Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2024 19:21

General

  • Target

    EasyBeamer-cleaned.exe

  • Size

    21.4MB

  • MD5

    b04e319c4790ffdfb8439a11c81921d4

  • SHA1

    f97a36195b51f276569cdc4126a84df9291a2c7c

  • SHA256

    21d51ebab060a061134f9ac72f6f4002ecc238e459eecc7bc7c4dd0d9ab17e7f

  • SHA512

    30d337e1dd323dc4544a9a99ba73786fe4dbab926915a66f213804f530df5540576b703517e2e89e76ef9dbe891917425a7689132100ccdd6690ccf986f9f799

  • SSDEEP

    393216:gL/MPnh2WU7c5pIP3cbVH2Pk6QNfghTY9uffSC+npRuaQaOft8pmA7rqFC:gL/2Dw3PsVxlghL3SCA8t8pmA3qFC

Malware Config

Extracted

Family

xworm

C2

192.168.1.45:24471

147.185.221.16:40745

Attributes
  • Install_directory

    %LocalAppData%

Signatures

  • Detect Xworm Payload 10 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 8 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs regedit.exe 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\EasyBeamer-cleaned.exe
    "C:\Users\Admin\AppData\Local\Temp\EasyBeamer-cleaned.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
      "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe
        "C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1972
    • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe
      "C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Discord"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3056
    • C:\Users\Admin\AppData\Local\Temp\remote.exe
      "C:\Users\Admin\AppData\Local\Temp\remote.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:648
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'remote.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegEdit.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RegEdit" /tr "C:\Users\Admin\AppData\Roaming\RegEdit.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2244
    • C:\Users\Admin\AppData\Local\Temp\miner.exe
      "C:\Users\Admin\AppData\Local\Temp\miner.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2588
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1872
      • C:\Windows\system32\cmd.exe
        "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr "C:\Users\Admin\Microsoft\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2272
      • C:\Windows\system32\cmd.exe
        "cmd" cmd /c "C:\Users\Admin\Microsoft\svchost.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Users\Admin\Microsoft\svchost.exe
          C:\Users\Admin\Microsoft\svchost.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1088
          • C:\Windows\system32\cmd.exe
            "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
            5⤵
              PID:1992
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1864
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1812
            • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
              5⤵
              • Executes dropped EXE
              PID:2508
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "bchbxplvojdk"
                6⤵
                • Loads dropped DLL
                PID:496
                • C:\Windows\System32\cmd.exe
                  "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                  7⤵
                    PID:1708
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                      8⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2972
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                      8⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1012
                  • C:\Users\Admin\Microsoft\svchost.exe
                    "C:\Users\Admin\Microsoft\svchost.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1992
                    • C:\Windows\system32\cmd.exe
                      "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                      8⤵
                        PID:1320
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                          9⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1340
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                          9⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2040
          • C:\Users\Admin\AppData\Local\Temp\Built.exe
            "C:\Users\Admin\AppData\Local\Temp\Built.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2456
            • C:\Users\Admin\AppData\Local\Temp\Built.exe
              "C:\Users\Admin\AppData\Local\Temp\Built.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1652
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {6823438C-4B54-4061-83E3-408F49273C65} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:3028
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3024
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:2456
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2792
          • C:\Users\Admin\AppData\Roaming\RegEdit.exe
            C:\Users\Admin\AppData\Roaming\RegEdit.exe
            2⤵
            • Executes dropped EXE
            • Runs regedit.exe
            • Suspicious use of AdjustPrivilegeToken
            PID:2528
          • C:\Users\Admin\AppData\Local\Discord
            C:\Users\Admin\AppData\Local\Discord
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1032

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Built.exe

          Filesize

          5.9MB

          MD5

          eab12405bd1b374b31006c5856c95ada

          SHA1

          e6ade755915b2559c37bbb7df68fa3e03a7d710e

          SHA256

          94bbee749a9be2e19a8ecf597ae5829cb718ab1a5cd601428e9b3f1ddbff56c2

          SHA512

          a196c4c84decd0c9a00f4d5eb3f4db28a6ff80d81eb02f7ea59d9a509c9360b4628a9323849da7f878dc9f362a28320ac5cedd8ed0245af0b9a0c2f6835adf20

