Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 18:52

General

  • Target

    Easy Beamer-cleaned.exe

  • Size

    21.4MB

  • MD5

    b04e319c4790ffdfb8439a11c81921d4

  • SHA1

    f97a36195b51f276569cdc4126a84df9291a2c7c

  • SHA256

    21d51ebab060a061134f9ac72f6f4002ecc238e459eecc7bc7c4dd0d9ab17e7f

  • SHA512

    30d337e1dd323dc4544a9a99ba73786fe4dbab926915a66f213804f530df5540576b703517e2e89e76ef9dbe891917425a7689132100ccdd6690ccf986f9f799

  • SSDEEP

    393216:gL/MPnh2WU7c5pIP3cbVH2Pk6QNfghTY9uffSC+npRuaQaOft8pmA7rqFC:gL/2Dw3PsVxlghL3SCA8t8pmA3qFC

Malware Config

Extracted

Family

xworm

C2

192.168.1.45:24471

147.185.221.16:40745

Attributes
  • Install_directory

    %LocalAppData%

Signatures

  • Detect Xworm Payload 10 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs regedit.exe 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Easy Beamer-cleaned.exe
    "C:\Users\Admin\AppData\Local\Temp\Easy Beamer-cleaned.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
      "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
        "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1564
    • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe
      "C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Discord"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1748
    • C:\Users\Admin\AppData\Local\Temp\remote.exe
      "C:\Users\Admin\AppData\Local\Temp\remote.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RegEdit" /tr "C:\Users\Admin\AppData\Roaming\RegEdit.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2736
    • C:\Users\Admin\AppData\Local\Temp\miner.exe
      "C:\Users\Admin\AppData\Local\Temp\miner.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1288
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:932
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1924
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Users\Admin\Microsoft\svchost.exe
          C:\Users\Admin\Microsoft\svchost.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\system32\cmd.exe
            "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2480
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2684
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
              6⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1100
          • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
            5⤵
            • Executes dropped EXE
            PID:2016
            • C:\Windows\System32\conhost.exe
              "C:\Windows\System32\conhost.exe" "bchbxplvojdk"
              6⤵
              • Loads dropped DLL
              PID:2000
              • C:\Windows\System32\cmd.exe
                "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                7⤵
                  PID:2700
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                    8⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2312
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                    8⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:824
                • C:\Users\Admin\Microsoft\svchost.exe
                  "C:\Users\Admin\Microsoft\svchost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2184
                  • C:\Windows\system32\cmd.exe
                    "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                    8⤵
                      PID:1580
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                        9⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1792
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                        9⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2420
        • C:\Users\Admin\AppData\Local\Temp\Built.exe
          "C:\Users\Admin\AppData\Local\Temp\Built.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Users\Admin\AppData\Local\Temp\Built.exe
            "C:\Users\Admin\AppData\Local\Temp\Built.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: GetForegroundWindowSpam
            PID:524
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {6FF79261-2ED4-4735-81F3-1EC8F4C27971} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
        1⤵
          PID:780
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1428
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1252
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1772
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1992
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:932

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe

          Filesize

          51KB

          MD5

          f04571c3db7b42232744d0a53901a04c

          SHA1

          4ad20bc7b0c5b1078e9cdbbfefe7f6f9e953f106

          SHA256

          851cbcd590bc4ece6da8c5e31a71bd5c828ca0c8e908d84faa83a72e73e515cd

          SHA512

          63ab7353c791c9fe750daaeb18fb8bc992bf14753546943155051e289c52966ea5eb8ff6ffa3a27d27a0fe2fcfdf581b4cae9e72207847cd73bdf191b08d3c15

        • C:\Users\Admin\AppData\Local\Temp\_MEI10482\python310.dll

          Filesize

          1.4MB

          MD5

          3f782cf7874b03c1d20ed90d370f4329

          SHA1

          08a2b4a21092321de1dcad1bb2afb660b0fa7749

          SHA256

          2a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6

          SHA512

          950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857

        • C:\Users\Admin\AppData\Local\Temp\_MEI24642\api-ms-win-core-file-l2-1-0.dll

          Filesize

          18KB

          MD5

          bfffa7117fd9b1622c66d949bac3f1d7

          SHA1

          402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

          SHA256

          1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

          SHA512

          b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

        • C:\Users\Admin\AppData\Local\Temp\_MEI24642\python313.dll

          Filesize

          1.8MB

          MD5

          d99ac8bac1343105b642295397ca2ffc

          SHA1

          93fd73c1fb9ee99ddc66d38885a657cf81f62836

          SHA256

          9116e56cedeb1c4ae82b4bde560f2fe0b83a16764865012cbf5501673d3c5536

          SHA512

          89d30bc84978daf469008ffc347cbd3e189f1df2c1a302dedfc2b700267cc28c671c7c35b5e95ba29a300e7fda75ccfc720d2173ea6db6eb69978772c0b8339f

        • C:\Users\Admin\AppData\Local\Temp\_MEI24642\ucrtbase.dll

          Filesize

          992KB

          MD5

          0e0bac3d1dcc1833eae4e3e4cf83c4ef

          SHA1

          4189f4459c54e69c6d3155a82524bda7549a75a6

          SHA256

          8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

          SHA512

          a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

        • C:\Users\Admin\AppData\Local\Temp\miner.exe

          Filesize

          2.9MB

          MD5

          5559a84abe3f1308a34521edb663ab63

          SHA1

          25bae0e25411e0f59bfb4ed2db004cffba1fd9b9

          SHA256

          35f6d9d2b93574bd9c90e3a15a738fb161a42bdd58b4247ef31ecbeb117d6c40

          SHA512

          850ab553b01b4a27d9843492050bd5996f9988fe1a12bc07c8d37e63b6bc734bd4da9bd6d8b092318d9f751d9e9f47a7f332812f4de79e942e5377542b909371

        • C:\Users\Admin\AppData\Local\Temp\remote.exe

          Filesize

          62KB

          MD5

          24ff3baf7db43417842281fc5128d220

          SHA1

          c86fb912ab11d05d2d1d10de21f60504065b2f0f

          SHA256

          307a1318066e374d97c97d3c8f6bc306800463c632871ca472481733b19d4260

          SHA512

          1ed457dc2c8efe8aff76312dab73ae582b8bfea39e9f16d3adce45281ee65c9a10ed9f10b3470a4ada8ce87ab1236134748a2e83e837c0281a9452e19affe593

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R1OL3M4LNY5RAYRHL0SF.temp

          Filesize

          7KB

          MD5

          d8721ffc27379483222a64aabb7f6f65

          SHA1

          f4742306187de87ec84f79c72eab963db8e90c8c

          SHA256

          059daae3eecbfa5ba8cc1bb0196f5e145d4f52266129aa9c30a209349d8a4e33

          SHA512

          2e7bbb2527dde2ea1d64568878c65b24d38d4c0820181a674e5bdea8dda94526706457ae9febee85d9db963019cf440ed4409bed9558427837a74b7431079087

        • \Users\Admin\AppData\Local\Temp\Built.exe

          Filesize

          5.9MB

          MD5

          eab12405bd1b374b31006c5856c95ada

          SHA1

          e6ade755915b2559c37bbb7df68fa3e03a7d710e

          SHA256

          94bbee749a9be2e19a8ecf597ae5829cb718ab1a5cd601428e9b3f1ddbff56c2

          SHA512

          a196c4c84decd0c9a00f4d5eb3f4db28a6ff80d81eb02f7ea59d9a509c9360b4628a9323849da7f878dc9f362a28320ac5cedd8ed0245af0b9a0c2f6835adf20

        • \Users\Admin\AppData\Local\Temp\Kyle Grabber.exe

          Filesize

          18.5MB

          MD5

          049ed2569a2f0dab7e8d0ba4160a9c7f

          SHA1

          a0f6217dc88d1aeffdfc33e3a797465fbdaef6f3

          SHA256

          2cae0e502d0073849276fcb5ead53af32db7fab402e18fe193204b84e1858db8

          SHA512

          b0b7ffb7a5a9ebe147ce8dd1a739169edac333b14a5ce7e2ea54dd5bfa39fb3b9a5165e47dd108bdceb68e8a76662a85880453c22c777bcc483df4d9083e69b6

