Analysis

  • max time kernel
    157s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 02:56

General

  • Target

    fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe

  • Size

    699KB

  • MD5

    bb504aa1e8a618ae1100250b990a0bfe

  • SHA1

    446a7dd6c070cd836f44ea64885e2092aa51e19c

  • SHA256

    fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8

  • SHA512

    ebd509cae43cb74e11ecbc6a37f2425107b3b2145085eb0ff3941ce91c0ad7a4a3771d4863a2ecdcda77c3d6c9087ba271a7edb548e4efb16b47554de9115508

  • SSDEEP

    12288:TmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyF0/9HMeF:TBIGkbxqEcjsWiDxguehC2S7pj

Malware Config

Extracted

Family

darkcomet

Botnet

DoS

C2

127.0.0.1:1604

Mutex

DC_MUTEX-D1GBSEM

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    Vt4jEdLB1t28

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Detect Neshta payload 33 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe
    "C:\Users\Admin\AppData\Local\Temp\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\3582-490\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe
          C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe
          4⤵
          • Modifies firewall policy service
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2732

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

2
T1031

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

8
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE
    Filesize

    278KB

    MD5

    12c29dd57aa69f45ddd2e47620e0a8d9

    SHA1

    ba297aa3fe237ca916257bc46370b360a2db2223

    SHA256

    22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880

    SHA512

    255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE
    Filesize

    179KB

    MD5

    6eb5faf8c8634b7286d08081e0c8837b

    SHA1

    e6d529c98beb26a4dcea5eb343d8e58a1a803909

    SHA256

    a72941f00bede95f64219f77d20acbfb3f60f783fbd0fe4dae8cbcb8edea673e

    SHA512

    2528b4ac550c62e6ba884670c0f60dfb8d446875e01d2d93e5cbe9c7014a556b81ae98d7c23805070f18434fb48c8ee3766267e0c3e6856c0729621cec554dd7

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE
    Filesize

    281KB

    MD5

    716d1330048d881ff40aecf334eb295a

    SHA1

    6d70ff496f57a059c869752f26004837aa9da2a3

    SHA256

    c1f6495c23d9dc1bf1011388577b2e0ad1f19d376e79d575fb32905e0c9865f5

    SHA512

    87f7c3226a495f0ea7f8b49b684b91247e75ed4ac66153d4668a7aa1277778bac5e2045dbf990d9ae830b460aa79d4422d48fa3e58e35c904c89e1519c57a0fd

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE
    Filesize

    244KB

    MD5

    fd4739ad26d293132d8e4ae11773b5ff

    SHA1

    20d4201da77108d659de983fa9e23c0cc65825c4

    SHA256

    ab390f70e7074104558d8709cac4627bad6633a83813dfa3a80418708f7ba1e3

    SHA512

    7d72f2a48d6f5386e22a2e5d191659f54cec2e99ddcce879ee65ccd6fc7e6a8070834bde9a87b467523501471b98fa582cb9a08b26f709dc8b9170c2662f90fa

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe
    Filesize

    290KB

    MD5

    df815caf3c78a6c7e1518cc6882b01bf

    SHA1

    6c3cad126a72a4710bfc859c9efe2c8eebbb56f6

    SHA256

    5625af665b7bbafeb056558d4efd469f9a46a2e8c9709ce78bc8706cf551db91

    SHA512

    e35348fea48f8d4c7954ad4a5e4e22ab0846979334de4b81759ef1aa92b6ae20751b6a3d079a0d33361df16d3bd8fe4bc7503825a0d8f597abbb4ad8ba8274c7

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\BHO\ie_to_edge_stub.exe
    Filesize

    537KB

    MD5

    365a79a3103889da0d1034eef90e150b

    SHA1

    9c6d6600212ceb9b712fea1d99d85e7ef7f748eb

    SHA256

    49593d97b8367cddb5e341e367c851573c076fa052639e08d933e5203b77b5ef

    SHA512

    08ad848319600e122f9de12d103104ea155be17205171669cd305e3c9d9ac500a4dc10938b1c094b2705a13b4aa2b67344a59635ed7cedc95e52e9eba9371684

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\INSTAL~1\setup.exe
    Filesize

    3.2MB

    MD5

    fe1b69272105afc35c59fdde851a0e73

    SHA1

    7407f32ccd3d444aac532dfa2dee59d6d38fb91a

    SHA256

    f68ee8f47c69284ceabde249d8f9406f35f085353a299a8707a24c6b34b775c6

    SHA512

    92fc046442048f67e0a5612f3d63e9b986d7803469737c226825415e91a9b2fdebd02bd951d082806cc8944e422c79ef29ffa4653a6364f4c1f5681c7ba043a3

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\cookie_exporter.exe
    Filesize

    197KB

    MD5

    90d4eb49be18372a47a1b9dde3b86486

    SHA1

    9487b2e6ab44c283b4872a1bb6fb8f3bbd4f041c

    SHA256

    3b41b318c3e275b6656f1a9acfd8814fbade19941070b76b37f7e568c40595de

    SHA512

    120923036552d9657588d7a0f1b29512b1fe1407f78d52b3424840c2dc97d4a6ae44a8148ad2b7f2e34537042e7c13585f9d2522405d56360d46c784dc8a8c0a

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\elevation_service.exe
    Filesize

    1.7MB

    MD5

    2a52fd23291f3caca91b559c3dcd637f

    SHA1

    c2cef19fcb10d45e5e1c437a7e4246d500ed09a3

    SHA256

    2a228d131fd39876865c31dadd000193978618637ca12408e42f4060aa2f466c

    SHA512

    f189c9f0b68d6d6842113e048356565569f67e7e63c6d4563913c99038f0a0bb54b750f37c098a50936eb115d751265314abde27d5014c6c73011c031f82b248

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\identity_helper.exe
    Filesize

    1.1MB

    MD5

    abd40544970e354010ac043696fcc6f2

    SHA1

    207ca492a30f97bed856fdaa318bd1ded2c8f191

    SHA256

    58b3fc8e0f6d38e27f8f5b7984e70ec6132fddd5e05169d4026c1b3a9e43d5e4

    SHA512

    e8a491a8ff31b0854eb0cf69f95ef56bb9ffa0e113113201ef650bd5e02b9fd3fd7aca072d697de007333ea8a254fa4f2944db50b8ea4ff19b851241b3c93890

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\msedge.exe
    Filesize

    3.7MB

    MD5

    4aca437ae8c67030fe2f594088a2d53a

    SHA1

    3c17be4fe60bc919083f92b5045d213d3d92ce83

    SHA256

    948c53598e61e6d12a0dd7d70086e94e26ea4844472586ab6786311ece8329ba

    SHA512

    5e5e5b1a3d21143322b977fc86493b8aa94cf03cd4c4b0b7731dacf3c59e1ce6911d4fc0ece70448d7f4d96fe8c15da5ea905fc9fc12bf3ec9a21a11fb256491

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\msedge_proxy.exe
    Filesize

    1.1MB

    MD5

    5423852b85f3cd0628f3a242e1e9eebe

    SHA1

    1264f6ee997a1876062952dbb7ceae06c2732792

    SHA256

    385fd4beecebd8c3702413373be358994e1af9481c88148613026f737a855f93

    SHA512

    4fb16f3c8198e77437b609e05831421a2d9a5597f83ac22819787082f52ffd1a5a626ff99c137a99ad8b6eca40bb2111a347e67e0351be4d8235a26517475300

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\msedge_pwa_launcher.exe
    Filesize

    1.8MB

    MD5

    e9db236130389516b93f40c919c2619b

    SHA1

    2722717f25122719010bdb0b49bcbb6f9a9d69ac

    SHA256

    3d3c7ff298fa5d2914470fc32fcb92a82d1ce8924933221895bcbab49d29eab8

    SHA512

    5bc6fbd9f97754bf4ec44ee7101d86657a35af6ee3a1b0b79bba4fbffffbfbf3b5836bffe9dd7db495c5688c8b7b291e52b0a6c89ea1f5e41e79507e49f30598

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\msedgewebview2.exe
    Filesize

    3.2MB

    MD5

    816bf809bdab7e95c6f16b38f619a527

    SHA1

    5bc139e11d077e8fa88394fb610f63f629f3b86d

    SHA256

    75367284d50434c966d4126241682829523a0baa1c03163b9383433182433a75

    SHA512

    1e7fbdbfcfb805691ca402acb7da16222da3f6d923db3cc5fe36cb7e677159f5a4b3ab8397d4d34ed82dc389220721bd40d37e35ecc57411133a1601fca1555c

