Analysis

  • max time kernel
    119s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 16:23

General

  • Target

    eer.scr

  • Size

    659KB

  • MD5

    be29e126a2cb27cc281d4504ab88555b

  • SHA1

    32c2fd591ecc7a42e54c8e4f62eeb4669e343bc9

  • SHA256

    e24930d91f43b695bc71cbcf0ce9e924f3f83787c29e5671aa412806468f3f30

  • SHA512

    bb0cbae3105846938a5954cfe089917330ed163c85f9ad19ff73133c3d32e8a5548aaa117cb28c341686b3eae591c7a29737eb706b65a0edc8c1f70fea6d4f02

  • SSDEEP

    12288:O9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hb:aZ1xuVVjfFoynPaVBUR8f+kN10EBN

Malware Config

Extracted

Family

darkcomet

Botnet

Guest1f63242m

C2

rose324-64643.portmap.host:64643

Mutex

DC_MUTEX-E28WFKY

Attributes
  • InstallPath

    MSDCSC\msdcsjc.exe

  • gencode

    AXE6r2QM7fs8

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    reahltekaudio

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eer.scr
    "C:\Users\Admin\AppData\Local\Temp\eer.scr" /S
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\eer.scr" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\eer.scr" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2812
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2816
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3040
    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsjc.exe
      "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsjc.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2832
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2628
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsjc.exe

    Filesize

    659KB

    MD5

    be29e126a2cb27cc281d4504ab88555b

    SHA1

    32c2fd591ecc7a42e54c8e4f62eeb4669e343bc9

    SHA256

    e24930d91f43b695bc71cbcf0ce9e924f3f83787c29e5671aa412806468f3f30

    SHA512

    bb0cbae3105846938a5954cfe089917330ed163c85f9ad19ff73133c3d32e8a5548aaa117cb28c341686b3eae591c7a29737eb706b65a0edc8c1f70fea6d4f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    53b476274a1be5da5530b8831872ec26

    SHA1

    78f8e23874e27ab9750ede1583b2e605558c9039

    SHA256

    a5f9720420bdf6f4600af17805ef755527a269151379f2af64b8173f5139e534

    SHA512

    935eeaf1b0fcadcfc2b9db600904265401d10d0b59a35dfc37bb89ba53dceeb1c99ccee93cbff93f8fd5b3114d9149099201146eef42c1bc29c9333ec52acb1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    504b5378be3693c4d5c61a505584bd4a

    SHA1

    e6e785becfdf6fd5550b6747cc7cdeda207debc4

    SHA256

    8452b6ae827e4045428ca2c7ed4f4af86a81a35ec3d54f541b0dded395a533c5

    SHA512

    7d39b0b0ce1172ba775e88fb3cb80367776364610b99ca5eff5edf553d2dfbb11f465b24da25f2d91578237b24a935be520b017f2f1df619673912542feb7102

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcf4c969d2ba91625de1a3269f3178a5

    SHA1

    6693eeae576afa740a5e0993de0dd339da913692

    SHA256

    f25f6f47252a0a40f5e8d9d655ba3f330aa132f5b16b3e687da03e77f2f27a25

    SHA512

    a921b1bcca59fd86eab12260f465bba8b7de0c9d3283a69d1316be6d39bc7a512718bb3310b3e7fa8dee1dc8e15ef7c90978630e4de320abeb560124bbfb0700

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    174db6ec8bc182e492563396c4b4a8f9

    SHA1

    fa2b62c499ebd5f73dc6648bd598610372a3fb18

    SHA256

    fb157fe1d523980469e11aff80224ffef1cbcc011b0ff25482b05c26f7ea36b5

    SHA512

    8f87bc18255ed8a4baaa2e2b4d1a78fb0666b19a311f3da5e86d8d274831df25510e7049ff0eae8b745f959721c802f9bad1d6e60b2a455d4dd8a8c003c00900

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    835b2ee7cd1184af943da3f333f681d7

    SHA1

    58e2467691992a8d7aa3d02ff9d01791c78c4bbe

    SHA256

    24f94432498e5da70931b0d6a9bcbc9b0415af913f53468bd20b60340be9cdcd

    SHA512

    1829d467a889a44b28131f0f201e4d71ba0763a9ef80ef5cb77c861618f48a4df27ede4c083ef7e76807d10715fed944109ab807ee42075fa4861b24b1b230f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45b65bb1dc1d3918e29bc86a83a342c5