        • \Users\Admin\AppData\Local\Temp\_MEI24642\api-ms-win-core-file-l1-2-0.dll

          Filesize

          21KB

          MD5

          1c58526d681efe507deb8f1935c75487

          SHA1

          0e6d328faf3563f2aae029bc5f2272fb7a742672

          SHA256

          ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

          SHA512

          8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

        • \Users\Admin\AppData\Local\Temp\_MEI24642\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          21KB

          MD5

          724223109e49cb01d61d63a8be926b8f

          SHA1

          072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

          SHA256

          4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

          SHA512

          19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

        • \Users\Admin\AppData\Local\Temp\_MEI24642\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          21KB

          MD5

          517eb9e2cb671ae49f99173d7f7ce43f

          SHA1

          4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

          SHA256

          57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

          SHA512

          492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

        • \Users\Admin\AppData\Local\Temp\_MEI24642\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          21KB

          MD5

          d12403ee11359259ba2b0706e5e5111c

          SHA1

          03cc7827a30fd1dee38665c0cc993b4b533ac138

          SHA256

          f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

          SHA512

          9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

        • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe

          Filesize

          41KB

          MD5

          7df43888303d0bce2d40cb808f3c5e98

          SHA1

          3441037c61e828845663ec34520df5bf84460d53

          SHA256

          bb7d737aa191414613e284f58aacd73772f59a5b78520896d70d12be24e253d3

          SHA512

          490c90fd8c5c4f86b42cc6436a44c9e9e7614c54a25b148418740914bb6dcd9d1924be017d33c8395092766245fdef13d65b8b07668b8b2446b4057cff93e8b0

        • memory/524-223-0x000007FEF23E0000-0x000007FEF2846000-memory.dmp

          Filesize

          4.4MB

        • memory/524-175-0x000007FEF23E0000-0x000007FEF2846000-memory.dmp

          Filesize

          4.4MB

        • memory/796-84-0x0000000000240000-0x0000000000256000-memory.dmp

          Filesize

          88KB

        • memory/932-286-0x0000000000B90000-0x0000000000BA4000-memory.dmp

          Filesize

          80KB

        • memory/932-203-0x000000001B370000-0x000000001B652000-memory.dmp

          Filesize

          2.9MB

        • memory/1164-188-0x0000000001F30000-0x0000000001F38000-memory.dmp

          Filesize

          32KB

        • memory/1164-187-0x000000001B330000-0x000000001B612000-memory.dmp

          Filesize

          2.9MB

        • memory/1240-173-0x000000001BE40000-0x000000001C064000-memory.dmp

          Filesize

          2.1MB

        • memory/1252-255-0x00000000001A0000-0x00000000001B4000-memory.dmp

          Filesize

          80KB

        • memory/1428-254-0x0000000000A90000-0x0000000000AA6000-memory.dmp

          Filesize

          88KB

        • memory/1536-204-0x00000000025A0000-0x00000000025A8000-memory.dmp

          Filesize

          32KB

        • memory/1564-172-0x000007FEF2850000-0x000007FEF2EB3000-memory.dmp

          Filesize

          6.4MB

        • memory/1772-261-0x0000000000DA0000-0x0000000000DB6000-memory.dmp

          Filesize

          88KB

        • memory/1924-285-0x00000000011E0000-0x00000000011F6000-memory.dmp

          Filesize

          88KB

        • memory/1992-260-0x0000000000290000-0x00000000002A4000-memory.dmp

          Filesize

          80KB

        • memory/2000-245-0x0000000000060000-0x0000000000067000-memory.dmp

          Filesize

          28KB

        • memory/2000-246-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/2844-87-0x00000000013B0000-0x00000000013C4000-memory.dmp

          Filesize

          80KB

        • memory/2844-218-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

          Filesize

          9.9MB

        • memory/2844-85-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

          Filesize

          9.9MB

        • memory/3052-0-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

          Filesize

          4KB

        • memory/3052-212-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

          Filesize

          9.9MB

        • memory/3052-1-0x0000000001070000-0x00000000025D8000-memory.dmp

          Filesize

          21.4MB

        • memory/3052-2-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmp

          Filesize

          9.9MB

        • memory/3052-176-0x000007FEF5EF3000-0x000007FEF5EF4000-memory.dmp

          Filesize

          4KB