Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 07:58

General

  • Target

    Easy Beamer.exe

  • Size

    21.4MB

  • MD5

    567921e739483e54687d9ac74909638c

  • SHA1

    481ec73e0efdabaa84dee70e157408169bf1dea9

  • SHA256

    dd26a2cb10b30cdb2c9bc09459d691db5e0cd059cc137c6496b0184fd4428744

  • SHA512

    d0ee516498cae6a6616fe6a33f2e793d2c264b6789ae39ca150fc175befe80907a93e314ae27e6abc253fd02775fd995327d617f48faf7e44fa41cd468d378ac

  • SSDEEP

    393216:KL/MPnh2WU7c5pIP3cbVH2Pk6QNfghTY9uffSC+npRuaQaOft8pmA7rqFC:KL/2Dw3PsVxlghL3SCA8t8pmA3qFC

Malware Config

Extracted

Family

xworm

C2

192.168.1.45:24471

147.185.221.16:40745

Attributes
  • Install_directory

    %LocalAppData%

Signatures

  • Detect Xworm Payload 10 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs regedit.exe 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Easy Beamer.exe
    "C:\Users\Admin\AppData\Local\Temp\Easy Beamer.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
      "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
        "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1156
    • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe
      "C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Discord"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2084
    • C:\Users\Admin\AppData\Local\Temp\remote.exe
      "C:\Users\Admin\AppData\Local\Temp\remote.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2292
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RegEdit" /tr "C:\Users\Admin\AppData\Roaming\RegEdit.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2772
    • C:\Users\Admin\AppData\Local\Temp\miner.exe
      "C:\Users\Admin\AppData\Local\Temp\miner.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:264
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2420
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1860
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2556
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Users\Admin\Microsoft\svchost.exe
          C:\Users\Admin\Microsoft\svchost.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
          • C:\Windows\system32\cmd.exe
            "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
            5⤵
              PID:2316
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2452
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2168
            • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
              5⤵
              • Executes dropped EXE
              PID:2076
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "bchbxplvojdk"
                6⤵
                • Loads dropped DLL
                PID:2040
                • C:\Windows\System32\cmd.exe
                  "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                  7⤵
                    PID:2252
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                      8⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:316
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                      8⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1484
                  • C:\Users\Admin\Microsoft\svchost.exe
                    "C:\Users\Admin\Microsoft\svchost.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1156
                    • C:\Windows\system32\cmd.exe
                      "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                      8⤵
                        PID:2272
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                          9⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1728
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                          9⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3040
          • C:\Users\Admin\AppData\Local\Temp\Built.exe
            "C:\Users\Admin\AppData\Local\Temp\Built.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Users\Admin\AppData\Local\Temp\Built.exe
              "C:\Users\Admin\AppData\Local\Temp\Built.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2880
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {A5E5387C-4763-445F-8371-593CB381BF41} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1932
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1628
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:832
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:2856
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:764
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1736

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe

          Filesize

          51KB

          MD5

          f04571c3db7b42232744d0a53901a04c

          SHA1

          4ad20bc7b0c5b1078e9cdbbfefe7f6f9e953f106

          SHA256

          851cbcd590bc4ece6da8c5e31a71bd5c828ca0c8e908d84faa83a72e73e515cd

          SHA512

          63ab7353c791c9fe750daaeb18fb8bc992bf14753546943155051e289c52966ea5eb8ff6ffa3a27d27a0fe2fcfdf581b4cae9e72207847cd73bdf191b08d3c15

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\api-ms-win-core-file-l1-2-0.dll