    SHA1

    42fc4ea2a9adff02732f5bba0b42e32e7facafe1

    SHA256

    4a767cd9916be76659d7a1224b33c4ac27af3ed6aee7b00f63b01d56919750f9

    SHA512

    e2d069f2e2f7be92376d908596b152d4dc494df5237c6b0fd61a775e1d545f04151369236c0ab8cbd7f5a7038d1c27cb08da1a66a65a5b0e1ef907907f6f8685

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cef2bd99719a5bd48f603064d8ce150c

    SHA1

    2cd038d35c161295439990bbc7f85cda3601ff74

    SHA256

    4bc9530894668ec08079c95c7a04950e2aec8349ce9d245c6d84bb7382b0a0a1

    SHA512

    759e1bd724d7214089d37306790691a8f6f92de0311caf04cb79e438bc067cbc0769eedbdfea0683ffeb53f406cf8494787d631f26e56458ccc461ffe78ea99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68b0dfcf335c5597e9283c55e9e5bba5

    SHA1

    6ed799948320733cf9dcd5286d416a225da6e9c3

    SHA256

    f574dd2191e208a46741f17f0a5cae1a36f6a639e6e585809bab409b3c752960

    SHA512

    ccd048f089f8e0273b8958b292f574428dd86de7ab6ad29d43b50eb9c21dfd0b5d51eaa1b41d8b64dc47ed9a4f6c3db23640992db7e9e25081954b333f337945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eeb1b3af8fd7fe59ef75782d9b3a5bde

    SHA1

    f7e594f786817e19dc37a597230eba1e4076fbe6

    SHA256

    00a8108ac76ff0a60ca4d2292a75f23a8e3b3bc51a0374add2bf17c7c7aff50a

    SHA512

    5def724a93222472943ad16078124e89f7f67a0f94b55f5dea9839f1b0e27a7c7548cc4feedc0067f556e2a8cd9062812e82603318ac786dc38e43f44dfe05a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efe3889d5f0a968be36445ac73bb9f22

    SHA1

    dad085f363202b723173874417649e418c2b8f74

    SHA256

    1b696cde09d807aad11f46d7cb91c078053a42a575714aebc408d5e4c7523c9f

    SHA512

    8a4963d97f93c5ace89d3104d2cd703f52ffc9f068a1f3d2ecb9001f15294a00be667db2899443a7fedb693b282e365ecc8fbff52a733e9cc4993b3675999195

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    212adf32c13942f4f629d8250b029530

    SHA1

    b5d37bfc25bb2c2f23f97f42d9dd6eaa5d7e8e2b

    SHA256

    b0ab7cdc7e73167e27ff4fe8a1da820eee3ab47a1b220d97e44b6ec5b8b1371b

    SHA512

    3f1f2e27f7ce3a057fd8e85503863b0ba7a8e3467adce4a3734c7a8f51b19da4f9767b57df12d854e5b2a4e1a180ac5c48e0525423ec1609f8e2c455f0e58a2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f7ce9eea88fc471329bff9415a2cd6c

    SHA1

    0418b135f4eabe70042480a37e5c85f81ea90137

    SHA256

    7b887cf052781efd2890eb0ea131757a73e10ed7b6d97b590ff8db7de3efdff1

    SHA512

    91c727cc9a7aa4220dcb726f937a3229bb3f28cf2d37864fa22537e5d40c6b1f6210cbcf67bca26b3145d2b8075ccd99b9e4ef883dadeb242da9be28d66430d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    459a158d257780d0f599e4cc5031cae6

    SHA1

    6a1cc57aba728cfbde685a4036f1a343e373f4e2

    SHA256

    5c1b8cdb6d4cad9202ababeac8a5f62f41a5ec9afac0538cb54dd66c2e404a52

    SHA512

    533367fdea6b0fbf65493c2024a35adc799a9f99047b46db3c8d25f8a010eadc8c1fd99de30f7d0f462e77f456d4e1ad513ebd026760f7442190a66c6634afef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea0a357aae7516e31ec31d52345333c8

    SHA1

    bf0307568666eb2fd15893ed57ee5360c062ba2f

    SHA256

    7da2e8df434877955a516519f68dd3478aac813180af240de58c033edad799c4

    SHA512

    31f8dec5e17d602ee950c0501648c6d5de7827fffac2e9c8f18657255c9b033efab17ec48964d3f1cf43adb7600add4d1e6e25946e56510de2ec6dde9a2d8db5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    837af35ff8e6600178028523f6993869

