Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 15:27

General

  • Target

    DDOS TOOL/DDOS TOOL.exe

  • Size

    5.3MB

  • MD5

    4356e6504e19b8a4014dbfacbc89493f

  • SHA1

    a4078eabcc6760e184259d694b7251b89569453a

  • SHA256

    e3a9ffb17c734d02950cdfcd38592549181d9f95220b8aaae69d6091480a8d42

  • SHA512

    83949b7422c6e2efcf6888e5c324ee8d536716f571156bdb4672e989aa68a1be5b7e6f0b5024e7c47af3f16ef0667045fda050f5dbc1272a491febdd249b7fe3

  • SSDEEP

    98304:9fIGp26lE8kKlr8iRqJxf+n/FHkLUfzv3QtRiBNyZWa8QEHE:9lEWrct+ntHkQfzPlpaz

Malware Config

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDOS TOOL\DDOS TOOL.exe
    "C:\Users\Admin\AppData\Local\Temp\DDOS TOOL\DDOS TOOL.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Users\Admin\AppData\Roaming\Server.exe
        "C:\Users\Admin\AppData\Roaming\Server.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3280
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4316
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3096
      • C:\Users\Admin\AppData\Roaming\conhost.exe
        "C:\Users\Admin\AppData\Roaming\conhost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1876
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1152
    • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
      "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
      • C:\Windows\SYSTEM32\attrib.exe
        "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
        3⤵
        • Views/modifies file attributes
        PID:4300
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\HYDRA.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4476
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1404
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4356
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:632
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
          PID:1772
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
            PID:4292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:3572
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic" path win32_VideoController get name
            3⤵
            • Detects videocard installed
            PID:4932
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe" && pause
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Windows\system32\PING.EXE
              ping localhost
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1192
        • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
          "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4000
          • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
            "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c title DDoS Tool by HʎDRΔ
              4⤵
                PID:1644
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                4⤵
                  PID:4460
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  4⤵
                    PID:1876
            • C:\Users\Admin\AppData\Roaming\Ondrive.exe
              C:\Users\Admin\AppData\Roaming\Ondrive.exe
              1⤵
              • Executes dropped EXE
              PID:2612
            • C:\Users\Admin\AppData\Roaming\Ondrive.exe
              C:\Users\Admin\AppData\Roaming\Ondrive.exe
              1⤵
              • Executes dropped EXE
              PID:4584
            • C:\Users\Admin\AppData\Roaming\Ondrive.exe
              C:\Users\Admin\AppData\Roaming\Ondrive.exe
              1⤵
              • Executes dropped EXE
              PID:1592

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\server.exe.log

              Filesize

              319B

              MD5

              91046f2e147049d3e53cd9bf9d4d95ed

              SHA1

              228e347d062840b2edcbd16904475aacad414c62

              SHA256

              ea92f8291b86440b98162409b1f9f04470455c22be01a1480ea5ebc37eb168dc

              SHA512

              071a9c6e17760a726c3a4519cf8006f36f17f50946af0129e0e1f3e480f6b7fcc804a7614b044247f2420a8b2b46bec5b8493e4869bb918bc7c0f6aa1346c3e0

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Ondrive.exe.log

              Filesize

              654B

              MD5

              2ff39f6c7249774be85fd60a8f9a245e

              SHA1

              684ff36b31aedc1e587c8496c02722c6698c1c4e

              SHA256

              e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

              SHA512

              1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              6d42b6da621e8df5674e26b799c8e2aa

              SHA1

              ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

              SHA256

              5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

              SHA512

              53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              15dde0683cd1ca19785d7262f554ba93

              SHA1

              d039c577e438546d10ac64837b05da480d06bf69

              SHA256

              d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

              SHA512

              57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              dbb57c20c22f4fda339b74a6b33cedd6

              SHA1

              a3b80afabca282594a8bc49cfcb9c82374e9ce88

              SHA256

              4d3e17a797d8cdecd5abaa9c5f09afa8a01ffce71f891a194c96167de46b4611

              SHA512

              7f7d348c2b35fedaa1841fa6f0640d348b9bb8b31ecce816b363a8b87513b515ad85f0e55a4df2fe953f28a146deeece64ffb1e6a9ed7462bc1dd2244fffaba4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              470a31aac9cf705179e47a32ce51f121