          Filesize

          21KB

          MD5

          1c58526d681efe507deb8f1935c75487

          SHA1

          0e6d328faf3563f2aae029bc5f2272fb7a742672

          SHA256

          ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

          SHA512

          8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          21KB

          MD5

          724223109e49cb01d61d63a8be926b8f

          SHA1

          072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

          SHA256

          4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

          SHA512

          19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          21KB

          MD5

          517eb9e2cb671ae49f99173d7f7ce43f

          SHA1

          4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

          SHA256

          57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

          SHA512

          492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          21KB

          MD5

          d12403ee11359259ba2b0706e5e5111c

          SHA1

          03cc7827a30fd1dee38665c0cc993b4b533ac138

          SHA256

          f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

          SHA512

          9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\python313.dll

          Filesize

          1.8MB

          MD5

          d99ac8bac1343105b642295397ca2ffc

          SHA1

          93fd73c1fb9ee99ddc66d38885a657cf81f62836

          SHA256

          9116e56cedeb1c4ae82b4bde560f2fe0b83a16764865012cbf5501673d3c5536

          SHA512

          89d30bc84978daf469008ffc347cbd3e189f1df2c1a302dedfc2b700267cc28c671c7c35b5e95ba29a300e7fda75ccfc720d2173ea6db6eb69978772c0b8339f

        • C:\Users\Admin\AppData\Local\Temp\_MEI14842\ucrtbase.dll

          Filesize

          992KB

          MD5

          0e0bac3d1dcc1833eae4e3e4cf83c4ef

          SHA1

          4189f4459c54e69c6d3155a82524bda7549a75a6

          SHA256

          8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

          SHA512

          a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

        • C:\Users\Admin\AppData\Local\Temp\miner.exe

          Filesize

          2.9MB

          MD5

          5559a84abe3f1308a34521edb663ab63

          SHA1

          25bae0e25411e0f59bfb4ed2db004cffba1fd9b9

          SHA256

          35f6d9d2b93574bd9c90e3a15a738fb161a42bdd58b4247ef31ecbeb117d6c40

          SHA512

          850ab553b01b4a27d9843492050bd5996f9988fe1a12bc07c8d37e63b6bc734bd4da9bd6d8b092318d9f751d9e9f47a7f332812f4de79e942e5377542b909371

        • C:\Users\Admin\AppData\Local\Temp\remote.exe

          Filesize

          62KB

          MD5

          24ff3baf7db43417842281fc5128d220

          SHA1

          c86fb912ab11d05d2d1d10de21f60504065b2f0f

          SHA256

          307a1318066e374d97c97d3c8f6bc306800463c632871ca472481733b19d4260

          SHA512

          1ed457dc2c8efe8aff76312dab73ae582b8bfea39e9f16d3adce45281ee65c9a10ed9f10b3470a4ada8ce87ab1236134748a2e83e837c0281a9452e19affe593

        • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe

          Filesize

          41KB

          MD5

          7df43888303d0bce2d40cb808f3c5e98

          SHA1

          3441037c61e828845663ec34520df5bf84460d53

          SHA256

          bb7d737aa191414613e284f58aacd73772f59a5b78520896d70d12be24e253d3

          SHA512

          490c90fd8c5c4f86b42cc6436a44c9e9e7614c54a25b148418740914bb6dcd9d1924be017d33c8395092766245fdef13d65b8b07668b8b2446b4057cff93e8b0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          4a0a58313f6d128421baaba161af9494

          SHA1

          8bbff88e893d6cb0415d39a6010ee4871f498ce7

          SHA256

          abf4f70a76c50f01f5e99cc989305057fea0df7819967cdb95aa35ee2612299a

          SHA512

          feb3aa7379e3958e8e4e5d743f8558b39c6d4e7777d137e73bb9cf0764275169476f4700900b7a1eec037342bc26b5cd718d1b1de142500ceaeff3aa880e8fbd

        • \Users\Admin\AppData\Local\Temp\Built.exe

          Filesize

          5.9MB

          MD5

          eab12405bd1b374b31006c5856c95ada

          SHA1

          e6ade755915b2559c37bbb7df68fa3e03a7d710e

          SHA256

          94bbee749a9be2e19a8ecf597ae5829cb718ab1a5cd601428e9b3f1ddbff56c2

          SHA512

          a196c4c84decd0c9a00f4d5eb3f4db28a6ff80d81eb02f7ea59d9a509c9360b4628a9323849da7f878dc9f362a28320ac5cedd8ed0245af0b9a0c2f6835adf20

