Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2023 15:52
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
4.0MB
-
MD5
229df5fd5f850d26bb0b0a05f0918e9a
-
SHA1
400871984e6d833956f06734d7be5d8b7c8cb997
-
SHA256
4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
-
SHA512
1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
SSDEEP
98304:dCUPT4Mzeh+6D6UH+phuRO5bezZvSZ0NOk/Lg8eSjD:dCwe4O7H45bezZvIaOk/LgbSjD
Malware Config
Extracted
amadey
3.80
http://45.15.156.208/jd9dd3Vw/index.php
http://second.amadgood.com/jd9dd3Vw/index.php
-
install_dir
eb0f58bce7
-
install_file
oneetx.exe
-
strings_key
2b74c848ebcfe9bcac3cd4aec559934c
Extracted
laplas
http://206.189.229.43
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/376-47-0x0000000000B30000-0x0000000000D40000-memory.dmp family_redline behavioral2/memory/3316-48-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral2/memory/376-53-0x0000000000B30000-0x0000000000D40000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 1960 created 3168 1960 rdpcllp.exe 17 PID 1960 created 3168 1960 rdpcllp.exe 17 PID 1960 created 3168 1960 rdpcllp.exe 17 PID 1960 created 3168 1960 rdpcllp.exe 17 PID 1960 created 3168 1960 rdpcllp.exe 17 PID 4752 created 3168 4752 updater.exe 17 PID 4752 created 3168 4752 updater.exe 17 PID 4752 created 3168 4752 updater.exe 17 PID 4752 created 3168 4752 updater.exe 17 PID 4752 created 3168 4752 updater.exe 17 PID 4752 created 3168 4752 updater.exe 17 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostclp.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/3732-339-0x00007FF623670000-0x00007FF623E5F000-memory.dmp xmrig behavioral2/memory/3732-343-0x00007FF623670000-0x00007FF623E5F000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts rdpcllp.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostclp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostclp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2820 oneetx.exe 376 taskmask.exe 1960 rdpcllp.exe 4508 taskhostclp.exe 1052 oneetx.exe 1972 ntlhost.exe 4752 updater.exe -
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral2/memory/2024-0-0x0000000000DF0000-0x0000000001445000-memory.dmp vmprotect behavioral2/files/0x00080000000231ec-7.dat vmprotect behavioral2/files/0x00080000000231ec-14.dat vmprotect behavioral2/memory/2820-15-0x0000000000B30000-0x0000000001185000-memory.dmp vmprotect behavioral2/files/0x00080000000231ec-18.dat vmprotect behavioral2/files/0x00080000000231ec-115.dat vmprotect behavioral2/memory/1052-139-0x0000000000B30000-0x0000000001185000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" taskhostclp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostclp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4508 taskhostclp.exe 1972 ntlhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 376 set thread context of 3316 376 taskmask.exe 104 PID 4752 set thread context of 5004 4752 updater.exe 151 PID 4752 set thread context of 3732 4752 updater.exe 152 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe rdpcllp.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4996 sc.exe 5052 sc.exe 3716 sc.exe 4216 sc.exe 648 sc.exe 2304 sc.exe 3372 sc.exe 1916 sc.exe 1340 sc.exe 3980 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4836 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 71 Go-http-client/1.1 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 rdpcllp.exe 1960 rdpcllp.exe 3316 vbc.exe 3316 vbc.exe 3316 vbc.exe 3316 vbc.exe 3316 vbc.