Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe
Resource
win10v2004-20240419-en
General
-
Target
7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe
-
Size
4.2MB
-
MD5
b7250436469d05b646b54b00ccb74d7e
-
SHA1
7ad840124e69004c862d0cf3f722b00cbfbbb9d3
-
SHA256
7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780
-
SHA512
599e2a873b14b461c628ef3fb3f9771e11d866ff16012e82fbd614267e4eab268abd0671ad6bca6bcc8a5808e94b5aa1dcbb7ba75c51e78a645f040d60732ba4
-
SSDEEP
98304:tt5Uqm7J/F8CAXFSubtgfzlM87bnHzNLhs5rugOyMhKGiDy7:ttw7JrAVRclM87bnTNTgOywUy7
Malware Config
Signatures
-
LoaderBot executable 3 IoCs
resource yara_rule behavioral1/files/0x0006000000015e6f-42.dat loaderbot behavioral1/memory/2384-45-0x00000000010A0000-0x000000000149E000-memory.dmp loaderbot behavioral1/memory/2384-52-0x00000000062F0000-0x0000000006E65000-memory.dmp loaderbot -
XMRig Miner payload 34 IoCs
resource yara_rule behavioral1/memory/2940-55-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2940-54-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1740-60-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2056-66-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/528-72-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/528-73-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1232-78-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1688-84-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2824-90-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2784-95-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2492-100-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/768-105-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1648-110-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1992-115-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2756-120-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2680-125-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1984-130-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/840-135-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2240-140-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1536-147-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1764-152-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1696-157-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2440-163-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1508-168-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2000-173-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1992-178-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/1704-183-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2672-188-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/3012-193-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2728-198-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2832-204-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2236-209-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2908-214-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2420-220-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url Installer.exe -
Executes dropped EXE 16 IoCs
pid Process 2680 7z.exe 2460 7z.exe 2612 7z.exe 2384 Installer.exe 2940 Driver.exe 1740 Driver.exe 2056 Driver.exe 528 Driver.exe 1232 Driver.exe 1688 Driver.exe 2824 Driver.exe 2784 Driver.exe 2492 Driver.exe 768 Driver.exe 1648 Driver.exe 1992 Driver.exe -
Loads dropped DLL 7 IoCs
pid Process 1960 cmd.exe 2680 7z.exe 1960 cmd.exe 2460 7z.exe 1960 cmd.exe 2612 7z.exe 2384 Installer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\Installer.exe" Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2384 Installer.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe 2384 Installer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 2680 7z.exe Token: 35 2680 7z.exe Token: SeSecurityPrivilege 2680 7z.exe Token: SeSecurityPrivilege 2680 7z.exe Token: SeRestorePrivilege 2460 7z.exe Token: 35 2460 7z.exe Token: SeSecurityPrivilege 2460 7z.exe Token: SeSecurityPrivilege 2460 7z.exe Token: SeRestorePrivilege 2612 7z.exe Token: 35 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeSecurityPrivilege 2612 7z.exe Token: SeDebugPrivilege 2384 Installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1960 2004 7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe 28 PID 2004 wrote to memory of 1960 2004 7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe 28 PID 2004 wrote to memory of 1960 2004 7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe 28 PID 2004 wrote to memory of 1960 2004 7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe 28 PID 1960 wrote to memory of 2016 1960 cmd.exe 30 PID 1960 wrote to memory of 2016 1960 cmd.exe 30 PID 1960 wrote to memory of 2016 1960 cmd.exe 30 PID 1960 wrote to memory of 2680 1960 cmd.exe 31 PID 1960 wrote to memory of 2680 1960 cmd.exe 31 PID 1960 wrote to memory of 2680 1960 cmd.exe 31 PID 1960 wrote to memory of 2460 1960 cmd.exe 32 PID 1960 wrote to memory of 2460 1960 cmd.exe 32 PID 1960 wrote to memory of 2460 1960 cmd.exe 32 PID 1960 wrote to memory of 2612 1960 cmd.exe 33 PID 1960 wrote to memory of 2612 1960 cmd.exe 33 PID 1960 wrote to memory of 2612 1960 cmd.exe 33 PID 1960 wrote to memory of 2560 1960 cmd.exe 34 PID 1960 wrote to memory of 2560 1960 cmd.exe 34 PID 1960 wrote to memory of 2560 1960 cmd.exe 34 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 1960 wrote to memory of 2384 1960 cmd.exe 35 PID 2384 wrote to memory of 2940 2384 Installer.exe 37 PID 2384 wrote to memory of 2940 2384 Installer.exe 37 PID 2384 wrote to memory of 2940 2384 Installer.exe 37 PID 2384 wrote to memory of 2940 2384 Installer.exe 37 PID 2384 wrote to memory of 1740 2384 Installer.exe 39 PID 2384 wrote to memory of 1740 2384 Installer.exe 39 PID 2384 wrote to memory of 1740 2384 Installer.exe 39 PID 2384 wrote to memory of 1740 2384 Installer.exe 39 PID 2384 wrote to memory of 2056 2384 Installer.exe 41 PID 2384 wrote to memory of 2056 2384 Installer.exe 41 PID 2384 wrote to memory of 2056 2384 Installer.exe 41 PID 2384 wrote to memory of 2056 2384 Installer.exe 41 PID 2384 wrote to memory of 528 2384 Installer.exe 43 PID 2384 wrote to memory of 528 2384 Installer.exe 43 PID 2384 wrote to memory of 528 2384 Installer.exe 43 PID 2384 wrote to memory of 528 2384 Installer.exe 43 PID 2384 wrote to memory of 1232 2384 Installer.exe 45 PID 2384 wrote to memory of 1232 2384 Installer.exe 45 PID 2384 wrote to memory of 1232 2384 Installer.exe 45 PID 2384 wrote to memory of 1232 2384 Installer.exe 45 PID 2384 wrote to memory of 1688 2384 Installer.exe 78 PID 2384 wrote to memory of 1688 2384 Installer.exe 78 PID 2384 wrote to memory of 1688 2384 Installer.exe 78 PID 2384 wrote to memory of 1688 2384 Installer.exe 78 PID 2384 wrote to memory of 2824 2384 Installer.exe 121 PID 2384 wrote to memory of 2824 2384 Installer.exe 121 PID 2384 wrote to memory of 2824 2384 Installer.exe 121 PID 2384 wrote to memory of 2824 2384 Installer.exe 121 PID 2384 wrote to memory of 2784 2384 Installer.exe 51 PID 2384 wrote to memory of 2784 2384 Installer.exe 51 PID 2384 wrote to memory of 2784 2384 Installer.exe 51 PID 2384 wrote to memory of 2784 2384 Installer.exe 51 PID 2384 wrote to memory of 2492 2384 Installer.exe 53 PID 2384 wrote to memory of 2492 2384 Installer.exe 53 PID 2384 wrote to memory of 2492 2384 Installer.exe 53 PID 2384 wrote to memory of 2492 2384 Installer.exe 53 PID 2384 wrote to memory of 768 2384 Installer.exe 120 PID 2384 wrote to memory of 768 2384 Installer.exe 120 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2560 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe"C:\Users\Admin\AppData\Local\Temp\7fd525394f449871ea7be96a66ddc1ff6cb498aaaee85549cae392a782670780.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\mode.commode 65,103⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p12151210907486279731870130990 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\system32\attrib.exeattrib +H "Installer.exe"3⤵
- Views/modifies file attributes
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\main\Installer.exe"Installer.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:1740
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:528
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:1232
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:1688
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:2824
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:2784
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:768
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:1648
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2756
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2680
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1984
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:840
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2240
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1536