              SHA1

              757fc377e0198cae813c99f4d63e29d2a82ec1ec

              SHA256

              cf69cc666c1919e86261080d13dedb0301387c99f3360b674e211bce4071c80c

              SHA512

              5e667ce8238d0c2b6453b3f34757083cda67834c121ac5726e13bcd7689add07d410b67f5227bb9f9e79f6540e8579ff82e95323243905f825c9d7cf8a05cc1b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              47605a4dda32c9dff09a9ca441417339

              SHA1

              4f68c895c35b0dc36257fc8251e70b968c560b62

              SHA256

              e6254c2bc9846a76a4567ab91b6eae76e937307ff9301b65d577ffe6e15fe40a

              SHA512

              b6823b6e794a2fe3e4c4ecfb3f0d61a54821de7feb4f9e3e7fd463e7fbb5e6848f59865b487dafebeac431e4f4db81ef56836d94cac67da39852c566ed34a885

            • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe

              Filesize

              5.2MB

              MD5

              0b119327f1046d6917d7018312ac8e32

              SHA1

              3562ca03b61381ba727d8dac8da7bd24647eb9fc

              SHA256

              8adadd0edb3da0a3bebce706c8f8acd4a07c77abdf7e66c712fb61189a5c81ed

              SHA512

              dc087ba8e9603533bc780906b34f350728bda86c980e47fa9eaa1bf77baf4c4df75af514135665f99f99e4d475ed512a415ed756b30bae39e29813ca49ae3391

            • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe

              Filesize

              227KB

              MD5

              224f803df5b876b23c002f19f74aafac

              SHA1

              6b265b9921fed98a4d3b9a8e72f26914ed154de8

              SHA256

              f8d8aa95aa4205ac48cf654af602563bef92848b92129b07c5f402816d3d04dc

              SHA512

              2df0cd2db55fce534ac6b65afacc121c21b5c105d24d2c6c036b5225e86e97833b2281f205b1435e2c1800ddeeb0f597d0a0fdf83887421259043402487c43b2

            • C:\Users\Admin\AppData\Local\Temp\Server.exe

              Filesize

              71KB

              MD5

              f9b08bd21b40a938122b479095b7c70c

              SHA1

              eb925e3927b83c20d8d24bdab2e587c10d6ac8cd

              SHA256

              c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8

              SHA512

              fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\VCRUNTIME140.dll

              Filesize

              87KB

              MD5

              0e675d4a7a5b7ccd69013386793f68eb

              SHA1

              6e5821ddd8fea6681bda4448816f39984a33596b

              SHA256

              bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

              SHA512

              cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\_ctypes.pyd

              Filesize

              129KB

              MD5

              2f21f50d2252e3083555a724ca57b71e

              SHA1

              49ec351d569a466284b8cc55ee9aeaf3fbf20099

              SHA256

              09887f07f4316057d3c87e3a907c2235dc6547e54ed4f5f9125f99e547d58bce

              SHA512

              e71ff1e63105f51a4516498cd09f8156d7208758c5dc9a74e7654844e5cefc6e84f8fe98a1f1bd7a459a98965fbe913cb5edb552fffa1e33dfda709f918dddeb

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\_hashlib.pyd

              Filesize

              38KB

              MD5

              c3b19ad5381b9832e313a448de7c5210

              SHA1

              51777d53e1ea5592efede1ed349418345b55f367

              SHA256

              bdf4a536f783958357d2e0055debdc3cf7790ee28beb286452eec0354a346bdc

              SHA512

              7f8d3b79a58612e850d18e8952d14793e974483c688b5daee217baaa83120fd50d1e036ca4a1b59d748b22951744377257d2a8f094a4b4de1f79fecd4bf06afb

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\_socket.pyd

              Filesize

              74KB

              MD5

              d7e7a7592338ce88e131f858a84deec6

              SHA1

              3add8cd9fbbf7f5fa40d8a972d9ac18282dcf357

              SHA256

              4ba5d0e236711bdcb29ce9c3138406f7321bd00587b6b362b4ace94379cf52d5

              SHA512

              96649296e8ccdc06d6787902185e21020a700436fc7007b2aa6464d0af7f9eb66a4485b3d46461106ac5f1d35403183daa1925e842e7df6f2db9e3e833b18fb4

