Analysis

  • max time kernel
    900s
  • max time network
    900s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/03/2025, 17:23

General

  • Target

    miner.exe

  • Size

    104KB

  • MD5

    4a9f5b7664e2ebf47aa5fc4240dc8a22

  • SHA1

    d0fc11aab0181df38d193cf8dfd1843fe06c844a

  • SHA256

    5c5374eb9054e48c5ab9c6ef21c2bd228fe2e63eaa0ae83dbdb65dd1a7429369

  • SHA512

    f45224b584b64d4ac32d4e6303ad87b2902ea310ac332ed0a0c7a706df2441eb0ef1f5076fe2716d004e59aa6a8e9e5e5e3a8f012008f05aef05064ad1e1eed6

  • SSDEEP

    192:xjZaDMFEa4ajXPeeZnXwqXTyE1hEjjTyXfan55tfMcePLiZmGhTuRY9SRXiKqiRh:hp4ajGCnXGMsGXfwldJ99Sjvb99Sjv

Malware Config

Extracted

Family

xworm

Mutex

yNحكـX8ٍبAGLWِF6Jo2DiObلٍLZا3ا

Attributes
  • Install_directory

    %Port%

  • install_file

    MicrosoftEdgeUpdateTaskMachineUAC.exe

aes.plain

Signatures

  • Detect Xworm Payload 1 IoCs
  • XMRig Miner payload 6 IoCs
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:960
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:680
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:964
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:428
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
            1⤵
            • Indicator Removal: Clear Windows Event Logs
            PID:752
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:732
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:628
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                1⤵
                  PID:1116
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1124
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                    1⤵
                      PID:1188
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1276
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3180
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1420
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1428
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1552
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1560
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                1⤵
                                  PID:1580
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1596
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:688
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1728
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1772
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1780
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1920
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:1988
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:2008
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:2016
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                    1⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1764
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:2084
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2104
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2220
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2364
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2468
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2480
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2572
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2732
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2788
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2808
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2832
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2852
                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                        1⤵
                                                                          PID:2720
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:3116
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:3220
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                              1⤵
                                                                                PID:3464
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:3564
                                                                                • C:\Users\Admin\AppData\Local\Temp\miner.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\miner.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:5052
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" powershell -Command "Expand-Archive -Path 'C:\Users\Admin\AppData\Roaming\xmrig.zip' -DestinationPath 'C:\Users\Admin\AppData\Roaming\xmrig' -Force"
                                                                                    3⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:1440
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Expand-Archive -Path C:\Users\Admin\AppData\Roaming\xmrig.zip -DestinationPath C:\Users\Admin\AppData\Roaming\xmrig -Force
                                                                                      4⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3268
                                                                                  • C:\Users\Admin\AppData\Roaming\xmrig\xmrig.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\xmrig\xmrig.exe"
                                                                                    3⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3508
                                                                                    • C:\Users\Admin\AppData\Local\Temp\jkzkq4hf.pw1.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\jkzkq4hf.pw1.exe"
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:2316
                                                                                    • C:\Users\Admin\AppData\Local\Temp\auywuvpk.jr1.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\auywuvpk.jr1.exe"
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:928
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                1⤵
                                                                                  PID:3688
                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3960
                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3796
                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                    1⤵
                                                                                      PID:4360
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                        PID:4652
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                        1⤵
                                                                                          PID:64
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                          1⤵
                                                                                            PID:2376
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                            1⤵
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:5028
                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                            1⤵
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            PID:896
                                                                                          • C:\Windows\system32\SppExtComObj.exe
                                                                                            C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4448
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                              1⤵
                                                                                                PID:3020
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                1⤵
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:3548
                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                1⤵
                                                                                                  PID:3320
                                                                                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                  1⤵
                                                                                                  • Suspicious use of UnmapMainImage
                                                                                                  PID:1336
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                  1⤵
                                                                                                    PID:3928
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                    1⤵
                                                                                                      PID:1800
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                      1⤵
                                                                                                        PID:656
                                                                                                      • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                        C:\Windows\System32\WaaSMedicAgent.exe ba9783ffe28e8e1fdcce0398d5ac9f8b 5XSSbKnd/UK3pa+QXsM70A.0.1.0.0.0
                                                                                                        1⤵
                                                                                                          PID:3996
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            2⤵
                                                                                                              PID:4032
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                            1⤵
                                                                                                            • Drops file in Windows directory
                                                                                                            PID:4952
                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                            1⤵
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Enumerates system info in registry
                                                                                                            PID:4724
                                                                                                          • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                            C:\Windows\servicing\TrustedInstaller.exe
                                                                                                            1⤵
                                                                                                              PID:1164
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                              1⤵
                                                                                                                PID:4516
                                                                                                              • C:\Windows\System32\mousocoreworker.exe
                                                                                                                C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Checks processor information in registry
                                                                                                                • Enumerates system info in registry
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:232
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:2232
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                  1⤵
                                                                                                                    PID:4344

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                    Filesize

                                                                                                                    340B

                                                                                                                    MD5

                                                                                                                    09bba13a979206e7af8a5ae31dd0c9c7

                                                                                                                    SHA1

                                                                                                                    b15658ced94fa8ef71b2f155026103f04007a20f

                                                                                                                    SHA256

                                                                                                                    5ee5474da83a48dd03da714aa14206a9c40051be86d200ed4012598d82c4cf7a

                                                                                                                    SHA512

                                                                                                                    802c6a034cb5b8de9e3977d2884ad1e08ed1a73a64225bf8157af7cb105bee795e3671f35d7d3fad47f15542fe5ba142e3531fee66fe819de68a539170e9c9f8

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                    Filesize

                                                                                                                    404B

                                                                                                                    MD5

                                                                                                                    8153c4381862f8a740c1e9f1dc422bfe

                                                                                                                    SHA1

                                                                                                                    b6c1eb67f144535c810f924c9dd48ae088c60b22

                                                                                                                    SHA256

                                                                                                                    42e01db1454ba295d9a215791d6a0714fd61f4ee176bc335a657df4e99d7e9ca

                                                                                                                    SHA512

                                                                                                                    88d14436cd2b004fdacd19442399b95b2c902a876401c40029cb5b6d4632843d7c7cddfdaaf62d61b79f892dcb2d565ba1c1ff688c5352cd1b500beba34042d4

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                    Filesize

                                                                                                                    330B

                                                                                                                    MD5

                                                                                                                    9e331577bdd657c194f7f5af45d8243e

                                                                                                                    SHA1

                                                                                                                    6a493f741d3ee2263094269f2071f54a0bc94c83

                                                                                                                    SHA256

                                                                                                                    12c65653b4e00703a0a6a52b0a1df21a09570157e27eb47a9919853825b0305a

                                                                                                                    SHA512

                                                                                                                    f50fb69b8e8e207fb3ea38e292718546c84b10af44318362439f34ebe2fcf92ea52540923f28265c2ecb04c4a137b5f71eb33046ab443d4c770b91732f497e2f

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

                                                                                                                    Filesize

                                                                                                                    482B

                                                                                                                    MD5

                                                                                                                    2376ac99f04405b4d5fe8c55fb4105fe

                                                                                                                    SHA1

                                                                                                                    eab55df736dfc3031d33e370ae851c6ba2534d07

                                                                                                                    SHA256

                                                                                                                    6332299c3159a8e21a1ddf9a1c90b113cc1746b00cb549d0a7ddfebbaaed37af

                                                                                                                    SHA512

                                                                                                                    a6bcad66ad4da306a0d64876758f5318b89f741e04d723d53c44c81142120c3c193c785d2ebf29b7980ee1a17630e0932d37a2a0b99149187e5982590f2f2258

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

                                                                                                                    Filesize

                                                                                                                    480B

                                                                                                                    MD5

                                                                                                                    bc0295746348785bd19b49851dfbb583

                                                                                                                    SHA1

                                                                                                                    8335e8228267cb010743db57dba6536716596ed1

                                                                                                                    SHA256

                                                                                                                    07246ade95ae6362aacdc07f8d78a258f2e6460034da1c0847318a34483e9143

                                                                                                                    SHA512

                                                                                                                    beb17fdad04e305d6e8114c4bc53ee3317460ac1466b7b536a8dd3ce8a10858faf253f7f472db8f9db6c68f163a56420ebafa6bca6c5948fd3c8a1279ac8314c

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CA54E0FA212456E1DB00704A97658E

                                                                                                                    Filesize

                                                                                                                    476B

                                                                                                                    MD5

                                                                                                                    7f29d8418532d62b0a9b399028a2d4b3

                                                                                                                    SHA1

                                                                                                                    9d02a18f52385de7f62e645209f6e67e2ded5566

                                                                                                                    SHA256

                                                                                                                    88c87929e43460fb04d177d47b8feef0b8ed73836b6e39a1c0490a4878d2ca27

                                                                                                                    SHA512

                                                                                                                    ed24f66ad16e116242204734742117f6d5af10f59ca52364a5a9bca08bbaa6f6f0a4e1a23da5237c017d65aadc31a0f04c24238e1a1054090c35c5df974fa6dd