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1764
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1696
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2440
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1508
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2000
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1992
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1704
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2672
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:3012
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2728
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2832
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2236
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2908
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2420
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2760
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1160
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1820
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2216
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:440
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2732
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2248
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:1928
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2096
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2824
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2992
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2884
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2484
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 4AAVoaf13Do2Jqvf6MT9z7bF1AbfFL5i1b6pLTTWa8t4aj46CBnKFFtSR6xYN9xshV7aQJC51fLe3ErWugFWGZWMMe4j2Ea -p x -k -v=0 --donate-level=0 -t 44⤵PID:2688
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1680312249-1435773240-64242380826936806621002597951367679294583698925-759823186"1⤵PID:1688
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-664011484-1051185128-2145820608-663589971-1857824937-9179087982045841296-779005267"1⤵PID:1648
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1378306476565449380-412341323-670067612573805114429275727-151743843896507298"1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
2.2MB
MD5d39425a0656846d077a08d88c3a1eafd
SHA111543c91ae879a1ee2218989da8b607db8b6ce83
SHA256d07755415a96e885071720b882f91484be8f00dd14d0c04f294f759425eeeeb3
SHA51220b395b137d8fee88d57e02158e5dfb840d0d5b969332c95d6f3d39f9dec7833e2198eea9bbe144da3ec62850aa1efe622ca4b0fa743285381591ccc2c2e24dd
-
Filesize
4.0MB
MD538f702eca36f4991a2ca55a61e72cb2d
SHA1854064e8d9d3724b9913f3ba47628bad8d150268
SHA256b9057ff1f55c599ee6b322de47cad13dc8d74b63a5a322faf565a610846cca6a
SHA512de46d99091ae5e7df2cd6d89d3a38bdd4d7e1bbb55526d123e97a83d7966e91b910040d637af4aac500bb266cbad464947bebc0789b6c66102d50837d100a480
-
Filesize
1.7MB
MD5e28fd981b387bbb881349af3aed72a14
SHA1ccc7321776b8258fae70a199721a2c94b31a0dbd
SHA256c424d7cac793cfbee144add7c081146d6395eb082d85ff2239f923488b36c784
SHA5128af8463a82b7f8cc2bcd47e10d630ad88a1aefa177ca3f444bcfa440eddeb5946468858846ea09fb863a6994caa0baf41bc80b1099d47a38da6f03b60e1510b7
-
Filesize
3.3MB
MD5f818b9273775a3e36a2cec53d77d92aa
SHA11f9a69bc57779cc2ffc5055779f19a89b0590899
SHA2568261f8f25a906439b6a8c87abb58eae50b10f642295559a7cf7563e4584e5bd8
SHA512133fcad998f9f90960e33df7720f35be3ed3fbbba0058ec9ee5c563e8645225f14430fd4b3e503cecd40627701a1600335bcd184b6de133ca092303ab2c5cc1a
-
Filesize
3.3MB
MD5b4f16494a066087384577934692b7dc0
SHA17324629c7bf5a4c39def42892f6297d6fa01aa89
SHA2560cc20065191fd1d64ac99fea586277e1dcb883adf403fc4228deecb9f5d91099
SHA512905c161f897e177ee1951ed25a5b2eb1f77093306bacdebec0d9b7c703f4aec814f5da332525d135bea0df9f52705998e8ced6f81262f1689bdc6fc1dc99b0af
-
Filesize
475B
MD5854e13db0bbb65f40103fd9109e52253
SHA1d6e56d1751641e68527b001d3d946bdc7423297c
SHA2569c6a028767dd856c4aebb824f845f5e53c90b9568c22d87076bda6aa798f31e3
SHA512728a8b7e5a44323606215dc085543408f33decbcc85649f0955730ab82626e184ac4dd2a2a7b085616aca9320cafecbe1c0d88c9d615222c6d264c03afa30dd0
-
Filesize
3.6MB
MD5a88032fe5bc5f51f7801e90df6d2e643
SHA1115e7446a5afe16bd50d1b18e693a08a99648c89
SHA2567273c60e917a722efe90347008e3b5d19573dfbc2dc21fce3c0a062dcb5d77f5
SHA512bce8715cb4cd6ce92b0eda862fb7ba21414847732be88daf55209004ebefccf05ed122ed9cdd22aff45b3c2bd9d179004ba0e59dd6a13800f60fca851feb34ac
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322