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\notification_helper.exe
    Filesize

    1.3MB

    MD5

    2a46785ab8b2aad2bf6630d12a17a6ce

    SHA1

    e9704d280ea3589c3b4c1d808a5ff0efe83bc330

    SHA256

    1bb2b789bf7890e583958a213a20a20c920972ecac9e1874c04b49d28f69f224

    SHA512

    5efb0fdfbadca4698879249f5a2d07846012394c50695f663c18f469e887124819537bb71b179d427886e1325bc201cd28bd499fb75d2bdff01dfdf8a13db94e

  • C:\PROGRA~2\MICROS~1\EDGEWE~1\APPLIC~1\104012~1.47\pwahelper.exe
    Filesize

    1.1MB

    MD5

    25689bf879a14f124ea71db500ddb522

    SHA1

    36dc53850fef561a5ecbb3acdaaaa8aa7868c14c

    SHA256

    2bd534244e50c34d36957c30cb26077ef7e91635eb93df15d1b16c867b125c3f

    SHA512

    fc182276d7187bbb941c171dc70900bdbf81591f83559dd3c0be2f2467ca66c853a5e5cc6affff5870cd0fbd6dcd0db69bb8f55068085eb39fb61b3cfdcd0ed3

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE
    Filesize

    1.6MB

    MD5

    41b1e87b538616c6020369134cbce857

    SHA1

    a255c7fef7ba2fc1a7c45d992270d5af023c5f67

    SHA256

    08465cc139ee50a7497f8c842f74730d3a8f1a73c0b7caca95e9e6d37d3beed3

    SHA512

    3a354d3577b45f6736203d5a35a2d1d543da2d1e268cefeffe6bdb723ff63c720ceb2838701144f5fec611470d77649846e0fb4770d6439f321f6b819f03e4db

  • C:\PROGRA~2\MOZILL~1\UNINST~1.EXE
    Filesize

    169KB

    MD5

    0fd0821be8ce23f5531812ee608d3f1e

    SHA1

    2fbbf38aa2079cc52b45be95cd753ab161f33465

    SHA256

    7c472279ec142a0f9b5263ba33d4ecdaf76247fed445f47529009764d4730fa2

    SHA512

    6d51df306a0a5ba57c3f38777136d37b821a789628566bf33ecab381ffc8ae4b3ef4e8e15af6694d60b1836a438aae3aa1f2a9c19f051c902650a36fbb0f3be6

  • C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe
    Filesize

    494KB

    MD5

    05bdfd8a3128ab14d96818f43ebe9c0e

    SHA1

    495cbbd020391e05d11c52aa23bdae7b89532eb7

    SHA256

    7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb

    SHA512

    8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

  • C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
    Filesize

    6.7MB

    MD5

    63dc05e27a0b43bf25f151751b481b8c

    SHA1

    b20321483dac62bce0aa0cef1d193d247747e189

    SHA256

    7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce

    SHA512

    374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

  • C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE
    Filesize

    485KB

    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    9c10a5ec52c145d340df7eafdb69c478

    SHA1

    57f3d99e41d123ad5f185fc21454367a7285db42

    SHA256

    ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36

    SHA512

    2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

  • C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE
    Filesize

    495KB

    MD5

    9597098cfbc45fae685d9480d135ed13

    SHA1

    84401f03a7942a7e4fcd26e4414b227edd9b0f09

    SHA256

    45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c

    SHA512

    16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

  • C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE
    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
    Filesize

    495KB

    MD5

    07e194ce831b1846111eb6c8b176c86e

    SHA1

    b9c83ec3b0949cb661878fb1a8b43a073e15baf1

    SHA256

    d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac

    SHA512

    55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILECO~1.EXE
    Filesize

    499KB

    MD5

    346d2ff654d6257364a7c32b1ec53c09

    SHA1

    224301c0f56a870f20383c45801ec16d01dc48d1

    SHA256

    a811042693bc2b31be7e3f454b12312f67bc97f2b15335a97e8d8f2ba0a6b255

    SHA512

    223545e3fc9f3cd66c5cbcb50dd7103743788f03a9db398da6dd2744ccaeee291f385ce4f2758d4504fc0f6b968fabbfe16ba03b5f546b743c51dacad7a049c3

