Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2023 04:22
Static task
static1
Behavioral task
behavioral1
Sample
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
Resource
win10-20230220-en
General
-
Target
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe
-
Size
5.0MB
-
MD5
890e29d78179dc4611286b863c50df53
-
SHA1
7bee367b02f66898b9ffb0f2569ca79c04edc19a
-
SHA256
2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
-
SHA512
3b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
SSDEEP
98304:I95KeVzJFLYDAQlsumF2SEGKhq1v/28fV4AAc0cq9FcFzUkKm:ArQm2FGKq28tIbWzSm
Malware Config
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Extracted
redline
Load_Am_130623
165.22.100.96:81
-
auth_value
c7e984e13f7f42d18969a2259aeadc52
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 3952 created 3212 3952 mntaskost.exe 24 PID 3952 created 3212 3952 mntaskost.exe 24 PID 3952 created 3212 3952 mntaskost.exe 24 PID 3952 created 3212 3952 mntaskost.exe 24 PID 3952 created 3212 3952 mntaskost.exe 24 PID 4268 created 3212 4268 updater.exe 24 PID 4268 created 3212 4268 updater.exe 24 PID 4268 created 3212 4268 updater.exe 24 PID 4268 created 3212 4268 updater.exe 24 PID 4268 created 3212 4268 updater.exe 24 PID 4268 created 3212 4268 updater.exe 24 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mntaskost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cltaskost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/4268-814-0x00007FF798780000-0x00007FF799545000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts mntaskost.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mntaskost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mntaskost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cltaskost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cltaskost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Executes dropped EXE 12 IoCs
pid Process 3076 oneetx.exe 5000 metaskhost.exe 4612 metaskhost.exe 3388 oneetx.exe 3952 mntaskost.exe 2120 cltaskost.exe 4268 updater.exe 4324 ntlhost.exe 780 oneetx.exe 772 oneetx.exe 3088 oneetx.exe 2076 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001af3e-195.dat themida behavioral2/files/0x000600000001af3e-202.dat themida behavioral2/memory/3952-212-0x00007FF70CB50000-0x00007FF70D915000-memory.dmp themida behavioral2/memory/3952-291-0x00007FF70CB50000-0x00007FF70D915000-memory.dmp themida behavioral2/files/0x000600000001af3e-330.dat themida behavioral2/memory/3952-332-0x00007FF70CB50000-0x00007FF70D915000-memory.dmp themida behavioral2/files/0x000800000001af4b-333.dat themida behavioral2/memory/4268-339-0x00007FF798780000-0x00007FF799545000-memory.dmp themida behavioral2/memory/4268-349-0x00007FF798780000-0x00007FF799545000-memory.dmp themida behavioral2/memory/4268-351-0x00007FF798780000-0x00007FF799545000-memory.dmp themida behavioral2/files/0x000800000001af4b-809.dat themida behavioral2/memory/4268-814-0x00007FF798780000-0x00007FF799545000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" cltaskost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mntaskost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cltaskost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3952 mntaskost.exe 2120 cltaskost.exe 4268 updater.exe 4324 ntlhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5000 set thread context of 4612 5000 metaskhost.exe 78 PID 4268 set thread context of 4056 4268 updater.exe 123 PID 4268 set thread context of 4376 4268 updater.exe 124 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe mntaskost.