69b7c4a6cdec
-
C:\Users\Admin\AppData\Local\Temp\1000522001\gold1234.exeFilesize
39KB
MD5380838785d16a328b2566731d8694f2c
SHA1becef63454c5e03f39a9138e44a9c01d38aae31c
SHA256fff2c6581218a165046c4e863950d3d1d89ad6f55cd55496180183cc777edc78
SHA51242a16bac4405f07a4f49f83d9a5ec15076a37d587f3673d7ca5c80cab7205967b98f6e5b86efceab36cc80a23bf47fcbea11e45e635e9f0965460ace50a8e773
-
C:\Users\Admin\AppData\Local\Temp\1000522001\gold1234.exeFilesize
74KB
MD55ed865640766f69edfa31aec048a129c
SHA11a3dd6dc9d9f3e6d1a90ae52f5f61bdf05e22d56
SHA2566aaf79d864f12cae8771360c2d7e508dfeaa1aa5776ed9bcacdb264041248589
SHA51285eea3b2b12a47ebc94f6be1d42c89664e013760b421f8894c9a2b6bc51378c54168025af61f6d508501f2dd1c28c2153675c938e55bcdfffdfd17bdd0ecbc15
-
C:\Users\Admin\AppData\Local\Temp\1000522001\gold1234.exeFilesize
76KB
MD5c2f6d54b35f6e74ced4da2694b92cd95
SHA147f7bb89f0e9a3f985cf2b1ee97fdc20f1622d69
SHA2562021a8a3239cdc8ade0b2290f4518eb255b5bd1f9aadeada128f4801d111448e
SHA512a5793560ae64aa6f794bf6616827514ed2fedbd257c567a2a9fed02b76680146f59bfa4ffab379bcac0bb8bf114f39f9312a8f3d20bfb6e0711086ba0458ccc7
-
C:\Users\Admin\AppData\Local\Temp\1000525001\leg221.exeFilesize
59KB
MD50ddd11f8a80c031b79abfbffeefddfa9
SHA1d64a4acf7496966111e43455399f95f0ca9418e1
SHA25618ead736b56caa817ae21a3f41aa9af8f291c31be9c3cc3d7f6a798496e13b8f
SHA512d10799378e9afe94ee056b8f01eac4dc3c55dc16a7ef0fd253e68da0d44b8c638e4b8f504e4ae75dcf3d2d5aaa47380704daf42bb96241f3464efa839311ce61
-
C:\Users\Admin\AppData\Local\Temp\1000525001\leg221.exeFilesize
68KB
MD5043d13175c414ba29cddca0c8e8d60b7
SHA1c4e3fa2bfc58e55e46a414cac79e2ef8281e1b3a
SHA2565f6e7d877eb45281427ad5354ab65396f0619dd93d238500958d13076d791736
SHA512bb3f48819934bdd613c3cae95a5cb4d90d545e03ec1ad9119e62443640b72675351192abc5c7806998614abe4d2cc30d7f531ff9577bfaf6382326d28ffb86c2
-
C:\Users\Admin\AppData\Local\Temp\1000525001\leg221.exeFilesize
108KB
MD54e5d91a42f0f24542f9ac17970acdfa6
SHA1cdd8aaa4a91be20c741ef544e7d1ee94f37208c5
SHA256acb62e9f16a42a55b9cbc0502f1577a400722b69cddd3ed760752ad49cd6a545
SHA512b3d185c75af6f64200be3002349c00599bb3455b9930994bf5d17e4ef8904b1afa7003babf812f3a7195ce40c2bc368ef184e1759d3d36a856f0f33ce3c8c7ed
-
C:\Users\Admin\AppData\Local\Temp\1000526001\leg221.exeFilesize
48KB
MD538d4b4ba1611a1f228c06232dca3f20d
SHA1362122c757d5876c69c7c114cd3f4d048b24c6a4
SHA256ff1a8e0c3b5b2d81abe038f44e7f796ddc3cb77d699a255369c39f14364a17a6
SHA5127c8866e7763fef960fef392525a2088f55013d2948b3f5c4e2020fe24ce4c8bdee772a8c1610ab00dbe44781a832da4cecc19a43829746c67afc3d57f2a188cb
-
C:\Users\Admin\AppData\Local\Temp\1000526001\leg221.exeFilesize
96KB
MD5fe8c844ce75ac789adbc175bcae49204
SHA169585592fac5056dfcb9898a1f6f6cab8595cb41
SHA256d2ead0c069eec568c4b925cb908acfcf9859303d80e26f653691d719c1f0b3c8
SHA5126e2ada8a68aae992f1e764ec4cdd244e213271ed5336426bf4bedb53ba6c40f77782282816d1d9fb37bad0e09a924bf80bad2e0e384a1b03b37a8051dac1983e
-
C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dllFilesize
17KB
MD55328d3b35ed23b3d43f9a42671d1ff7c
SHA1d11a39b36c4cec7f5ebbe31d820b395b0d8b4e3a
SHA2563c04b9ccc9d95e7b6bdd50049dbe78cd6c67bcbb20f0c60291a49d63cea7890f
SHA512b843093c8a4b20892657dc1a94fb3cda2b68672300a45c976df95d811b561fc3287f57f9814e2f8c759003874a1e80b1d249b5afd15c250502c048b5282c049a
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
127KB
MD5c21d3d94cb93014ea327b3b44d7718cf
SHA1ac21393d192dd03fc11ccfdecc3ab374408b9913
SHA256c1e9f15bbdc4b684d8481d46bdd4813c53ca4cb23e945f2f7d0845fddc53435a
SHA5122591c68bd310f9f840eeeec921bee0ca29769473e6f933855bc5325166e7aa5645cbd1e68e43a8e38a1bd853d814293e5b2aec2b6cd2ae84e5dc018a964ebc69
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
