Analysis

  • max time kernel
    175s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 12:47

General

  • Target

    2238e83f.exe

  • Size

    1.4MB

  • MD5

    abb0da45041a587897972066124a73fe

  • SHA1

    5a82eb5e9ef349e798fc930f077e15e5e692fe5c

  • SHA256

    2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845

  • SHA512

    10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

194.5.97.32:5890

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_oqkhxjzletgovfx

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Detected potential entity reuse from brand microsoft.
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2238e83f.exe
    "C:\Users\Admin\AppData\Local\Temp\2238e83f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 20
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\SysWOW64\timeout.exe
        timeout 20
        3⤵
        • Delays execution with timeout.exe
        PID:4164
    • C:\Users\Admin\AppData\Local\Temp\2238e83f.exe
      C:\Users\Admin\AppData\Local\Temp\2238e83f.exe
      2⤵
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\2238e83f.exe
        C:\Users\Admin\AppData\Local\Temp\2238e83f.exe
        2⤵
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3960
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4368
          • C:\Windows\SysWOW64\PING.EXE
            PING 127.0.0.1 -n 2
            4⤵
            • Runs ping.exe
            PID:1264
          • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
            "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2008
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 20
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:440
              • C:\Windows\SysWOW64\timeout.exe
                timeout 20
                6⤵
                • Delays execution with timeout.exe
                PID:3740
            • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
              C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3696
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
                  7⤵
                  • Adds Run key to start application
                  • Enumerates system info in registry
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:852
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff193446f8,0x7fff19344708,0x7fff19344718
                    8⤵
                      PID:4160
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
                      8⤵
                        PID:3012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:3
                        8⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4876
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8
                        8⤵
                          PID:4172
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                          8⤵
                            PID:4144
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:1
                            8⤵
                              PID:1648
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5252 /prefetch:8
                              8⤵
                                PID:4548
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                8⤵
                                  PID:4152
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 /prefetch:8
                                  8⤵
                                    PID:1872
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                                    8⤵
                                      PID:4596
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                                      8⤵
                                        PID:3448
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:8
                                        8⤵
                                          PID:3132
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                          8⤵
                                          • Drops file in Program Files directory
                                          PID:3724
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff70e2e5460,0x7ff70e2e5470,0x7ff70e2e5480
                                            9⤵
                                              PID:1496
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:8
                                            8⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3436
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:1
                                            8⤵
                                              PID:4552
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15738914779950065276,9464593138554821121,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                                              8⤵
                                                PID:5028
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
                                              7⤵
                                                PID:2668
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7fff193446f8,0x7fff19344708,0x7fff19344718
                                                  8⤵
                                                    PID:2088
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:2436
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                        1⤵
                                          PID:4860

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v6

                                        Persistence

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1060

                                        Defense Evasion

                                        Modify Registry

                                        1
                                        T1112

                                        Discovery

                                        Query Registry

                                        2
                                        T1012

                                        System Information Discovery

                                        3
                                        T1082

                                        Remote System Discovery

                                        1
                                        T1018

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                                          Filesize

                                          1KB

                                          MD5

                                          4280e36a29fa31c01e4d8b2ba726a0d8

                                          SHA1

                                          c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                          SHA256

                                          e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                          SHA512

                                          494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                          Filesize

                                          152B

                                          MD5

                                          53473ab893aa74c050da4b15a702cea9

                                          SHA1

                                          85c34c1138235afa21eae7c142640358ee110a5d

                                          SHA256

                                          0ab2a2ba17aad5490bd5c0e2febf6087af97eff3cf347b615b1542a70909b852

                                          SHA512

                                          3ffad5f15b37bcddd4018adfc0633e7e1573b5de829e217550d805870afdbe13194e1f0ef3026d1d26a50fc2a231966ed5eff465df4f9ea8e8490dc478df7e6d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                          Filesize

                                          53KB

                                          MD5

                                          06ad34f9739c5159b4d92d702545bd49

                                          SHA1

                                          9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                          SHA256

                                          474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                          SHA512

                                          c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                          Filesize

                                          16KB

                                          MD5

                                          4d7e664264f70cb2078b388e3bf7138f

                                          SHA1

                                          a3f9e3f80672aaa5ba7697c122558ad76ee96451

                                          SHA256

                                          85897a60ead78971322f8af6770d4fa737a050e88ee8b887e901dcaa33dbe024

                                          SHA512

                                          8c11d1d55a56f0bb48913570be4cfdfdc143764c41abec34058c1a325a9be5aa5022d95e7f27c1579637ffd7e351d88d68e8af0ede6a3a4a71438e600a44f600

                                        • C:\Users\Admin\AppData\Local\Temp\install.bat
                                          Filesize

                                          99B

                                          MD5

                                          76c1687d97dfdbcea62ef1490bec5001

                                          SHA1

                                          5f4d1aeafa7d840cde67b76f97416dd68efd1bed

                                          SHA256

                                          79f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4

                                          SHA512

                                          da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hussan\hussan.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          abb0da45041a587897972066124a73fe