    SHA1

    e9f7235d6abb86af16d81b348ce26dde7da17ccd

    SHA256

    e70607f10853bc7fb100379124e27592dd25804a58722f787b5006c7fb4ce6c5

    SHA512

    22368ea8f35ceecbc151513a2942ff84d646a77f04814206da5f01272766e0455215bf7db8e805784efc62dd3c79af1163dfc4ad339ee744f719672c620a1b65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6023b409d101ea385217cb9fcaa243e

    SHA1

    11d6a2abc2c138853c4b9f0edda596d9c74aa9d1

    SHA256

    9c545079d9377bbc6314aec9de17ecfdd673389f57ff4c7acdc8fa56c665fdf2

    SHA512

    71f936f62036600b70314de22928eb9e22a47c58614c17e28bf8fddb58d1f6df2823a1045785488da1f9626bb2e5ec5164cea09563844ade385180601d3b04e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57096ec154beb00f687005bb7384e18c

    SHA1

    1db834f22111f88a4fd228d2b366a38b8481b1bd

    SHA256

    e33bf9c05c118a5499352089cb340f8618bde3fca19cd4329aff2e2b190219c6

    SHA512

    0b3de0131737bd742028ce84f5ae9b73298c36e8e2a6a30e2ade395ead3e3a5fc5e7a3d8514204ce21aee5324176d253283d7d2e3ec155d19bf389da60a23626

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ef71baffba4bdbb32a289325350ba6f

    SHA1

    537adee62a9fdd193f8ae6bd6aca0eca30ab87c9

    SHA256

    bdc153311663c8c05ee69020a3130c151a1d437a08c2aee762f8d524d6ca69f5

    SHA512

    6fbf56ccbc4d14651115710879ebd161ef22d0ee83b92f29df15a7233d0ed1a75d1f4606aa29b1883701188be65b74f0026637c9aee19b8fddc1bb3b9bb8050c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58aefa1ff3ba50f5418cd294d82bad06

    SHA1

    dd3ce76aa6eb70955c9f8ec4724db52bcf5a84ff

    SHA256

    f042d872aea6e0242a7cf1a02a73bb744887e2b1d1e87b7b7aee7a61999d4c60

    SHA512

    eebbf5d18dba82afcef0895f5e1d7d3db08c5fce5028b6fad08fdb42507e676b9f1f2d83811777fe003c87f26ea956be347e797cccdd5401a86be8407facfa12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cbd2179d45ac0e9886b1fd5f92a87e7

    SHA1

    292b262bae0fac32164f3e16749e489f91922bc1

    SHA256

    49dc2a9eb7fec365af69ee6c51e21df5b6d0288e5c5ad5ee3bfb44206fd0ea42

    SHA512

    2131a867ceebeaebec6c8513bba580b2b84f8611ccf9d536d3be7a4163b09831667461587b1df01e2e120dcbcb697a147a33e72f0c707c8193b9e54414f3b016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0c54e01cb70af5b606e12ab318f8590

    SHA1

    3a9babb2e1f56dc85ec5b581ef879e5f39b16696

    SHA256

    ad03a8cdcdc3c8fce50695882b18c7e04a8aaf6ace36667763b66f09fcb9ad51

    SHA512

    c6612cf23f6ffc60fb28f153686eba040ef509f92bba70a4a137ea79c3c598b0508b750437fb01a6a917405cbdcd79d1c0184098b27dcbe748419b68c8300974

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7e8e28794d3c8606c705f98452a31b7

    SHA1

    8241de00927ec814ddf6ee13cf7eecd88d8cf04a

    SHA256

    e34b469be3d0bd38cfecf72e569e8a016b321b4370af0826f9cfe26cbe3206e4

    SHA512

    c40facee6c51163c7bf68d09ed16d175b1eb915c911904106353a973600d41c8717e1d16ede8ec7a73fad8e86e5c486e8e5e98125267ea3438efd6adb77a4a85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de0d346cbd4dd6ab2b919571a1e76758