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 5012 powershell.exe 5012 powershell.exe 5012 powershell.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 4656 powershell.exe 4656 powershell.exe 4656 powershell.exe 1960 rdpcllp.exe 1960 rdpcllp.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 5036 powershell.exe 5036 powershell.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4508 powershell.exe 4508 powershell.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 4752 updater.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe 3732 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3316 vbc.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeShutdownPrivilege 4812 powercfg.exe Token: SeCreatePagefilePrivilege 4812 powercfg.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeShutdownPrivilege 1844 powercfg.exe Token: SeCreatePagefilePrivilege 1844 powercfg.exe Token: SeShutdownPrivilege 492 powercfg.exe Token: SeCreatePagefilePrivilege 492 powercfg.exe Token: SeShutdownPrivilege 4516 powercfg.exe Token: SeCreatePagefilePrivilege 4516 powercfg.exe Token: SeIncreaseQuotaPrivilege 4656 powershell.exe Token: SeSecurityPrivilege 4656 powershell.exe Token: SeTakeOwnershipPrivilege 4656 powershell.exe Token: SeLoadDriverPrivilege 4656 powershell.exe Token: SeSystemProfilePrivilege 4656 powershell.exe Token: SeSystemtimePrivilege 4656 powershell.exe Token: SeProfSingleProcessPrivilege 4656 powershell.exe Token: SeIncBasePriorityPrivilege 4656 powershell.exe Token: SeCreatePagefilePrivilege 4656 powershell.exe Token: SeBackupPrivilege 4656 powershell.exe Token: SeRestorePrivilege 4656 powershell.exe Token: SeShutdownPrivilege 4656 powershell.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeSystemEnvironmentPrivilege 4656 powershell.exe Token: SeRemoteShutdownPrivilege 4656 powershell.exe Token: SeUndockPrivilege 4656 powershell.exe Token: SeManageVolumePrivilege 4656 powershell.exe Token: 33 4656 powershell.exe Token: 34 4656 powershell.exe Token: 35 4656 powershell.exe Token: 36 4656 powershell.exe Token: SeIncreaseQuotaPrivilege 4656 powershell.exe Token: SeSecurityPrivilege 4656 powershell.exe Token: SeTakeOwnershipPrivilege 4656 powershell.exe Token: SeLoadDriverPrivilege 4656 powershell.exe Token: SeSystemProfilePrivilege 4656 powershell.exe Token: SeSystemtimePrivilege 4656 powershell.exe Token: SeProfSingleProcessPrivilege 4656 powershell.exe Token: SeIncBasePriorityPrivilege 4656 powershell.exe Token: SeCreatePagefilePrivilege 4656 powershell.exe Token: SeBackupPrivilege 4656 powershell.exe Token: SeRestorePrivilege 4656 powershell.exe Token: SeShutdownPrivilege 4656 powershell.exe Token: SeDebugPrivilege 4656 powershell.exe Token: SeSystemEnvironmentPrivilege 4656 powershell.exe Token: SeRemoteShutdownPrivilege 4656 powershell.exe Token: SeUndockPrivilege 4656 powershell.exe Token: SeManageVolumePrivilege 4656 powershell.exe Token: 33 4656 powershell.exe Token: 34 4656 powershell.exe Token: 35 4656 powershell.exe Token: 36 4656 powershell.exe Token: SeIncreaseQuotaPrivilege 4656 powershell.exe Token: SeSecurityPrivilege 4656 powershell.exe Token: SeTakeOwnershipPrivilege 4656 powershell.exe Token: SeLoadDriverPrivilege 4656 powershell.exe Token: SeSystemProfilePrivilege 4656 powershell.exe Token: SeSystemtimePrivilege 4656 powershell.exe Token: SeProfSingleProcessPrivilege 4656 powershell.exe Token: SeIncBasePriorityPrivilege 4656 powershell.exe Token: SeCreatePagefilePrivilege 4656 powershell.exe Token: SeBackupPrivilege 4656 powershell.exe Token: SeRestorePrivilege 4656 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2820 2024 tmp.exe 86 PID 2024 wrote to memory of 2820 2024 tmp.exe 86 PID 2024 wrote to memory of 2820 2024 tmp.exe 86 PID 2820 wrote to memory of 4836 2820 oneetx.exe 88 PID 2820 wrote to memory of 4836 2820 oneetx.exe 88 PID 2820 wrote to memory of 4836 2820 oneetx.exe 88 PID 2820 wrote to memory of 4940 2820 oneetx.exe 90 PID 2820 wrote to memory of 4940 2820 oneetx.exe 90 PID 2820 wrote to memory of 4940 2820 oneetx.exe 90 PID 4940 wrote to memory of 3096 4940 cmd.exe 93 PID 4940 wrote to memory of 3096 4940 cmd.exe 93 PID 4940 wrote to memory of 3096 4940 cmd.exe 93 PID 4940 wrote to memory of 4704 4940 cmd.exe 94 PID 4940 wrote to memory of 4704 4940 cmd.exe 94 PID 4940 wrote to memory of 4704 4940 cmd.exe 94 PID 4940 wrote to memory of 4572 4940 cmd.exe 95 PID 4940 wrote to memory of 4572 4940 cmd.exe 95 PID 4940 wrote to memory of 4572 4940 cmd.exe 95 PID 4940 wrote to memory of 4356 4940 cmd.exe 97 PID 4940 wrote to memory of 4356 4940 cmd.exe 97 PID 4940 wrote to memory of 4356 4940 cmd.exe 97 PID 4940 wrote to memory of 1376 4940 cmd.exe 96 PID 4940 wrote to memory of 1376 4940 cmd.exe 96 PID 4940 wrote to memory of 1376 4940 cmd.exe 96 PID 4940 wrote to memory of 1972 4940 cmd.exe 98 PID 4940 wrote to memory of 1972 4940 cmd.exe 98 PID 4940 wrote to memory of 1972 4940 cmd.exe 98 PID 2820 wrote to memory of 376 2820 oneetx.exe 103 PID 2820 wrote to memory of 376 2820 oneetx.exe 103 PID 2820 wrote to memory of 376 2820 oneetx.exe 103 PID 376 wrote to memory of 3316 376 taskmask.exe 104 PID 376 wrote to memory of 3316 376 taskmask.exe 104 PID 376 wrote to memory of 3316 376 taskmask.exe 104 PID 376 wrote to memory of 3316 376 taskmask.exe 104 PID 376 wrote to memory of 3316 376 taskmask.exe 104 PID 2820 wrote to memory of 1960 2820 oneetx.exe 106 PID 2820 wrote to memory of 1960 2820 oneetx.exe 106 PID 2820 wrote to memory of 4508 2820 oneetx.exe 108 PID 2820 wrote to memory of 4508 2820 oneetx.exe 108 PID 2540 wrote to memory of 3716 2540 cmd.exe 118 PID 2540 wrote to memory of 3716 2540 cmd.exe 118 PID 2540 wrote to memory of 3372 2540 cmd.exe 119 PID 2540 wrote to memory of 3372 2540 cmd.exe 119 PID 2540 wrote to memory of 1916 2540 cmd.exe 120 PID 2540 wrote to memory of 1916 2540 cmd.exe 120 PID 2540 wrote to memory of 4216 2540 cmd.exe 121 PID 2540 wrote to memory of 4216 2540 cmd.exe 121 PID 2540 wrote to memory of 648 2540 cmd.exe 122 PID 2540 wrote to memory of 648 2540 cmd.exe 122 PID 4420 wrote to memory of 4812 4420 cmd.exe 127 PID 4420 wrote to memory of 4812 4420 cmd.exe 127 PID 4508 wrote to memory of 1972 4508 taskhostclp.exe 112 PID 4508 wrote to memory of 1972 4508 taskhostclp.exe 112 PID 4420 wrote to memory of 1844 4420 cmd.exe 128 PID 4420 wrote to memory of 1844 4420 cmd.exe 128 PID 4420 wrote to memory of 492 4420 cmd.exe 129 PID 4420 wrote to memory of 492 4420 cmd.exe 129 PID 4420 wrote to memory of 4516 4420 cmd.exe 130 PID 4420 wrote to memory of 4516 4420 cmd.exe 130 PID 4216 wrote to memory of 1340 4216 cmd.exe 138 PID 4216 wrote to memory of 1340 4216 cmd.exe 138 PID 4216 wrote to memory of 2304 4216 cmd.exe 139 PID 4216 wrote to memory of 2304 4216 cmd.exe 139 PID 4216 wrote to memory of 4996 4216 cmd.exe 140 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"5⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E5⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\taskmask.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe"C:\Users\Admin\AppData\Local\Temp\1000153101\rdpcllp.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe"C:\Users\Admin\AppData\Local\Temp\1000154001\taskhostclp.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1972