        • \Users\Admin\AppData\Local\Temp\Kyle Grabber.exe

          Filesize

          18.5MB

          MD5

          049ed2569a2f0dab7e8d0ba4160a9c7f

          SHA1

          a0f6217dc88d1aeffdfc33e3a797465fbdaef6f3

          SHA256

          2cae0e502d0073849276fcb5ead53af32db7fab402e18fe193204b84e1858db8

          SHA512

          b0b7ffb7a5a9ebe147ce8dd1a739169edac333b14a5ce7e2ea54dd5bfa39fb3b9a5165e47dd108bdceb68e8a76662a85880453c22c777bcc483df4d9083e69b6

        • \Users\Admin\AppData\Local\Temp\_MEI14842\api-ms-win-core-file-l2-1-0.dll

          Filesize

          18KB

          MD5

          bfffa7117fd9b1622c66d949bac3f1d7

          SHA1

          402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

          SHA256

          1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

          SHA512

          b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

        • \Users\Admin\AppData\Local\Temp\_MEI17122\python310.dll

          Filesize

          1.4MB

          MD5

          3f782cf7874b03c1d20ed90d370f4329

          SHA1

          08a2b4a21092321de1dcad1bb2afb660b0fa7749

          SHA256

          2a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6

          SHA512

          950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857

        • memory/264-158-0x000000001BDC0000-0x000000001BFE4000-memory.dmp

          Filesize

          2.1MB

        • memory/764-401-0x0000000000EB0000-0x0000000000EC6000-memory.dmp

          Filesize

          88KB

        • memory/832-329-0x0000000000060000-0x0000000000074000-memory.dmp

          Filesize

          80KB

        • memory/1156-175-0x000007FEEEFE0000-0x000007FEEF643000-memory.dmp

          Filesize

          6.4MB

        • memory/1628-327-0x00000000009D0000-0x00000000009E6000-memory.dmp

          Filesize

          88KB

        • memory/1696-376-0x00000000000E0000-0x00000000000F4000-memory.dmp

          Filesize

          80KB

        • memory/1736-400-0x0000000000020000-0x0000000000034000-memory.dmp

          Filesize

          80KB

        • memory/1860-198-0x000000001B2F0000-0x000000001B5D2000-memory.dmp

          Filesize

          2.9MB

        • memory/1860-204-0x00000000022E0000-0x00000000022E8000-memory.dmp

          Filesize

          32KB

        • memory/2028-176-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

          Filesize

          4KB

        • memory/2028-215-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2028-3-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2028-222-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2028-1-0x0000000000AC0000-0x0000000002028000-memory.dmp

          Filesize

          21.4MB

        • memory/2028-0-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

          Filesize

          4KB

        • memory/2040-349-0x0000000000180000-0x0000000000186000-memory.dmp

          Filesize

          24KB

        • memory/2040-348-0x0000000000060000-0x0000000000067000-memory.dmp

          Filesize

          28KB

        • memory/2168-341-0x0000000002550000-0x0000000002558000-memory.dmp

          Filesize

          32KB

        • memory/2352-187-0x000000001B270000-0x000000001B552000-memory.dmp

          Filesize

          2.9MB

        • memory/2420-188-0x0000000002420000-0x0000000002428000-memory.dmp

          Filesize

          32KB

        • memory/2452-335-0x00000000025F0000-0x00000000025F8000-memory.dmp

          Filesize

          32KB

        • memory/2464-216-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2464-22-0x0000000000300000-0x0000000000314000-memory.dmp

          Filesize

          80KB

        • memory/2464-19-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

          Filesize

          9.9MB

        • memory/2856-375-0x00000000003A0000-0x00000000003B6000-memory.dmp

          Filesize

          88KB

        • memory/2876-46-0x0000000000BF0000-0x0000000000C06000-memory.dmp

          Filesize

          88KB

        • memory/2880-221-0x000007FEEF650000-0x000007FEEFAB6000-memory.dmp

          Filesize

          4.4MB

        • memory/2880-173-0x000007FEEF650000-0x000007FEEFAB6000-memory.dmp

          Filesize

          4.4MB