                                          SHA1

                                          5a82eb5e9ef349e798fc930f077e15e5e692fe5c

                                          SHA256

                                          2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845

                                          SHA512

                                          10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25

                                        • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          abb0da45041a587897972066124a73fe

                                          SHA1

                                          5a82eb5e9ef349e798fc930f077e15e5e692fe5c

                                          SHA256

                                          2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845

                                          SHA512

                                          10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25

                                        • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          abb0da45041a587897972066124a73fe

                                          SHA1

                                          5a82eb5e9ef349e798fc930f077e15e5e692fe5c

                                          SHA256

                                          2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845

                                          SHA512

                                          10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25

                                        • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          abb0da45041a587897972066124a73fe

                                          SHA1

                                          5a82eb5e9ef349e798fc930f077e15e5e692fe5c

                                          SHA256

                                          2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845

                                          SHA512

                                          10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25

                                        • \??\pipe\LOCAL\crashpad_852_KEIKQNLYQVLRSIEV
                                          MD5

                                          d41d8cd98f00b204e9800998ecf8427e

                                          SHA1

                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                          SHA256

                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                          SHA512

                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                        • memory/440-158-0x0000000000000000-mapping.dmp
                                        • memory/852-167-0x0000000000000000-mapping.dmp
                                        • memory/1264-150-0x0000000000000000-mapping.dmp
                                        • memory/1496-190-0x0000000000000000-mapping.dmp
                                        • memory/1648-178-0x0000000000000000-mapping.dmp
                                        • memory/1828-151-0x0000000000000000-mapping.dmp
                                        • memory/1872-184-0x0000000000000000-mapping.dmp
                                        • memory/2008-154-0x0000000000000000-mapping.dmp
                                        • memory/2088-192-0x0000000000000000-mapping.dmp
                                        • memory/2248-140-0x0000000000000000-mapping.dmp
                                        • memory/2520-166-0x0000000000400000-0x0000000000417000-memory.dmp
                                          Filesize

                                          92KB

                                        • memory/2520-161-0x0000000000000000-mapping.dmp
                                        • memory/2520-165-0x0000000000400000-0x0000000000417000-memory.dmp
                                          Filesize

                                          92KB

                                        • memory/2668-191-0x0000000000000000-mapping.dmp
                                        • memory/3012-170-0x0000000000000000-mapping.dmp
                                        • memory/3436-194-0x0000000000000000-mapping.dmp
                                        • memory/3448-188-0x0000000000000000-mapping.dmp
                                        • memory/3724-189-0x0000000000000000-mapping.dmp
                                        • memory/3740-159-0x0000000000000000-mapping.dmp
                                        • memory/3960-144-0x0000000000400000-0x0000000000417000-memory.dmp
                                          Filesize

                                          92KB

                                        • memory/3960-148-0x0000000000400000-0x0000000000417000-memory.dmp
                                          Filesize

                                          92KB

                                        • memory/3960-143-0x0000000000000000-mapping.dmp
                                        • memory/3960-146-0x0000000000400000-0x0000000000417000-memory.dmp
                                          Filesize

                                          92KB

                                        • memory/4144-176-0x0000000000000000-mapping.dmp
                                        • memory/4152-182-0x0000000000000000-mapping.dmp
                                        • memory/4160-168-0x0000000000000000-mapping.dmp
                                        • memory/4164-141-0x0000000000000000-mapping.dmp
                                        • memory/4172-174-0x0000000000000000-mapping.dmp
                                        • memory/4232-130-0x00000000003D0000-0x000000000053E000-memory.dmp
                                          Filesize

                                          1.4MB

                                        • memory/4304-139-0x00000000065B0000-0x00000000065CA000-memory.dmp
                                          Filesize

                                          104KB

                                        • memory/4304-132-0x0000000002AE0000-0x0000000002B16000-memory.dmp
                                          Filesize

                                          216KB

                                        • memory/4304-131-0x0000000000000000-mapping.dmp
                                        • memory/4304-134-0x0000000005830000-0x0000000005852000-memory.dmp
                                          Filesize

                                          136KB

                                        • memory/4304-138-0x00000000076F0000-0x0000000007D6A000-memory.dmp
                                          Filesize

                                          6.5MB

                                        • memory/4304-133-0x00000000051A0000-0x00000000057C8000-memory.dmp
                                          Filesize

                                          6.2MB

                                        • memory/4304-137-0x00000000060B0000-0x00000000060CE000-memory.dmp
                                          Filesize

                                          120KB

                                        • memory/4304-136-0x0000000005A70000-0x0000000005AD6000-memory.dmp
                                          Filesize

                                          408KB

                                        • memory/4304-135-0x00000000058D0000-0x0000000005936000-memory.dmp
                                          Filesize

                                          408KB

                                        • memory/4368-147-0x0000000000000000-mapping.dmp
                                        • memory/4548-180-0x0000000000000000-mapping.dmp
                                        • memory/4552-196-0x0000000000000000-mapping.dmp
                                        • memory/4596-186-0x0000000000000000-mapping.dmp
                                        • memory/4756-142-0x0000000000000000-mapping.dmp
                                        • memory/4876-171-0x0000000000000000-mapping.dmp
                                        • memory/5028-198-0x0000000000000000-mapping.dmp