        • C:\Users\Admin\AppData\Local\Temp\Essence Rat.exe

          Filesize

          51KB

          MD5

          f04571c3db7b42232744d0a53901a04c

          SHA1

          4ad20bc7b0c5b1078e9cdbbfefe7f6f9e953f106

          SHA256

          851cbcd590bc4ece6da8c5e31a71bd5c828ca0c8e908d84faa83a72e73e515cd

          SHA512

          63ab7353c791c9fe750daaeb18fb8bc992bf14753546943155051e289c52966ea5eb8ff6ffa3a27d27a0fe2fcfdf581b4cae9e72207847cd73bdf191b08d3c15

        • C:\Users\Admin\AppData\Local\Temp\Kyle Grabber.exe

          Filesize

          18.5MB

          MD5

          049ed2569a2f0dab7e8d0ba4160a9c7f

          SHA1

          a0f6217dc88d1aeffdfc33e3a797465fbdaef6f3

          SHA256

          2cae0e502d0073849276fcb5ead53af32db7fab402e18fe193204b84e1858db8

          SHA512

          b0b7ffb7a5a9ebe147ce8dd1a739169edac333b14a5ce7e2ea54dd5bfa39fb3b9a5165e47dd108bdceb68e8a76662a85880453c22c777bcc483df4d9083e69b6

        • C:\Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-file-l1-2-0.dll

          Filesize

          21KB

          MD5

          1c58526d681efe507deb8f1935c75487

          SHA1

          0e6d328faf3563f2aae029bc5f2272fb7a742672

          SHA256

          ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

          SHA512

          8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

        • C:\Users\Admin\AppData\Local\Temp\_MEI23162\python313.dll

          Filesize

          1.8MB

          MD5

          d99ac8bac1343105b642295397ca2ffc

          SHA1

          93fd73c1fb9ee99ddc66d38885a657cf81f62836

          SHA256

          9116e56cedeb1c4ae82b4bde560f2fe0b83a16764865012cbf5501673d3c5536

          SHA512

          89d30bc84978daf469008ffc347cbd3e189f1df2c1a302dedfc2b700267cc28c671c7c35b5e95ba29a300e7fda75ccfc720d2173ea6db6eb69978772c0b8339f

        • C:\Users\Admin\AppData\Local\Temp\remote.exe

          Filesize

          62KB

          MD5

          24ff3baf7db43417842281fc5128d220

          SHA1

          c86fb912ab11d05d2d1d10de21f60504065b2f0f

          SHA256

          307a1318066e374d97c97d3c8f6bc306800463c632871ca472481733b19d4260

          SHA512

          1ed457dc2c8efe8aff76312dab73ae582b8bfea39e9f16d3adce45281ee65c9a10ed9f10b3470a4ada8ce87ab1236134748a2e83e837c0281a9452e19affe593

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          9000b5e699b61ae1cf514ec7ad2df336

          SHA1

          c0540b755ca1adf5329e5e446cb691c69ae3b77d

          SHA256

          82e48c44973d6031d577037c3e9c983817917b6b28ca33067719d4df251d6893

          SHA512

          a853255cf883b5948cca5c8222bb22616c7ab5bd7d23f2134329d14ecacc388ae06a3a644fe0e1d04e05b97a41198c18a41e34b727de6728ed3ae66f6b7042e6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          9d590d4b482b4098ee969aa2f69356a3

          SHA1

          77a576d658109eab24bf2cafba1557adbf0d0ace

          SHA256

          dd915b8c0b723dbbfdda0531471a1bc4a76f0c7a88e47d698fe3f3275ea5be90

          SHA512

          cc8fcd216793f992902d4357b9eb00f86e1d082e5db4d71dd8a1ba87c7e924c1da8e908603e805e8473229b17640b51f6b2646199c989d0b0dd9212a9341e484

        • \Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-file-l2-1-0.dll

          Filesize

          18KB

          MD5

          bfffa7117fd9b1622c66d949bac3f1d7

          SHA1

          402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

          SHA256

          1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

          SHA512

          b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

        • \Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-localization-l1-2-0.dll

          Filesize

          21KB

          MD5

          724223109e49cb01d61d63a8be926b8f

          SHA1

          072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

          SHA256

          4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

          SHA512

          19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

        • \Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-processthreads-l1-1-1.dll