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3716
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3372
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4216
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:648
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1340
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2304
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4996
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5052
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3980
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1084
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4220
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2176
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4804
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1948
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5004
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exeC:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe1⤵
- Executes dropped EXE
PID:1052
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
1Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
2.0MB
MD5764d12e322e104fe4df6085e89d53ed2
SHA1a1a7103d1619d0512fc49931f8e02d4260c0bf22
SHA256dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36
SHA5124eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e
-
Filesize
2.0MB
MD5764d12e322e104fe4df6085e89d53ed2
SHA1a1a7103d1619d0512fc49931f8e02d4260c0bf22
SHA256dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36
SHA5124eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e
-
Filesize
2.0MB
MD5764d12e322e104fe4df6085e89d53ed2
SHA1a1a7103d1619d0512fc49931f8e02d4260c0bf22
SHA256dd40d0e409908a22d3a8a02209131e6fc19e761d491a338282fc11479a73fe36
SHA5124eba9c0eb377814886b8f9eb2182c55c5e291647948b0ada0b102052cbdb2984d3def87302bc7c460ea3e36e73a86cc282eb6371c03c652cd1b9b2e433aaf25e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
74KB
MD542a1cd6134bcd2bbf456607211b03257
SHA1a17c5b728489155740a8f87ef620596d3e79134f
SHA256c44ab4f98668d03ecd32ccf5a0694556e5960416d268ea17bb7839b33de1f8c6
SHA512932dcc2cf6ca550a6efa319763f9ab65c81ebbebc21ff22c62613c804b0ce12ef5e77729bfea8afc67478748f11ace625f2413300e6fa9932ad88444b7639f5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
765.0MB
MD5f0efd37d2f320a39b988e39665f4a2b9
SHA181a19dfa1d86cda0b2d10cde0a87e6e3475ace16
SHA25685a29c9e7819a889f342d8b63a89986e06cb4e74f4c702d9910b762557e0af93
SHA512993f1ef72b6e53145231cd9fb634d7531bb64dbb1b2ae269d362943b1524288cf0ee750f3aeadac3bbab869eb43074991bbb46cbd91bf715ba59f6401b429329
-
Filesize
765.0MB
MD5f0efd37d2f320a39b988e39665f4a2b9
SHA181a19dfa1d86cda0b2d10cde0a87e6e3475ace16
SHA25685a29c9e7819a889f342d8b63a89986e06cb4e74f4c702d9910b762557e0af93
SHA512993f1ef72b6e53145231cd9fb634d7531bb64dbb1b2ae269d362943b1524288cf0ee750f3aeadac3bbab869eb43074991bbb46cbd91bf715ba59f6401b429329
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD54af092e31db1384ca141f50e2754eeea
SHA15e6e8c987ed9df9c9bb373227c2c8dcfde24ccef
SHA25660e3e9177b248839a957af720477f1389a10334123eb6cb12ae347e40ab53f53
SHA512a4ac31719fcb1b0b594806b5d56fc2c335de7901538542aeffe0f78b9710aa5aecc78146ab5d131d32b56405df59c4f2be50bcafb7494d4996c154b39f8bf4fd