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE
    Filesize

    293KB

    MD5

    f3228c24035b3f54f78bb4fd11c36aeb

    SHA1

    2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb

    SHA256

    d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7

    SHA512

    b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE
    Filesize

    2.4MB

    MD5

    1319acbba64ecbcd5e3f16fc3acd693c

    SHA1

    f5d64f97194846bd0564d20ee290d35dd3df40b0

    SHA256

    8c6f9493c2045bb7c08630cf3709a63e221001f04289b311efb259de3eb76bce

    SHA512

    abbbb0abfff1698e2d3c4d27d84421b90abba1238b45884b82ace20d11ddfdd92bf206519fc01714235fb840258bb1c647c544b9a19d36f155bf3224916805b8

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe
    Filesize

    1.6MB

    MD5

    3a3a71a5df2d162555fcda9bc0993d74

    SHA1

    95c7400f85325eba9b0a92abd80ea64b76917a1a

    SHA256

    0a023355d1cc0a2348475d63aaf6aa0521d11e12a5c70102d7b3ebde092849e8

    SHA512

    9ad76ccce76ccfe8292bca8def5bc7255e7ea0ba6d92130c4350da49a3d7faef2d46b08aaef1955f3f4ea0a2e22451562b5e08783a79f794724584e409cf7837

  • C:\Users\Admin\AppData\Local\Temp\3582-490\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe
    Filesize

    658KB

    MD5

    ff8a13c3fadb61e15c17b439ce07cf97

    SHA1

    156f4f8fa6a0ec257bd92b62f872eff11e15d7cb

    SHA256

    8db65048a1524c66b592fedf56791793be727e53fc215e03cb8a28515efdfcc6

    SHA512

    89cdc9a02d86d85674e0c2691465668f4340fd9f6402d2da363cdbb563ca94bafa86d27955e26d880fe4f5c94a62a3a88ff5b2d58ab58f8a2109d83747ba262e

  • C:\Users\Admin\AppData\Local\Temp\3582-490\fbae158ac6dd24def292daa93ee48cc31b500a71fe10c19ddfe9b4c4c030c6f8.exe
    Filesize

    658KB

    MD5

    ff8a13c3fadb61e15c17b439ce07cf97

    SHA1

    156f4f8fa6a0ec257bd92b62f872eff11e15d7cb

    SHA256

    8db65048a1524c66b592fedf56791793be727e53fc215e03cb8a28515efdfcc6

    SHA512

    89cdc9a02d86d85674e0c2691465668f4340fd9f6402d2da363cdbb563ca94bafa86d27955e26d880fe4f5c94a62a3a88ff5b2d58ab58f8a2109d83747ba262e

  • C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe
    Filesize

    658KB

    MD5

    ff8a13c3fadb61e15c17b439ce07cf97

    SHA1

    156f4f8fa6a0ec257bd92b62f872eff11e15d7cb

    SHA256

    8db65048a1524c66b592fedf56791793be727e53fc215e03cb8a28515efdfcc6

    SHA512

    89cdc9a02d86d85674e0c2691465668f4340fd9f6402d2da363cdbb563ca94bafa86d27955e26d880fe4f5c94a62a3a88ff5b2d58ab58f8a2109d83747ba262e

  • C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe
    Filesize

    658KB

    MD5

    ff8a13c3fadb61e15c17b439ce07cf97

    SHA1

    156f4f8fa6a0ec257bd92b62f872eff11e15d7cb

    SHA256

    8db65048a1524c66b592fedf56791793be727e53fc215e03cb8a28515efdfcc6

    SHA512

    89cdc9a02d86d85674e0c2691465668f4340fd9f6402d2da363cdbb563ca94bafa86d27955e26d880fe4f5c94a62a3a88ff5b2d58ab58f8a2109d83747ba262e

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\odt\OFFICE~1.EXE
    Filesize

    5.1MB

    MD5

    02c3d242fe142b0eabec69211b34bc55

    SHA1

    ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e

    SHA256

    2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842

    SHA512

    0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099

  • memory/1432-135-0x0000000000000000-mapping.dmp
  • memory/2700-132-0x0000000000000000-mapping.dmp
  • memory/2732-139-0x0000000000000000-mapping.dmp