          Filesize

          21KB

          MD5

          517eb9e2cb671ae49f99173d7f7ce43f

          SHA1

          4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

          SHA256

          57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

          SHA512

          492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

        • \Users\Admin\AppData\Local\Temp\_MEI23162\api-ms-win-core-timezone-l1-1-0.dll

          Filesize

          21KB

          MD5

          d12403ee11359259ba2b0706e5e5111c

          SHA1

          03cc7827a30fd1dee38665c0cc993b4b533ac138

          SHA256

          f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

          SHA512

          9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

        • \Users\Admin\AppData\Local\Temp\_MEI23162\ucrtbase.dll

          Filesize

          992KB

          MD5

          0e0bac3d1dcc1833eae4e3e4cf83c4ef

          SHA1

          4189f4459c54e69c6d3155a82524bda7549a75a6

          SHA256

          8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

          SHA512

          a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

        • \Users\Admin\AppData\Local\Temp\_MEI24562\python310.dll

          Filesize

          1.4MB

          MD5

          3f782cf7874b03c1d20ed90d370f4329

          SHA1

          08a2b4a21092321de1dcad1bb2afb660b0fa7749

          SHA256

          2a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6

          SHA512

          950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857

        • \Users\Admin\AppData\Local\Temp\miner.exe

          Filesize

          2.9MB

          MD5

          5559a84abe3f1308a34521edb663ab63

          SHA1

          25bae0e25411e0f59bfb4ed2db004cffba1fd9b9

          SHA256

          35f6d9d2b93574bd9c90e3a15a738fb161a42bdd58b4247ef31ecbeb117d6c40

          SHA512

          850ab553b01b4a27d9843492050bd5996f9988fe1a12bc07c8d37e63b6bc734bd4da9bd6d8b092318d9f751d9e9f47a7f332812f4de79e942e5377542b909371

        • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe

          Filesize

          41KB

          MD5

          7df43888303d0bce2d40cb808f3c5e98

          SHA1

          3441037c61e828845663ec34520df5bf84460d53

          SHA256

          bb7d737aa191414613e284f58aacd73772f59a5b78520896d70d12be24e253d3

          SHA512

          490c90fd8c5c4f86b42cc6436a44c9e9e7614c54a25b148418740914bb6dcd9d1924be017d33c8395092766245fdef13d65b8b07668b8b2446b4057cff93e8b0

        • memory/496-276-0x00000000001E0000-0x00000000001E6000-memory.dmp

          Filesize

          24KB

        • memory/496-275-0x0000000000060000-0x0000000000067000-memory.dmp

          Filesize

          28KB

        • memory/1032-403-0x00000000000D0000-0x00000000000E4000-memory.dmp

          Filesize

          80KB

        • memory/1580-60-0x0000000000930000-0x0000000000946000-memory.dmp

          Filesize

          88KB

        • memory/1652-166-0x000007FEF2350000-0x000007FEF27B6000-memory.dmp

          Filesize

          4.4MB

        • memory/1872-187-0x000000001B610000-0x000000001B8F2000-memory.dmp

          Filesize

          2.9MB

        • memory/1872-188-0x00000000028E0000-0x00000000028E8000-memory.dmp

          Filesize

          32KB

        • memory/1972-175-0x000007FEF1BE0000-0x000007FEF2243000-memory.dmp

          Filesize

          6.4MB

        • memory/2304-216-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2304-15-0x0000000000F80000-0x0000000000F94000-memory.dmp

          Filesize

          80KB

        • memory/2304-222-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2304-264-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2304-38-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2384-2-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2384-215-0x000007FEF5923000-0x000007FEF5924000-memory.dmp

          Filesize

          4KB

        • memory/2384-221-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2384-224-0x000007FEF5920000-0x000007FEF630C000-memory.dmp

          Filesize

          9.9MB

        • memory/2384-1-0x0000000000240000-0x00000000017A8000-memory.dmp

          Filesize

          21.4MB

        • memory/2384-0-0x000007FEF5923000-0x000007FEF5924000-memory.dmp

          Filesize

          4KB

        • memory/2456-376-0x0000000000170000-0x0000000000186000-memory.dmp

          Filesize

          88KB

        • memory/2528-402-0x0000000001260000-0x0000000001276000-memory.dmp

          Filesize

          88KB

        • memory/2588-180-0x000000001B680000-0x000000001B962000-memory.dmp

          Filesize

          2.9MB

        • memory/2588-181-0x0000000002710000-0x0000000002718000-memory.dmp

          Filesize

          32KB

        • memory/2736-173-0x000000001BCF0000-0x000000001BF14000-memory.dmp

          Filesize

          2.1MB

        • memory/2792-375-0x00000000001C0000-0x00000000001D4000-memory.dmp

          Filesize

          80KB

        • memory/3024-254-0x00000000003E0000-0x00000000003F4000-memory.dmp

          Filesize

          80KB

        • memory/3028-252-0x0000000000F60000-0x0000000000F76000-memory.dmp

          Filesize

          88KB