71KB
MD5d3dabe63edf04f9daf06442a05665857
SHA1275319bb148a3fadecb34e4d48979f98226de9d2
SHA256b5f1c8b1acb55770ee04e4fd0e8cad6ede7f508cf8a662e037d83894789d1251
SHA5126f724830a05c24467835717e305aedf2ee8b2422746335108c6027cc34005ffc1488fd68a9b8ca999477e41d650791cdc6d935b04cd258c28b86697516a66461
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
1KB
MD52f4bcf2b9336a9e6ca47abb8c3372c63
SHA10c64e6a3b12f50eab19e17f5679ed406895b301c
SHA256747f2fe00f5395f750fc3624ce446e4f9768f7aad602f4333aba88be42d984e9
SHA5124b0099f4cb32133bfa88ebb9fdc871a92a674b8fcca93cc9dd0a082269dd95d6884571762917b05bfb8dc523a3009b39929f3d41dfe9cd115000285cacc5eb4b
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
577KB
MD51cb30d6b034e29d6f24ddcada52e3b6f
SHA1f32e2f804fac001904020f7ff94175b7ca65fa7a
SHA256049a6df5f5d15fd77b5e9dfc4fefbde45f90ca1e9a55cc3de5caf2610a6efd16
SHA5122390fa2c0fd25f9ef019adad04ab96cfc6155b4c2607620ef30393e0a99ce2b4b32db945a4ebe00cced24ad988cf2979f7cc61762addf35963275bbdd754de49
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
86KB
MD5e49d1d983b9923d73cbe4786b0f4c468
SHA17161c7ec4e76420924c8c459b56aaa2f82ee00da
SHA256cf5177d3fb28a5cb49c9d57d6598478f2c6072bc42facc11dcae6c7593a7a4fe
SHA512aa82cec3e0ab180426728fbd0baad8630e2be9cfd1bb085ae79a47c856292a006b32ff2c6b66a574204a09e9c1e0ef786ddde35afc7ba11f32421fdbc454be06
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exeFilesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
9KB
MD527b0f10b4b3926847015baa52eeee7ee
SHA1e6b47f9833d54f2dc23e29fec334cddaae840f41
SHA256c33b5233b256e8c573f6570519d5e816eb0f57a2b1b5a6246f4094390542683e
SHA5120831e5a3eaf88607e8c613d32d663c520d6354bf68bb5fc7cc92eff285f7c9b89ba539d2a52b28d5ba5db870c8b98410337f716865f21898251892b8bba80ad0
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
66KB
MD53bab7390418c217c356e23f68fd4e98a
SHA18614e15abe14bf4b893ee09d09f57926fc791f2f
SHA256e0d750a2a3b68c14930547a4b5b1105109f887fa6fe50677ae2187e457770ed4
SHA512a52eccc6947720a77b9b07d9ce805ce92970c2e239cafdfa29a0670d6dfcb9d8a7acfdffa16af0ee9fe1f07f71c5f8e0d4687ddc4bf88790220653b683fec0b9
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
42KB
MD50fabf90386155218c8bc646e72093b8f
SHA13b2fbc3efafc7606e5243a1d075cf81fa4c14be0
SHA25687ef52664a65d64a4705cd77307fc807def0d0d00f1bda6c9722fcc0eab12b54
SHA51281a2f55e7e1faae328926128dcc1bcea2dd96a00a70f88bfd2c00a14f99a3eb741ea39017376e0bb784a7c961b4088e53309473bca2c5a36cf36cecee39a439b
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
\??\c:\users\admin\appdata\local\temp\F59E91F8Filesize
14B
MD5c15bc8a29020a97a08e4003a05956877
SHA17ecedfbdc4d14f7bedf5ec4979051458103c7e0b
SHA256007b40b86fa555a75f1a0946fb0f0bc9fd903d1f5a3625ad3d61120593e34f0f
SHA512c2bb8b64670d7ff4688f1b64a9c8e66cbe59ccd52e8e9504658957ccb33b9266805396a9989d6930828993e102f53f9a99035b2e26c417449276f194c0060be1
-
memory/680-56-0x0000000005590000-0x0000000005622000-memory.dmpFilesize
584KB
-
memory/680-57-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/680-62-0x00000000064A0000-0x00000000064B2000-memory.dmpFilesize
72KB
-
memory/680-53-0x0000000005AA0000-0x0000000006044000-memory.dmpFilesize
5.6MB
-
memory/680-60-0x0000000006A40000-0x0000000007058000-memory.dmpFilesize
6.1MB
-
memory/680-61-0x0000000006580000-0x000000000668A000-memory.dmpFilesize
1.0MB
-
memory/680-63-0x0000000006500000-0x000000000653C000-memory.dmpFilesize
240KB
-
memory/680-64-0x0000000006690000-0x00000000066DC000-memory.dmpFilesize
304KB
-
memory/680-244-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/680-50-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/680-58-0x0000000005750000-0x0000000005760000-memory.dmpFilesize