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

                                                                                                                    Filesize

                                                                                                                    412B

                                                                                                                    MD5

                                                                                                                    af7f3efd561977b35d93138c3dbab4f4

                                                                                                                    SHA1

                                                                                                                    12f7c9aab9f80f67f3bf703e6ddb04f219c77c33

                                                                                                                    SHA256

                                                                                                                    204f52addd7344932b2da42f3a3bab28cd7976c1af315f09ebaa7e8451d4aac2

                                                                                                                    SHA512

                                                                                                                    15d455a6b5439c3340cf8e678c4fb5f61b9633b317b66a66679ab21a2700d22a51b0e90d77004b4a1bdc39f1d286ecca3a74aeb734ae972aa72ac3debcf4d0b7

                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                    Filesize

                                                                                                                    330B

                                                                                                                    MD5

                                                                                                                    5d8fb9e727c7d2359cfc1b7592b3939b

                                                                                                                    SHA1

                                                                                                                    ee7a9872cc35e9ef0a0f4d4cf799c3cf0219f45b

                                                                                                                    SHA256

                                                                                                                    15c8026cd0a90d4626dee88e1811d128d7767fd2cb08c5c042738b12f3ecf67f

                                                                                                                    SHA512

                                                                                                                    87c1975c96c381c635712121aa7dfad0bd5cd5ee4634ee57b19aef0e6beb6c9608f98e4f6499d67902155ecaf2bba42c85e60ed25a141ecf3b735eae6aaa05ed

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                    Filesize

                                                                                                                    3KB

                                                                                                                    MD5

                                                                                                                    68885a588c3a18af3231775c1ce60817

                                                                                                                    SHA1

                                                                                                                    decf1b996efb13f99861bd3d95eccd1beba975b2

                                                                                                                    SHA256

                                                                                                                    03ef59b8353eae626d77544758a4336849dac47a7afa30668ca67b48efd8d6ed

                                                                                                                    SHA512

                                                                                                                    b07ed2e47ac7850fa22eca8c5584532ab7c3a49f871bc5d4214bf879d5e2a1b1895ae55e7ea792023fcf1f462b8c14ee22d0e1dc993d28fab9c48c328a8f782a

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    64B

                                                                                                                    MD5

                                                                                                                    235a8eb126d835efb2e253459ab8b089

                                                                                                                    SHA1

                                                                                                                    293fbf68e6726a5a230c3a42624c01899e35a89f

                                                                                                                    SHA256

                                                                                                                    5ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686

                                                                                                                    SHA512

                                                                                                                    a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_swkgxgrh.qn3.ps1

                                                                                                                    Filesize

                                                                                                                    60B

                                                                                                                    MD5

                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                    SHA1

                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                    SHA256

                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                    SHA512

                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\auywuvpk.jr1.exe

                                                                                                                    Filesize

                                                                                                                    9.1MB

                                                                                                                    MD5

                                                                                                                    cb166d49ce846727ed70134b589b0142

                                                                                                                    SHA1

                                                                                                                    8f5e1c7792e9580f2b10d7bef6dc7e63ea044688

                                                                                                                    SHA256

                                                                                                                    49da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb

                                                                                                                    SHA512

                                                                                                                    a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jkzkq4hf.pw1.exe

                                                                                                                    Filesize

                                                                                                                    161KB

                                                                                                                    MD5

                                                                                                                    94f1ab3a068f83b32639579ec9c5d025

                                                                                                                    SHA1

                                                                                                                    38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                    SHA256

                                                                                                                    879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                    SHA512

                                                                                                                    44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                  • C:\Users\Admin\AppData\Roaming\xmrig.zip

                                                                                                                    Filesize

                                                                                                                    3.8MB

                                                                                                                    MD5

                                                                                                                    9895805962f3b439c3eb845cd30303c6

                                                                                                                    SHA1

                                                                                                                    d488cfa52f17c60432813e7906ee812e0ae37fec

                                                                                                                    SHA256

                                                                                                                    e30b7057712cdb8760a87b44eb2db03879f4ff54344aaf562e927814b5ce7e5b

                                                                                                                    SHA512

                                                                                                                    ec526ca0cc850d03d220c46f9b592045983c392edc30a5cdee5157fe1ea38711f49a475e566c7e2017956f1aa6b1c64a9a4565a26bd466f5ac679aae728c98ce