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4860 sc.exe 228 sc.exe 204 sc.exe 340 sc.exe 684 sc.exe 552 sc.exe 4988 sc.exe 328 sc.exe 208 sc.exe 936 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3552 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 18 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 3076 oneetx.exe 3076 oneetx.exe 4612 metaskhost.exe 4612 metaskhost.exe 3388 oneetx.exe 3388 oneetx.exe 3952 mntaskost.exe 3952 mntaskost.exe 4900 powershell.exe 4900 powershell.exe 4900 powershell.exe 3952 mntaskost.exe 3952 mntaskost.exe 3952 mntaskost.exe 3952 mntaskost.exe 3952 mntaskost.exe 3952 mntaskost.exe 96 powershell.exe 96 powershell.exe 96 powershell.exe 3952 mntaskost.exe 3952 mntaskost.exe 4268 updater.exe 4268 updater.exe 4236 powershell.exe 4236 powershell.exe 4236 powershell.exe 780 oneetx.exe 780 oneetx.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4476 powershell.exe 4476 powershell.exe 4476 powershell.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4268 updater.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe 4376 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5000 metaskhost.exe Token: SeDebugPrivilege 4612 metaskhost.exe Token: SeDebugPrivilege 4900 powershell.exe Token: SeIncreaseQuotaPrivilege 4900 powershell.exe Token: SeSecurityPrivilege 4900 powershell.exe Token: SeTakeOwnershipPrivilege 4900 powershell.exe Token: SeLoadDriverPrivilege 4900 powershell.exe Token: SeSystemProfilePrivilege 4900 powershell.exe Token: SeSystemtimePrivilege 4900 powershell.exe Token: SeProfSingleProcessPrivilege 4900 powershell.exe Token: SeIncBasePriorityPrivilege 4900 powershell.exe Token: SeCreatePagefilePrivilege 4900 powershell.exe Token: SeBackupPrivilege 4900 powershell.exe Token: SeRestorePrivilege 4900 powershell.exe Token: SeShutdownPrivilege 4900 powershell.exe Token: SeDebugPrivilege 4900 powershell.exe Token: SeSystemEnvironmentPrivilege 4900 powershell.exe Token: SeRemoteShutdownPrivilege 4900 powershell.exe Token: SeUndockPrivilege 4900 powershell.exe Token: SeManageVolumePrivilege 4900 powershell.exe Token: 33 4900 powershell.exe Token: 34 4900 powershell.exe Token: 35 4900 powershell.exe Token: 36 4900 powershell.exe Token: SeDebugPrivilege 96 powershell.exe Token: SeShutdownPrivilege 1884 powercfg.exe Token: SeCreatePagefilePrivilege 1884 powercfg.exe Token: SeShutdownPrivilege 3088 powercfg.exe Token: SeCreatePagefilePrivilege 3088 powercfg.exe Token: SeShutdownPrivilege 2564 powercfg.exe Token: SeCreatePagefilePrivilege 2564 powercfg.exe Token: SeShutdownPrivilege 2556 powercfg.exe Token: SeCreatePagefilePrivilege 2556 powercfg.exe Token: SeIncreaseQuotaPrivilege 96 powershell.exe Token: SeSecurityPrivilege 96 powershell.exe Token: SeTakeOwnershipPrivilege 96 powershell.exe Token: SeLoadDriverPrivilege 96 powershell.exe Token: SeSystemProfilePrivilege 96 powershell.exe Token: SeSystemtimePrivilege 96 powershell.exe Token: SeProfSingleProcessPrivilege 96 powershell.exe Token: SeIncBasePriorityPrivilege 96 powershell.exe Token: SeCreatePagefilePrivilege 96 powershell.exe Token: SeBackupPrivilege 96 powershell.exe Token: SeRestorePrivilege 96 powershell.exe Token: SeShutdownPrivilege 96 powershell.exe Token: SeDebugPrivilege 96 powershell.exe Token: SeSystemEnvironmentPrivilege 96 powershell.exe Token: SeRemoteShutdownPrivilege 96 powershell.exe Token: SeUndockPrivilege 96 powershell.exe Token: SeManageVolumePrivilege 96 powershell.exe Token: 33 96 powershell.exe Token: 34 96 powershell.exe Token: 35 96 powershell.exe Token: 36 96 powershell.exe Token: SeIncreaseQuotaPrivilege 96 powershell.exe Token: SeSecurityPrivilege 96 powershell.exe Token: SeTakeOwnershipPrivilege 96 powershell.exe Token: SeLoadDriverPrivilege 96 powershell.exe Token: SeSystemProfilePrivilege 96 powershell.exe Token: SeSystemtimePrivilege 96 powershell.exe Token: SeProfSingleProcessPrivilege 96 powershell.exe Token: SeIncBasePriorityPrivilege 96 powershell.exe Token: SeCreatePagefilePrivilege 96 powershell.exe Token: SeBackupPrivilege 96 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3076 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 2868 wrote to memory of 3076 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 2868 wrote to memory of 3076 2868 2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe 66 PID 3076 wrote to memory of 3552 3076 oneetx.exe 67 PID 3076 wrote to memory of 3552 3076 oneetx.exe 67 PID 3076 wrote to memory of 3552 3076 oneetx.exe 67 PID 3076 wrote to memory of 4240 3076 oneetx.exe 69 PID 3076 wrote to memory of 4240 3076 oneetx.exe 69 PID 3076 wrote to memory of 4240 3076 oneetx.exe 69 PID 4240 wrote to memory of 1416 4240 cmd.exe 71 PID 4240 wrote to memory of 1416 4240 cmd.exe 71 PID 4240 wrote to memory of 1416 4240 cmd.exe 71 PID 4240 wrote to memory of 4492 4240 cmd.exe 72 PID 4240 wrote to memory of 4492 4240 cmd.exe 72 PID 4240 wrote to memory of 4492 4240 cmd.exe 72 PID 4240 wrote to memory of 2848 4240 cmd.exe 73 PID 4240 wrote to memory of 2848 4240 cmd.exe 73 PID 4240 wrote to memory of 2848 4240 cmd.exe 73 PID 4240 wrote to memory of 4272 4240 cmd.exe 74 PID 4240 wrote to memory of 4272 4240 cmd.exe 74 PID 4240 wrote to memory of 4272 4240 cmd.exe 74 PID 4240 wrote to memory of 5096 4240 cmd.exe 75 PID 4240 wrote to memory of 5096 4240 cmd.exe 75 PID 4240 wrote to memory of 5096 4240 cmd.exe 75 PID 4240 wrote to memory of 5084 4240 cmd.exe 76 PID 4240 wrote to memory of 5084 4240 cmd.exe 76 PID 4240 wrote to memory of 5084 4240 cmd.exe 76 PID 3076 wrote to memory of 5000 3076 oneetx.exe 77 PID 3076 wrote to memory of 5000 3076 oneetx.exe 77 PID 3076 wrote to memory of 5000 3076 oneetx.exe 77 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 5000 wrote to memory of 4612 5000 metaskhost.exe 78 PID 3076 wrote to memory of 3952 3076 oneetx.exe 81 PID 3076 wrote to memory of 3952 3076 oneetx.exe 81 PID 3076 wrote to memory of 2120 3076 oneetx.exe 82 PID 3076 wrote to memory of 2120 3076 oneetx.exe 82 PID 1608 wrote to memory of 4860 1608 cmd.exe 89 PID 1608 wrote to memory of 4860 1608 cmd.exe 89 PID 1608 wrote to memory of 328 1608 cmd.exe 90 PID 1608 wrote to memory of 328 1608 cmd.exe 90 PID 1608 wrote to memory of 228 1608 cmd.exe 91 PID 1608 wrote to memory of 228 1608 cmd.exe 91 PID 1608 wrote to memory of 208 1608 cmd.exe 93 PID 1608 wrote to memory of 208 1608 cmd.exe 93 PID 1608 wrote to memory of 204 1608 cmd.exe 92 PID 1608 wrote to memory of 204 1608 cmd.exe 92 PID 32 wrote to memory of 1884 32 cmd.exe 98 PID 32 wrote to memory of 1884 32 cmd.exe 98 PID 32 wrote to memory of 3088 32 cmd.exe 99 PID 32 wrote to memory of 3088 32 cmd.exe 99 PID 32 wrote to memory of 2564 32 cmd.exe 100 PID 32 wrote to memory of 2564 32 cmd.exe 100 PID 32 wrote to memory of 2556 32 cmd.exe 101 PID 32 wrote to memory of 2556 32 cmd.exe 101 PID 2120 wrote to memory of 4324 2120 cltaskost.exe 83 PID 2120 wrote to memory of 4324 2120 cltaskost.exe 83 PID 5100 wrote to memory of 340 5100 cmd.exe 110 PID 5100 wrote to memory of 340 5100 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"C:\Users\Admin\AppData\Local\Temp\2fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"5⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E5⤵PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000081001\metaskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000081001\metaskhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\1000081001\metaskhost.exeC:\Users\Admin\AppData\Local\Temp\1000081001\metaskhost.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000082001\mntaskost.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\mntaskost.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\1000084001\cltaskost.exe"C:\Users\Admin\AppData\Local\Temp\1000084001\cltaskost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4324
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4860
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:328
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:228
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:204
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:208
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:96
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:340
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:684
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:552
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:936
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4988
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2612
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4392
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:328
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1636
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4684
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4056
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:780
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
PID:772
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
PID:3088
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
PID:2076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD5313a213071db7bf5b8ac797a49d39a4c
SHA16c0a92f65106cd77672414038d51dc99404a4a82
SHA256b7003243c5877b13542a2758df70ab6f773199cc6ada119bdb9700adf717926e
SHA512c68cc32c28288a8de608d0750262d06e3f8db497371d690f8fd15e1656f1954eb285fbc5f04fee0b5cd13798d005bf5e53a99fa677803da5ec74deffe0b714a3
-
Filesize
13.3MB
MD5313a213071db7bf5b8ac797a49d39a4c
SHA16c0a92f65106cd77672414038d51dc99404a4a82
SHA256b7003243c5877b13542a2758df70ab6f773199cc6ada119bdb9700adf717926e
SHA512c68cc32c28288a8de608d0750262d06e3f8db497371d690f8fd15e1656f1954eb285fbc5f04fee0b5cd13798d005bf5e53a99fa677803da5ec74deffe0b714a3
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
1KB
MD597f9972a4d45947e00626ad0d985547a
SHA19ffa031c064aa988c6831f6d08ae7e6f26d367d7
SHA25601540bebe8623679b4536d024f8e984a116eec025962c4a65007af496370bc1e
SHA5122a387b01ae307a46017565cde27543a0b753176e19cecf2a09489625efba015a048fdbc8b66b9a4672b95719e22336eeb3470d5f83fafeccc52bc247b1b304ec
-
Filesize
115KB
MD58be1dc102750cca405bd8598eb9e9639
SHA1dcf643b480772aee30eca830cd903640b9406167
SHA2562aa8c5e832d96308ec5e93398fb5a45d7c9d475dbef7a085835bfb0c3fc6cd2d
SHA51212985a1196dbbf440ab8b353ce453b1986f5e8ca8d166dc3784d869f6d151fed3940ff8e0e976c34799d794cfb19550003f1b5a8275449196c1d128ff7ed5271
-
Filesize
115KB
MD58be1dc102750cca405bd8598eb9e9639
SHA1dcf643b480772aee30eca830cd903640b9406167
SHA2562aa8c5e832d96308ec5e93398fb5a45d7c9d475dbef7a085835bfb0c3fc6cd2d
SHA51212985a1196dbbf440ab8b353ce453b1986f5e8ca8d166dc3784d869f6d151fed3940ff8e0e976c34799d794cfb19550003f1b5a8275449196c1d128ff7ed5271
-
Filesize
115KB
MD58be1dc102750cca405bd8598eb9e9639
SHA1dcf643b480772aee30eca830cd903640b9406167
SHA2562aa8c5e832d96308ec5e93398fb5a45d7c9d475dbef7a085835bfb0c3fc6cd2d