    SHA1

    e3371e21eeb62ed8a5d81d51ad49050c3c2169b9

    SHA256

    1f976d7c98910f4ad81dbcf747c08a08e493aa10b2e390d2188529b670c7f3f3

    SHA512

    603970ea342e3ba5bd4a0094daf43038e04ccc081811604c79c74104baf37ae504942f81edd93ea5ffc70d2134b1b81c20439c75cc2cd78f68ffb60e64028640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    02e6937e1f05aefc03994d38dea4e879

    SHA1

    7f799d6873ac0d6cd8587e06a0cdf81e054cae13

    SHA256

    2585cc60a71c036dd0194337ccc9a6a8c64b2b2c966c00cc1091802302fe2df5

    SHA512

    940c72226c3302b437f0baea3192f6182e396cda796d4b9aec554ff6f6678c545d6101b76d64e06164607d940d95a3b5f3d29127e73e272df934dd6c9e044660

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\njqq61f\imagestore.dat

    Filesize

    1KB

    MD5

    be730d4ce62186867804a73199070d5a

    SHA1

    b155db20087fe523527bedeafeaf3f2e6169c235

    SHA256

    652ddb04d611799ee3c6cf7e30e350def7d551f0bf5bddce5ee56402d3684ba4

    SHA512

    c767b5e5191aa5d77ec17dec17d2d3c71ad5da7c2610fce38209b4a94b3f4d6a04758516f39ea1569be6db2c53a89dea139e7d0ad8fb3fbc1646481e2ba7c341

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\favicon[1].ico

    Filesize

    1KB

    MD5

    5694bd53ed21450630c668f3196f0bb4

    SHA1

    87524bcc557c298e66d9966968c208e030574a1d

    SHA256

    a85bf8db83b6a19b73cbdddf384b450bafb2eb39e1c7f6e9d6f252603262f3ed

    SHA512

    31609a77b762447eab9a248112fa8e2c3bd3bda4148eea10c7e65e5601349ee6473799a290f0e8c0fdf025b03f0e9b1de7b4af284be9f3f55f845b53be71b99f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsmlDWQZQB85.xml

    Filesize

    336B

    MD5

    cb30d082e7e7b0f542d8f9c5bb6fc9e1

    SHA1

    a7b76a0950ed0cd84e70d0c18e51af057b6101a0

    SHA256

    99b3afd25a31a175bc2b91a6cd6f6cdd3e6b64d88a29cb986f0a4c2fa4d2fcab

    SHA512

    d4a1ec3e87cb86cc8714d3015f015faf400a67cc1cabe44d579292b2624a1eb69bc6522525a0138fb82313d6cfe0ac23881b44fd65d37a63f2c3ad31f728b3f4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsmlRSYPZLE2.xml

    Filesize

    335B

    MD5

    16979a5fb649f563580ac09c010fdb65

    SHA1

    04d9d0e0130cb606de665990323779758f566083

    SHA256

    6b404df19f39a3047a2dbfc17157d43e991e42c493952ab5b2ff5792739c9df9

    SHA512

    3db6d2b21e10da1454f0a02a183190ef5b5f94a2e8a51dd72c1cb587492eec47b0f0f3887734f86dce8b0c778814c4175f6dee7bade00e88014599acfa949c2b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[10].xml

    Filesize

    334B

    MD5

    da9bbe366ec3a0b6614874276c68e0ef

    SHA1

    0bd37adf28f099a843542e810bd5259236baeb80

    SHA256

    4408fa109893181379a662b6a2ef48bed389942e2d49e8a6eee108c10ce58b9b

    SHA512

    f3bae1cebb409220421db29d36822f34ee0fb10f9d6b88419e324be6284779328be2986406da2e7985901f934002cc8bc0ef9b095c50258720516a8e53d22247

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[1].xml

    Filesize

    485B

    MD5

    07903411584e06c66f02b50133a78869

    SHA1

    e63a7c71e04d5edee8949fd241007ae80c94e7ff

    SHA256

    c3389a2581c682225bff69566af57452d29a424f755de2e5e672c8356a9185c0

    SHA512

    493a2ef23fe3f7bbe85b08f99134e26db59f5c7603a4e84a213b993c800579843e90fbecc8c378734f19b81ea1123a48e0e6a63c35173a1137b5d866b3c3be63

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[2].xml

    Filesize

    506B

    MD5

    3f61a6915b10fb85d3441434d867d06a

    SHA1

    8e49b074ee47724d13f7b4993cc116b8af705271

    SHA256

    bbc4e389714ad4d2dc1337e1ff3338d469eaffe953a7c80eb2db2bcb1cb992ca

    SHA512

    a395804ce70dfde4d246211329edb0b4fea9285fe1d9229669f55987d2163b7987a6a5277770021359bc5a7cfbefc716c78727b13664830038d9009406ed4277