                                                                                                                  • C:\Users\Admin\AppData\Roaming\xmrig\xmrig.exe

                                                                                                                    Filesize

                                                                                                                    9.3MB

                                                                                                                    MD5

                                                                                                                    72107c3009343491bdbd5a2bf27e0d17

                                                                                                                    SHA1

                                                                                                                    79ae9dd4ffc65810342c093fb3dd1413a830660d

                                                                                                                    SHA256

                                                                                                                    9af0d7469bffba8aea58c666b94ae68e34373f554ba8a145ec5fcc78baf0e6c6

                                                                                                                    SHA512

                                                                                                                    eab28e887aeb275527f4d4fa9a7ccd69dfaf21d249005eb9c9a9c098ca062cfabed02da2133e84c0b6109fbd4b6358e905199c24cdc9bb41799e63ccfbe3768e

                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    4ac1741ceb19f5a983079b2c5f344f5d

                                                                                                                    SHA1

                                                                                                                    f1ebd93fbade2e035cd59e970787b8042cdd0f3b

                                                                                                                    SHA256

                                                                                                                    7df73f71214cdd2f2d477d6c2c65f6e4c2f5955fc669cde9c583b0ff9553ecdc

                                                                                                                    SHA512

                                                                                                                    583706069a7c0b22926fa22fc7bedcca9d6750d1542a1125b688fbb0595baf6cefc76e7b6e49c1415c782a21d0dd504c78fa36efad5f29f2fd5d69cc45ad8dcd

                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                    SHA1

                                                                                                                    1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                    SHA256

                                                                                                                    8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                    SHA512

                                                                                                                    537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                  • memory/428-114-0x00000155AF3D0000-0x00000155AF3FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/428-115-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/628-130-0x000002360A530000-0x000002360A55B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/628-131-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/632-100-0x0000021CBBA50000-0x0000021CBBA75000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    148KB

                                                                                                                  • memory/632-101-0x0000021CBBA90000-0x0000021CBBABB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/632-102-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/680-106-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/680-105-0x000001B35DAF0000-0x000001B35DB1B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/732-128-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/732-127-0x000001E5136E0000-0x000001E51370B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/752-117-0x000001D4F7920000-0x000001D4F794B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/752-118-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/960-145-0x000001A2012D0000-0x000001A2012FB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/960-146-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/964-110-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/964-109-0x000001D04CC40000-0x000001D04CC6B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1116-134-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1116-133-0x0000021EAE000000-0x0000021EAE02B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1124-137-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1124-136-0x0000015018F80000-0x0000015018FAB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1188-140-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1188-139-0x00000283877C0000-0x00000283877EB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1276-143-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1276-142-0x0000018639780000-0x00000186397AB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1420-151-0x000001D35CB40000-0x000001D35CB6B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1420-152-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1440-69-0x00007FFFC7EE0000-0x00007FFFC89A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/1440-18-0x00007FFFC7EE3000-0x00007FFFC7EE5000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/1440-28-0x000001DA42B60000-0x000001DA42B82000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/1440-29-0x00007FFFC7EE0000-0x00007FFFC89A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/1440-30-0x00007FFFC7EE0000-0x00007FFFC89A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/1440-31-0x00007FFFC7EE0000-0x00007FFFC89A2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/1552-160-0x0000028050470000-0x000002805049B000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/1552-161-0x00007FFFA70D0000-0x00007FFFA70E0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/1560-163-0x000001845A9C0000-0x000001845A9EB000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    172KB

                                                                                                                  • memory/2316-87-0x00007FFFE56C0000-0x00007FFFE577D000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    756KB

                                                                                                                  • memory/2316-86-0x00007FFFE7050000-0x00007FFFE7248000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                  • memory/3268-42-0x0000025FF8C90000-0x0000025FF8C9A000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    40KB

                                                                                                                  • memory/3268-41-0x0000025FF8CA0000-0x0000025FF8CB2000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    72KB

                                                                                                                  • memory/3508-73-0x000001D5D0140000-0x000001D5D0A86000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    9.3MB

                                                                                                                  • memory/3508-74-0x000001D5D0E50000-0x000001D5D0E7C000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    176KB

                                                                                                                  • memory/3508-390-0x000001D5EB490000-0x000001D5EB49E000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    56KB

                                                                                                                  • memory/3508-88-0x000001D5EB2A0000-0x000001D5EBED4000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    12.2MB