Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2023, 23:06 UTC

General

  • Target

    d917c622954a75b0972adcf0354c130d6dbb03c3cc1118d17c8170aa6d426276.exe

  • Size

    983KB

  • MD5

    b13f42753784b42d81bbada83356b0f9

  • SHA1

    5fe0c6125a446e8a683439da2e970e8feca69dad

  • SHA256

    d917c622954a75b0972adcf0354c130d6dbb03c3cc1118d17c8170aa6d426276

  • SHA512

    c7edde3e529154ad34c6ad3b61d51a712acd006b2f9541190b9d753af7522da52fbf7933e50ef352095b5c139a91ec73b640507e213ea78026f91c4654d98b37

  • SSDEEP

    24576:+y01juxS0bHzBQeyrPKUfxYw2rigt4H3k:N0kkWHFQeyrPfxKVtu

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 28 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d917c622954a75b0972adcf0354c130d6dbb03c3cc1118d17c8170aa6d426276.exe
    "C:\Users\Admin\AppData\Local\Temp\d917c622954a75b0972adcf0354c130d6dbb03c3cc1118d17c8170aa6d426276.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182856.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182856.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un662817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un662817.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr784687.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr784687.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3876
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 1088
            5⤵
            • Program crash
            PID:4188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu591528.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu591528.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4228
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1336
            5⤵
            • Program crash
            PID:3720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk676848.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk676848.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si702512.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si702512.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 712
        3⤵
        • Program crash
        PID:1916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 796
        3⤵
        • Program crash
        PID:3176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 860
        3⤵
        • Program crash
        PID:3152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 980
        3⤵
        • Program crash
        PID:2188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 984
        3⤵
        • Program crash
        PID:2876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 984
        3⤵
        • Program crash
        PID:804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1224
        3⤵
        • Program crash
        PID:4280
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1256
        3⤵
        • Program crash
        PID:5068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1320
        3⤵
        • Program crash
        PID:3824
      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 708
          4⤵
          • Program crash
          PID:868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 796
          4⤵
          • Program crash
          PID:3204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 872
          4⤵
          • Program crash
          PID:1836
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1056
          4⤵
          • Program crash
          PID:2372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1064
          4⤵
          • Program crash
          PID:3568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1084
          4⤵
          • Program crash
          PID:4128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1112
          4⤵
          • Program crash
          PID:1032
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 996
          4⤵
          • Program crash
          PID:3992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 780
          4⤵
          • Program crash
          PID:4308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 696
          4⤵
          • Program crash
          PID:3832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1304
          4⤵
          • Program crash
          PID:1180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1088
          4⤵
          • Program crash
          PID:4660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1612
          4⤵
          • Program crash
          PID:316
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
          4⤵
          • Loads dropped DLL
          PID:540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1064
          4⤵
          • Program crash
          PID:880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1636
          4⤵
          • Program crash
          PID:1828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1364
        3⤵
        • Program crash
        PID:4776
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3876 -ip 3876
    1⤵
      PID:4028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4228 -ip 4228
      1⤵
        PID:1168
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1396 -ip 1396
        1⤵
          PID:3540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1396 -ip 1396
          1⤵
            PID:3708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1396 -ip 1396
            1⤵
              PID:2700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1396 -ip 1396
              1⤵
                PID:1860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1396 -ip 1396
                1⤵
                  PID:4584
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1396 -ip 1396
                  1⤵
                    PID:3408
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1396 -ip 1396
                    1⤵
                      PID:3576
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1396 -ip 1396
                      1⤵
                        PID:2672
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1396 -ip 1396
                        1⤵
                          PID:5036
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1396 -ip 1396
                          1⤵
                            PID:2020
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2344 -ip 2344
                            1⤵
                              PID:628
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2344 -ip 2344
                              1⤵
                                PID:860
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2344 -ip 2344
                                1⤵
                                  PID:612
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2344 -ip 2344
                                  1⤵
                                    PID:3016
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2344 -ip 2344
                                    1⤵
                                      PID:3344
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2344 -ip 2344
                                      1⤵
                                        PID:3352
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2344 -ip 2344
                                        1⤵
                                          PID:4284
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2344 -ip 2344
                                          1⤵
                                            PID:232
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2344 -ip 2344
                                            1⤵
                                              PID:4692
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2344 -ip 2344
                                              1⤵
                                                PID:2124
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2344 -ip 2344
                                                1⤵
                                                  PID:4608
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2344 -ip 2344
                                                  1⤵
                                                    PID:820
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2344 -ip 2344
                                                    1⤵
                                                      PID:1556
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2344 -ip 2344
                                                      1⤵
                                                        PID:956
                                                      • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
                                                        C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:1204
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 428
                                                          2⤵
                                                          • Program crash
                                                          PID:4112
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1204 -ip 1204
                                                        1⤵
                                                          PID:1168
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2344 -ip 2344
                                                          1⤵
                                                            PID:5028