SHA51212985a1196dbbf440ab8b353ce453b1986f5e8ca8d166dc3784d869f6d151fed3940ff8e0e976c34799d794cfb19550003f1b5a8275449196c1d128ff7ed5271
-
Filesize
115KB
MD58be1dc102750cca405bd8598eb9e9639
SHA1dcf643b480772aee30eca830cd903640b9406167
SHA2562aa8c5e832d96308ec5e93398fb5a45d7c9d475dbef7a085835bfb0c3fc6cd2d
SHA51212985a1196dbbf440ab8b353ce453b1986f5e8ca8d166dc3784d869f6d151fed3940ff8e0e976c34799d794cfb19550003f1b5a8275449196c1d128ff7ed5271
-
Filesize
13.3MB
MD5313a213071db7bf5b8ac797a49d39a4c
SHA16c0a92f65106cd77672414038d51dc99404a4a82
SHA256b7003243c5877b13542a2758df70ab6f773199cc6ada119bdb9700adf717926e
SHA512c68cc32c28288a8de608d0750262d06e3f8db497371d690f8fd15e1656f1954eb285fbc5f04fee0b5cd13798d005bf5e53a99fa677803da5ec74deffe0b714a3
-
Filesize
13.3MB
MD5313a213071db7bf5b8ac797a49d39a4c
SHA16c0a92f65106cd77672414038d51dc99404a4a82
SHA256b7003243c5877b13542a2758df70ab6f773199cc6ada119bdb9700adf717926e
SHA512c68cc32c28288a8de608d0750262d06e3f8db497371d690f8fd15e1656f1954eb285fbc5f04fee0b5cd13798d005bf5e53a99fa677803da5ec74deffe0b714a3
-
Filesize
13.3MB
MD5313a213071db7bf5b8ac797a49d39a4c
SHA16c0a92f65106cd77672414038d51dc99404a4a82
SHA256b7003243c5877b13542a2758df70ab6f773199cc6ada119bdb9700adf717926e
SHA512c68cc32c28288a8de608d0750262d06e3f8db497371d690f8fd15e1656f1954eb285fbc5f04fee0b5cd13798d005bf5e53a99fa677803da5ec74deffe0b714a3
-
Filesize
3.4MB
MD5fe7ef230e1c52a78b372e8bf8709ed18
SHA1c257ee764c394cf30b20566a472eb6b9ef03facf
SHA256d4b2850ffcdc359db19f47f1c88ba874e0e8a1b313ff3a0aa761d68d562078e1
SHA512ac49d68b8cf2594aa6ec0fccaabe3edf472c4e63cbf6995aebaf24b66807867fba401ae4e2fd6c91da3ed2dfbe151b19a5877ba291a139eb355e5b19cff33346
-
Filesize
3.4MB
MD5fe7ef230e1c52a78b372e8bf8709ed18
SHA1c257ee764c394cf30b20566a472eb6b9ef03facf
SHA256d4b2850ffcdc359db19f47f1c88ba874e0e8a1b313ff3a0aa761d68d562078e1
SHA512ac49d68b8cf2594aa6ec0fccaabe3edf472c4e63cbf6995aebaf24b66807867fba401ae4e2fd6c91da3ed2dfbe151b19a5877ba291a139eb355e5b19cff33346
-
Filesize
3.4MB
MD5fe7ef230e1c52a78b372e8bf8709ed18
SHA1c257ee764c394cf30b20566a472eb6b9ef03facf
SHA256d4b2850ffcdc359db19f47f1c88ba874e0e8a1b313ff3a0aa761d68d562078e1
SHA512ac49d68b8cf2594aa6ec0fccaabe3edf472c4e63cbf6995aebaf24b66807867fba401ae4e2fd6c91da3ed2dfbe151b19a5877ba291a139eb355e5b19cff33346
-
Filesize
72KB
MD52e03753b0773c71a868764f47ce6b4a0
SHA1719bcfa6ab54427ce9c67217cc7a314430e8cdfc
SHA2567c130cef93d0b4266cd9ba3d756cd6c0de343ed78a73f75edd16fbcbac0a2cad
SHA512aeea902820875f5b95d629c4cc0e05c515970009aa1709487fff0461b0e0c79ccd7261f0b34b169d62759ed684d7788703cd4c3fc14e1906cc669b81c8d94d8e
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
5.0MB
MD5890e29d78179dc4611286b863c50df53
SHA17bee367b02f66898b9ffb0f2569ca79c04edc19a
SHA2562fd399beb67f956f71061414caf34b5235b34078be4147e67b9f1a9623857734
SHA5123b94b71c0301ed09c1c3fd40e9be74552e2b17fa957fb6d09c7d05451859d57b851b3b6a63dfc7bf38e9d791028841d72618f6f6deaa92ec51f7bb65f0e36e08
-
Filesize
766.4MB
MD56a96168b69640f370101c3cbb14c9008
SHA19bf7ddd056e050be09f58cee731ef0adfa995e70
SHA2560b79651fc066a42f5fe368fdb013017a89bfb2f91246e66f067b1667fd338540
SHA512603e98071ba8ae6f01045c7dee09d568b46c05be02fe3a44e03aaf49af0027c665dfd4f6d60a3e3a5e9b9af59a84832130129231baf29445db5b4fda33f81aae
-
Filesize
766.4MB
MD56a96168b69640f370101c3cbb14c9008
SHA19bf7ddd056e050be09f58cee731ef0adfa995e70
SHA2560b79651fc066a42f5fe368fdb013017a89bfb2f91246e66f067b1667fd338540
SHA512603e98071ba8ae6f01045c7dee09d568b46c05be02fe3a44e03aaf49af0027c665dfd4f6d60a3e3a5e9b9af59a84832130129231baf29445db5b4fda33f81aae
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699