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\base_library.zip

              Filesize

              766KB

              MD5

              c7f6b1e71737274de654099f1a483896

              SHA1

              6cf5965a8efb64443dc654c6b9953eacb314daca

              SHA256

              d982c24bbc242b3cc0094ee3685fba79297f3893d354293d4c33ccfd431dfb1d

              SHA512

              3b196ecb376f02b900b581d98d347d22d89d34b502a46770493663e48f9d7eee4b42acb16181b441026ae1634638faa14e4ebd814e05ccaf2b965aa2a5b5179c

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\libcrypto-1_1-x64.dll

              Filesize

              2.4MB

              MD5

              022a61849adab67e3a59bcf4d0f1c40b

              SHA1

              fca2e1e8c30767c88f7ab5b42fe2bd9abb644672

              SHA256

              2a57183839c3e9cc4618fb1994c40e47672a8b6daffaa76c5f89cf2542b02c2f

              SHA512

              94ac596181f0887af7bf02a7ce31327ad443bb7fe2d668217953e0f0c782d19296a80de965008118708afd9bda14fd8c78f49785ebf7abcc37d166b692e88246

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\python37.dll

              Filesize

              3.7MB

              MD5

              62125a78b9be5ac58c3b55413f085028

              SHA1

              46c643f70dd3b3e82ab4a5d1bc979946039e35b2

              SHA256

              17c29e6188b022f795092d72a1fb58630a7c723d70ac5bc3990b20cd2eb2a51f

              SHA512

              e63f4aa8fc5cd1569ae401e283bc8e1445859131eb0db76581b941f1085670c549cbc3fedf911a21c1237b0f3f66f62b10c60e88b923fa058f7fafee18dd0fa4

            • C:\Users\Admin\AppData\Local\Temp\_MEI40002\select.pyd

              Filesize

              26KB

              MD5

              c30e5eccf9c62b0b0bc57ed591e16cc0

              SHA1

              24aece32d4f215516ee092ab72471d1e15c3ba24

              SHA256

              56d1a971762a1a56a73bdf64727e416ffa9395b8af4efcd218f5203d744e1268

              SHA512

              3e5c58428d4c166a3d6d3e153b46c4a57cca2e402001932ec90052c4689b7f5ba4c5f122d1a66d282b2a0a0c9916dc5a5b5e5f6dfc952cdb62332ac29cb7b36a

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j2g3wqro.td3.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\Server.exe

              Filesize

              23KB

              MD5

              32fe01ccb93b0233503d0aaaa451f7b2

              SHA1

              58e5a63142150e8fb175dbb4dedea2ce405d7db0

              SHA256

              6988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43

              SHA512

              76945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6

            • C:\Users\Admin\AppData\Roaming\conhost.exe

              Filesize

              37KB

              MD5

              b37dd1a1f0507baf993471ae1b7a314c

              SHA1

              9aff9d71492ffff8d51f8e8d67f5770755899882

              SHA256

              e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc

              SHA512

              ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460

            • memory/324-37-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/324-0-0x00007FFE6E443000-0x00007FFE6E445000-memory.dmp

              Filesize

              8KB

            • memory/324-1-0x0000000000F00000-0x000000000145C000-memory.dmp

              Filesize

              5.4MB

            • memory/324-15-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/436-130-0x0000025879EF0000-0x0000025879F40000-memory.dmp

              Filesize

              320KB

            • memory/436-129-0x0000025879E70000-0x0000025879EE6000-memory.dmp

              Filesize

              472KB

            • memory/436-47-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/436-131-0x0000025879DF0000-0x0000025879E0E000-memory.dmp

              Filesize

              120KB

            • memory/436-186-0x0000025879CD0000-0x0000025879CDA000-memory.dmp

              Filesize

              40KB

            • memory/436-187-0x0000025879E30000-0x0000025879E42000-memory.dmp

              Filesize

              72KB

            • memory/436-25-0x000002585F710000-0x000002585F750000-memory.dmp

              Filesize

              256KB

            • memory/436-227-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1064-80-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/1064-35-0x0000000000390000-0x00000000003A8000-memory.dmp

              Filesize

              96KB

            • memory/1064-34-0x00007FFE6E440000-0x00007FFE6EF01000-memory.dmp

              Filesize

              10.8MB

            • memory/4380-91-0x0000000000B40000-0x0000000000B50000-memory.dmp

              Filesize

              64KB

            • memory/4476-97-0x000001F624DF0000-0x000001F624E12000-memory.dmp

              Filesize

              136KB