                                                          Network

                                                          • flag-us
                                                            DNS
                                                            217.106.137.52.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            217.106.137.52.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            8.3.197.209.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            8.3.197.209.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                            8.3.197.209.in-addr.arpa
                                                            IN PTR
                                                            vip0x008map2sslhwcdnnet
                                                          • flag-us
                                                            DNS
                                                            32.146.190.20.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            32.146.190.20.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            108.211.229.192.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            108.211.229.192.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            151.248.161.185.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            151.248.161.185.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            86.23.85.13.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            86.23.85.13.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            198.187.3.20.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            198.187.3.20.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            50.4.107.13.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            50.4.107.13.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-ru
                                                            POST
                                                            http://193.201.9.43/plays/chapter/index.php
                                                            oneetx.exe
                                                            Remote address:
                                                            193.201.9.43:80
                                                            Request
                                                            POST /plays/chapter/index.php HTTP/1.1
                                                            Content-Type: application/x-www-form-urlencoded
                                                            Host: 193.201.9.43
                                                            Content-Length: 89
                                                            Cache-Control: no-cache
                                                            Response
                                                            HTTP/1.1 200 OK
                                                            Server: nginx/1.18.0 (Ubuntu)
                                                            Date: Mon, 17 Apr 2023 23:07:07 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                          • flag-ru
                                                            GET
                                                            http://193.201.9.43/plays/chapter/Plugins/cred64.dll
                                                            oneetx.exe
                                                            Remote address:
                                                            193.201.9.43:80
                                                            Request
                                                            GET /plays/chapter/Plugins/cred64.dll HTTP/1.1
                                                            Host: 193.201.9.43
                                                            Response
                                                            HTTP/1.1 404 Not Found
                                                            Server: nginx/1.18.0 (Ubuntu)
                                                            Date: Mon, 17 Apr 2023 23:07:56 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 162
                                                            Connection: keep-alive
                                                          • flag-ru
                                                            GET
                                                            http://193.201.9.43/plays/chapter/Plugins/clip64.dll
                                                            oneetx.exe
                                                            Remote address:
                                                            193.201.9.43:80
                                                            Request
                                                            GET /plays/chapter/Plugins/clip64.dll HTTP/1.1
                                                            Host: 193.201.9.43
                                                            Response
                                                            HTTP/1.1 200 OK
                                                            Server: nginx/1.18.0 (Ubuntu)
                                                            Date: Mon, 17 Apr 2023 23:07:56 GMT
                                                            Content-Type: application/octet-stream
                                                            Content-Length: 91136
                                                            Last-Modified: Tue, 11 Apr 2023 10:19:50 GMT
                                                            Connection: keep-alive
                                                            ETag: "64353446-16400"
                                                            Accept-Ranges: bytes
                                                          • flag-us
                                                            DNS
                                                            43.9.201.193.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            43.9.201.193.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • flag-us
                                                            DNS
                                                            2.77.109.52.in-addr.arpa
                                                            Remote address:
                                                            8.8.8.8:53
                                                            Request
                                                            2.77.109.52.in-addr.arpa
                                                            IN PTR
                                                            Response
                                                          • 185.161.248.151:38452
                                                            qu591528.exe
                                                            10.7kB
                                                            7.9kB
                                                            19
                                                            15
                                                          • 185.161.248.151:38452
                                                            rk676848.exe
                                                            5.7kB
                                                            7.7kB
                                                            15
                                                            12
                                                          • 20.189.173.11:443
                                                            322 B
                                                            7
                                                          • 193.201.9.43:80
                                                            http://193.201.9.43/plays/chapter/Plugins/clip64.dll
                                                            http
                                                            oneetx.exe
                                                            3.8kB
                                                            94.9kB
                                                            75
                                                            74

                                                            HTTP Request

                                                            POST http://193.201.9.43/plays/chapter/index.php

                                                            HTTP Response

                                                            200

                                                            HTTP Request

                                                            GET http://193.201.9.43/plays/chapter/Plugins/cred64.dll

                                                            HTTP Response

                                                            404

                                                            HTTP Request

                                                            GET http://193.201.9.43/plays/chapter/Plugins/clip64.dll

                                                            HTTP Response

                                                            200
                                                          • 8.8.8.8:53
                                                            217.106.137.52.in-addr.arpa
                                                            dns
                                                            73 B
                                                            147 B
                                                            1
                                                            1

                                                            DNS Request

                                                            217.106.137.52.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            8.3.197.209.in-addr.arpa
                                                            dns
                                                            70 B
                                                            111 B
                                                            1
                                                            1

                                                            DNS Request

                                                            8.3.197.209.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            32.146.190.20.in-addr.arpa
                                                            dns
                                                            72 B
                                                            158 B
                                                            1
                                                            1

                                                            DNS Request

                                                            32.146.190.20.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            108.211.229.192.in-addr.arpa
                                                            dns
                                                            74 B
                                                            145 B
                                                            1
                                                            1

                                                            DNS Request

                                                            108.211.229.192.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            151.248.161.185.in-addr.arpa
                                                            dns
                                                            74 B
                                                            134 B
                                                            1
                                                            1

                                                            DNS Request

                                                            151.248.161.185.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            86.23.85.13.in-addr.arpa
                                                            dns
                                                            70 B
                                                            144 B
                                                            1
                                                            1

                                                            DNS Request

                                                            86.23.85.13.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            198.187.3.20.in-addr.arpa
                                                            dns
                                                            71 B
                                                            157 B
                                                            1
                                                            1

                                                            DNS Request

                                                            198.187.3.20.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            50.4.107.13.in-addr.arpa
                                                            dns
                                                            70 B
                                                            156 B
                                                            1
                                                            1

                                                            DNS Request

                                                            50.4.107.13.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            43.9.201.193.in-addr.arpa
                                                            dns
                                                            71 B
                                                            131 B
                                                            1
                                                            1

                                                            DNS Request

                                                            43.9.201.193.in-addr.arpa

                                                          • 8.8.8.8:53
                                                            2.77.109.52.in-addr.arpa
                                                            dns
                                                            70 B
                                                            144 B
                                                            1
                                                            1

                                                            DNS Request

                                                            2.77.109.52.in-addr.arpa

                                                          MITRE ATT&CK Enterprise v6

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si702512.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si702512.exe

                                                            Filesize

                                                            246KB

                                                            MD5

                                                            ac3eb194ed5ab3b80a14e8189174a171

                                                            SHA1

                                                            c888d21cbdb7d01e02b5bb199d070a18c23cfda6

                                                            SHA256

                                                            708c0153842214059ea1aa8bd40086850cb5cfbc58300f18d7b6421b2d34ed38

                                                            SHA512

                                                            a776e533d4d3f483bdb649a116d4c1c5dde9617466ceacbe2ad8ffbb7ee3ea9405ee69f1ac3db2e0a2fd6c738d5bc9e7b8cf20b0753a4761d3981b249fc0b3dc

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182856.exe

                                                            Filesize

                                                            709KB

                                                            MD5

                                                            4a8030a0546ba2df7cf00c5ae3a346fa

                                                            SHA1

                                                            73937d7f93188974eea957456551383015bf006c

                                                            SHA256

                                                            0410a9eadbf66f87680075de0e3593b232b6afb3f3b20691046be8f20de1ce4b

                                                            SHA512

                                                            2fb6bec5d7f7f42d009366a6c0aaacac357fd979b5a39f78295d6c33be96636ed594c3933998444b5dd239f8e490d744eb3dcdc5652c5f19e796185cdfad2657

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un182856.exe

                                                            Filesize

                                                            709KB

                                                            MD5

                                                            4a8030a0546ba2df7cf00c5ae3a346fa

                                                            SHA1

                                                            73937d7f93188974eea957456551383015bf006c

                                                            SHA256

                                                            0410a9eadbf66f87680075de0e3593b232b6afb3f3b20691046be8f20de1ce4b

                                                            SHA512

                                                            2fb6bec5d7f7f42d009366a6c0aaacac357fd979b5a39f78295d6c33be96636ed594c3933998444b5dd239f8e490d744eb3dcdc5652c5f19e796185cdfad2657

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk676848.exe

                                                            Filesize

                                                            136KB

                                                            MD5

                                                            359db2338ae0f977dcf10e90cf9816fb

                                                            SHA1

                                                            94126cb670e5f434e555c991c967e0ee98fae552

                                                            SHA256

                                                            5f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc

                                                            SHA512

                                                            d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk676848.exe

                                                            Filesize

                                                            136KB

                                                            MD5

                                                            359db2338ae0f977dcf10e90cf9816fb

                                                            SHA1

                                                            94126cb670e5f434e555c991c967e0ee98fae552

                                                            SHA256

                                                            5f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc

                                                            SHA512

                                                            d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un662817.exe

                                                            Filesize

                                                            555KB

                                                            MD5

                                                            06bfc876cfc371fb31596d3f77ab96df

                                                            SHA1

                                                            f4d926b55419b17b7d26f4992631078108c8ce69

                                                            SHA256

                                                            642ae3c08d84ad4ef69b45e21326ea130a7eef7453aeda399ae22693a300c5e3

                                                            SHA512

                                                            9d1fb40ee0c914709a2070fc572a886822ee505a00373e7846070926cc3a6e2db294d7dcc6bd51f3f9c86c0710f87a902d9585394b0a54e8415adeca9ccad64d

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un662817.exe

                                                            Filesize

                                                            555KB

                                                            MD5

                                                            06bfc876cfc371fb31596d3f77ab96df

                                                            SHA1

                                                            f4d926b55419b17b7d26f4992631078108c8ce69

                                                            SHA256

                                                            642ae3c08d84ad4ef69b45e21326ea130a7eef7453aeda399ae22693a300c5e3

                                                            SHA512

                                                            9d1fb40ee0c914709a2070fc572a886822ee505a00373e7846070926cc3a6e2db294d7dcc6bd51f3f9c86c0710f87a902d9585394b0a54e8415adeca9ccad64d

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr784687.exe

                                                            Filesize

                                                            255KB

                                                            MD5

                                                            624cb605b9b7a8f5788673967f7309f3

                                                            SHA1

                                                            ac6a0786e3de981af4891f93511a3fc570e042a7

                                                            SHA256

                                                            b29af3373c19ed219fe61fb862f47c84ea9d786121ee79fd7e03b8b1e25a0543

                                                            SHA512

                                                            2e48e5d9b1227d495ba871f78d242d7aa9e1295abfa7da95234551d688d27c9dc1dc1d1ad93858bb5c73cbf80cda7eda70c935de4caf5c53ec0c29e0d9ad2c93

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr784687.exe

                                                            Filesize

                                                            255KB

                                                            MD5

                                                            624cb605b9b7a8f5788673967f7309f3

                                                            SHA1

                                                            ac6a0786e3de981af4891f93511a3fc570e042a7

                                                            SHA256

                                                            b29af3373c19ed219fe61fb862f47c84ea9d786121ee79fd7e03b8b1e25a0543

                                                            SHA512

                                                            2e48e5d9b1227d495ba871f78d242d7aa9e1295abfa7da95234551d688d27c9dc1dc1d1ad93858bb5c73cbf80cda7eda70c935de4caf5c53ec0c29e0d9ad2c93

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu591528.exe

                                                            Filesize

                                                            337KB

                                                            MD5

                                                            722b384ffd8809a29cb24bc3d6d4987a

                                                            SHA1

                                                            a2a86016eca95202db49421e23c8b6e6377118a2

                                                            SHA256

                                                            24e630ffde3b22e7731769437ae29676511077b8673d7707da76ffe851a6cf9b

                                                            SHA512

                                                            97acab2b8090392b37e1f3a13d9e5ad664e5718d61cfdbfacdb853460b9027c498da5fecdb4cde67d26b3ce887e1ac493019fd3cf8f9a129f966a044349eea31

                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu591528.exe

                                                            Filesize

                                                            337KB

                                                            MD5

                                                            722b384ffd8809a29cb24bc3d6d4987a

                                                            SHA1

                                                            a2a86016eca95202db49421e23c8b6e6377118a2

                                                            SHA256

                                                            24e630ffde3b22e7731769437ae29676511077b8673d7707da76ffe851a6cf9b

                                                            SHA512

                                                            97acab2b8090392b37e1f3a13d9e5ad664e5718d61cfdbfacdb853460b9027c498da5fecdb4cde67d26b3ce887e1ac493019fd3cf8f9a129f966a044349eea31

                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                            Filesize

                                                            89KB

                                                            MD5

                                                            ee69aeae2f96208fc3b11dfb70e07161

                                                            SHA1

                                                            5f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6

                                                            SHA256

                                                            13ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9

                                                            SHA512

                                                            94373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f

                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                            Filesize

                                                            89KB

                                                            MD5

                                                            ee69aeae2f96208fc3b11dfb70e07161

                                                            SHA1

                                                            5f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6

                                                            SHA256

                                                            13ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9

                                                            SHA512

                                                            94373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f

                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                            Filesize

                                                            89KB

                                                            MD5

                                                            ee69aeae2f96208fc3b11dfb70e07161

                                                            SHA1

                                                            5f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6

                                                            SHA256

                                                            13ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9

                                                            SHA512

                                                            94373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f

                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                            Filesize

                                                            162B

                                                            MD5

                                                            1b7c22a214949975556626d7217e9a39

                                                            SHA1

                                                            d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                            SHA256

                                                            340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                            SHA512

                                                            ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                          • memory/1396-1017-0x0000000000620000-0x000000000065B000-memory.dmp

                                                            Filesize

                                                            236KB

                                                          • memory/1852-1010-0x0000000000B20000-0x0000000000B48000-memory.dmp

                                                            Filesize

                                                            160KB

                                                          • memory/1852-1011-0x0000000007D90000-0x0000000007DA0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-171-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-192-0x0000000000400000-0x00000000004AD000-memory.dmp

                                                            Filesize

                                                            692KB

                                                          • memory/3876-177-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-179-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-181-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-183-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-185-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-187-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-188-0x0000000000400000-0x00000000004AD000-memory.dmp

                                                            Filesize

                                                            692KB

                                                          • memory/3876-189-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-190-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-175-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-173-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-169-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-167-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-165-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-163-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-161-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-160-0x00000000026E0000-0x00000000026F2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/3876-159-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-158-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-157-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3876-156-0x0000000000500000-0x000000000052D000-memory.dmp

                                                            Filesize

                                                            180KB

                                                          • memory/3876-155-0x0000000004C70000-0x0000000005214000-memory.dmp

                                                            Filesize

                                                            5.6MB

                                                          • memory/4228-206-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-222-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-224-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-227-0x0000000000760000-0x00000000007A6000-memory.dmp

                                                            Filesize

                                                            280KB

                                                          • memory/4228-226-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-230-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4228-231-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-232-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4228-229-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4228-234-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-993-0x00000000075F0000-0x0000000007C08000-memory.dmp

                                                            Filesize

                                                            6.1MB

                                                          • memory/4228-994-0x0000000007C20000-0x0000000007C32000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4228-995-0x0000000007C40000-0x0000000007D4A000-memory.dmp

                                                            Filesize

                                                            1.0MB

                                                          • memory/4228-996-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/4228-997-0x0000000007D70000-0x0000000007DAC000-memory.dmp

                                                            Filesize

                                                            240KB

                                                          • memory/4228-998-0x0000000008060000-0x00000000080C6000-memory.dmp

                                                            Filesize

                                                            408KB

                                                          • memory/4228-999-0x0000000008720000-0x00000000087B2000-memory.dmp

                                                            Filesize

                                                            584KB

                                                          • memory/4228-1000-0x00000000087D0000-0x0000000008820000-memory.dmp

                                                            Filesize

                                                            320KB

                                                          • memory/4228-1001-0x0000000008840000-0x00000000088B6000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/4228-220-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-218-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-216-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-214-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-212-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-210-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-208-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-204-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-202-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-197-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-200-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-198-0x0000000004AC0000-0x0000000004AF5000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4228-1002-0x00000000089F0000-0x0000000008A0E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/4228-1003-0x0000000008B10000-0x0000000008CD2000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4228-1004-0x0000000008CE0000-0x000000000920C000-memory.dmp

                                                            Filesize

                                                            5.2MB

                                                          We care about your privacy.

                                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.