64KB
-
memory/680-59-0x0000000005580000-0x000000000558A000-memory.dmpFilesize
40KB
-
memory/680-148-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/1104-226-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/1104-169-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/1104-165-0x0000000000900000-0x000000000095A000-memory.dmpFilesize
360KB
-
memory/1816-356-0x0000000000B00000-0x0000000000B52000-memory.dmpFilesize
328KB
-
memory/1960-292-0x00007FF7B1230000-0x00007FF7B1C6D000-memory.dmpFilesize
10.2MB
-
memory/1960-273-0x00007FF7B1230000-0x00007FF7B1C6D000-memory.dmpFilesize
10.2MB
-
memory/1964-135-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/1964-136-0x00000000058E0000-0x00000000058F0000-memory.dmpFilesize
64KB
-
memory/1964-146-0x00000000033B0000-0x00000000053B0000-memory.dmpFilesize
32.0MB
-
memory/1964-464-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1964-145-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/1964-460-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1964-133-0x0000000000F10000-0x0000000000F78000-memory.dmpFilesize
416KB
-
memory/2052-439-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/2224-299-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-442-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-284-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-296-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-287-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-295-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-290-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-293-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-294-0x0000024AFC500000-0x0000024AFC520000-memory.dmpFilesize
128KB
-
memory/2224-289-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-288-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-285-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-298-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-297-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-441-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-286-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-282-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2224-283-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2624-270-0x00007FF68EE50000-0x00007FF68F88D000-memory.dmpFilesize
10.2MB
-
memory/2624-266-0x00007FF68EE50000-0x00007FF68F88D000-memory.dmpFilesize
10.2MB
-
memory/2800-359-0x00007FF6BB070000-0x00007FF6BB305000-memory.dmpFilesize
2.6MB
-
memory/2800-345-0x00007FF6BB070000-0x00007FF6BB305000-memory.dmpFilesize
2.6MB
-
memory/2808-321-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/2808-323-0x0000000005690000-0x000000000572C000-memory.dmpFilesize
624KB
-
memory/2808-322-0x0000000000750000-0x0000000000D70000-memory.dmpFilesize
6.1MB
-
memory/3500-147-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/3500-138-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/3500-240-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/3716-351-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/4092-239-0x0000000000120000-0x0000000000128000-memory.dmpFilesize
32KB
-
memory/4092-242-0x00007FF91F490000-0x00007FF91FF51000-memory.dmpFilesize
10.8MB
-
memory/4400-0-0x00000000004B0000-0x00000000008B8000-memory.dmpFilesize
4.0MB
-
memory/4400-1-0x00000000004B0000-0x00000000008B8000-memory.dmpFilesize
4.0MB
-
memory/4400-2-0x00000000004B0000-0x00000000008B8000-memory.dmpFilesize
4.0MB
-
memory/4400-13-0x00000000004B0000-0x00000000008B8000-memory.dmpFilesize
4.0MB
-
memory/4620-276-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4620-281-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4620-278-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4620-274-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4620-275-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4620-277-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/4684-213-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4684-111-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4684-113-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4684-112-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4684-246-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4684-106-0x0000000002330000-0x0000000002370000-memory.dmpFilesize
256KB
-
memory/4684-107-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4684-142-0x0000000007F60000-0x0000000008122000-memory.dmpFilesize
1.8MB
-
memory/4684-144-0x0000000008130000-0x000000000865C000-memory.dmpFilesize
5.2MB
-
memory/4684-241-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4684-140-0x0000000007080000-0x00000000070D0000-memory.dmpFilesize
320KB
-
memory/4684-125-0x00000000065B0000-0x00000000065CE000-memory.dmpFilesize
120KB
-
memory/4684-124-0x0000000006300000-0x0000000006376000-memory.dmpFilesize
472KB
-
memory/4684-114-0x0000000005B00000-0x0000000005B66000-memory.dmpFilesize
408KB
-
memory/4684-109-0x0000000004B10000-0x0000000004B4E000-memory.dmpFilesize
248KB
-
memory/4684-108-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4732-477-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4804-212-0x00000000055F0000-0x0000000005600000-memory.dmpFilesize
64KB
-
memory/4804-86-0x00000000055F0000-0x0000000005600000-memory.dmpFilesize
64KB
-
memory/4804-209-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4804-301-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4804-84-0x0000000000B60000-0x0000000000BB2000-memory.dmpFilesize
328KB
-
memory/4804-85-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4824-470-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-478-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-383-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-482-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-431-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-481-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-480-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-479-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-440-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-471-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-17-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-16-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-238-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-472-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-467-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-469-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4824-110-0x0000000000120000-0x0000000000528000-memory.dmpFilesize
4.0MB
-
memory/4896-141-0x0000000002840000-0x0000000004840000-memory.dmpFilesize
32.0MB
-
memory/4896-45-0x0000000000380000-0x00000000003D6000-memory.dmpFilesize
344KB
-
memory/4896-46-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/4896-48-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/4896-55-0x0000000002840000-0x0000000004840000-memory.dmpFilesize
32.0MB
-
memory/4896-54-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/5116-214-0x0000000005660000-0x0000000005670000-memory.dmpFilesize
64KB
-
memory/5116-211-0x0000000073400000-0x0000000073BB0000-memory.dmpFilesize
7.7MB
-
memory/5116-210-0x0000000000AC0000-0x0000000000B14000-memory.dmpFilesize
336KB