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[3].xml

    Filesize

    541B

    MD5

    25d6b5931029cc09bf3d75f0fbea4186

    SHA1

    235959ba9ab9665b6e308fc5072d26464e290b8e

    SHA256

    47859da2a16f6c9e8481bf97fd25685a1ca78e00f2e5ec2628c5ed6f6afe3b14

    SHA512

    53f2c9708ea1507352f43301a4f9ff9ba0db70f1aef65969732971e8f0bda51edf8bc1e5109dc061fa6300fc6512cea27786ae1eb04b1a40aedb83b3ece83228

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[4].xml

    Filesize

    545B

    MD5

    4f50b346872b6469288ca3964d29c0be

    SHA1

    5aa1fc2b341610912512eed35ef4566a1b035904

    SHA256

    5357928aaed97e23c421722f89d606a7661ee1b165e1342f23f099be66a99122

    SHA512

    2c3ed7519e38b5c1b57dcc9ca263301a51df5dd75afa16e8f7cf47262351fe8bd07bb349e15ae3af6ff6001ce47cd7f39c2fe46df84f1084a16fce92dde4fea8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[5].xml

    Filesize

    572B

    MD5

    7bf08d70ff4ec68e2650892aaa328df7

    SHA1

    433faab57776d6ce9d4fec3071a32e8f2d4dc3ee

    SHA256

    84b571ec4e15722edffb5b34599bd547fc93206a55481d4e9ccd44265d3b6f71

    SHA512

    a0a64bcb58eb71016bdbd50f8e79dc503470779eeb532a58f16b12e8cdf16d13b4acb75c1520d3e7fe73921b0e01afc8ce6b591e3af7866046430fcaab1afec6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[6].xml

    Filesize

    573B

    MD5

    a044a1e8aa8ed7aa8c074db20a51cf24

    SHA1

    d9c5243236b78a579db945ad01c3a081bbee0f47

    SHA256

    6b4c474819700cf93d38321c9460ef03e898312663b8d4886ad42c160f7c92d5

    SHA512

    bcea489a72342cfc515c6528affe189b8b70fafcfe9a58abeb549d31cfd7197e1d4f49ab6be533ff954c026a34ed6ad0c02d07babaa9259746c56484a0b1eba7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[7].xml

    Filesize

    574B

    MD5

    1454dd13485781e13fa256848d411cab

    SHA1

    34e9679bd602f9ab86390ed52adbd42259c8a387

    SHA256

    8b266803e7077d7521b25665ef3e9ae36aafcee287c89b01396bbd562f9ea6a6

    SHA512

    b13ca33dee505a51d7d86b80b0aff0f7eb6e2d69b2276af5b814bc8f06b8c0b47d99979c6368ca775ac676b8c9233542c2a8ab1feccab6454ea2974b0975cdd7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[8].xml

    Filesize

    575B

    MD5

    ae1ad3314c4eb2a5c65e0e6e2dee335a

    SHA1

    feaed4bad874804abf4c24d59a5c2f38b91e96cc

    SHA256

    9715fa4bf4591b4cac6c526534c5d741ce53210c9df084e7352a97502e36307d

    SHA512

    cc85154504e7e2e4d8ecba1adc1103c72a4abbc856c5f661b389facea9b8026914d5dd98eadf7b1b021b6b0ebef4420775ee93c4055c6b6aec29d739f6253229

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\qsml[9].xml

    Filesize

    374B

    MD5

    1a01e7b5e55235a2053cf75e4b834e31

    SHA1

    8cd98943d0e1dbd195a2288a7126bd1fb8a630eb

    SHA256

    c5c83c7349769cb85ae3610ec01a1d84be79390ba2e241f1347b4ba4ea23640f

    SHA512

    4bf5c414d0715b4de15e970950be5c94f6f0d80e7a8bdd6fec951c30d655921d96639ecf7a226c130f05f8448e283e24960260d2659cb104e9951fdc5777b6e2

  • C:\Users\Admin\AppData\Local\Temp\Cab4664.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4714.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1792-0-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1792-70-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2384-29-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2628-69-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2832-30-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/3040-4-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/3040-19-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB