Malware Analysis Report

2025-06-16 01:18

Sample ID 231204-f9z8mshc2y
Target 6a9957dd2a19a1bf4af05ca7be1694de.exe
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
Tags
remcos remotehost persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992

Threat Level: Known bad

The file 6a9957dd2a19a1bf4af05ca7be1694de.exe was found to be: Known bad.

Malicious Activity Summary

remcos remotehost persistence rat

Remcos

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-04 05:35

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-04 05:35

Reported

2023-12-04 05:37

Platform

win7-20231023-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

Signatures

Remcos

rat remcos

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\ProgramData\Remcos\remcos.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\ProgramData\Remcos\remcos.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2888 set thread context of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2668 set thread context of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2888 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2888 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2888 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2888 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2888 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 2820 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2536 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2536 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2536 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2536 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 2668 wrote to memory of 2560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

C:\ProgramData\Remcos\remcos.exe

"C:\ProgramData\Remcos\remcos.exe"

C:\ProgramData\Remcos\remcos.exe

"C:\ProgramData\Remcos\remcos.exe"

C:\ProgramData\Remcos\remcos.exe

"C:\ProgramData\Remcos\remcos.exe"

Network

Country Destination Domain Proto
NL 45.153.184.199:80 45.153.184.199 tcp
NL 185.157.162.241:1303 tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp

Files

C:\Users\Public\vlkkqasyibgdtlsvhzbnyahry.bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

memory/2888-5-0x0000000000810000-0x0000000000813000-memory.dmp

memory/2820-6-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2820-8-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2820-9-0x0000000000400000-0x0000000000482000-memory.dmp

\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

memory/2820-16-0x0000000000400000-0x0000000000482000-memory.dmp

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\encrypt[1].bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

C:\Users\Public\vlkkqasyibgdtlsvhzbnyahry.bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

memory/2560-27-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-29-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-28-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-30-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-31-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-32-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-33-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-36-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-37-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-38-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-39-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-40-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-41-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-42-0x0000000000400000-0x0000000000482000-memory.dmp

memory/2560-43-0x0000000000400000-0x0000000000482000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-04 05:35

Reported

2023-12-04 05:37

Platform

win10v2004-20231127-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

Signatures

Remcos

rat remcos

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\ProgramData\Remcos\remcos.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\ProgramData\Remcos\remcos.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2598572287-1024438387-935107970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-NT0JNG = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4448 set thread context of 4348 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 4704 set thread context of 1560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe N/A
N/A N/A C:\ProgramData\Remcos\remcos.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4448 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 4448 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 4448 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 4448 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe
PID 4348 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 4348 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 4348 wrote to memory of 4704 N/A C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe C:\ProgramData\Remcos\remcos.exe
PID 4704 wrote to memory of 1560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 4704 wrote to memory of 1560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 4704 wrote to memory of 1560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe
PID 4704 wrote to memory of 1560 N/A C:\ProgramData\Remcos\remcos.exe C:\ProgramData\Remcos\remcos.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe

"C:\Users\Admin\AppData\Local\Temp\6a9957dd2a19a1bf4af05ca7be1694de.exe"

C:\ProgramData\Remcos\remcos.exe

"C:\ProgramData\Remcos\remcos.exe"

C:\ProgramData\Remcos\remcos.exe

"C:\ProgramData\Remcos\remcos.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
NL 45.153.184.199:80 45.153.184.199 tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 199.184.153.45.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 198.1.85.104.in-addr.arpa udp
NL 185.157.162.241:1303 tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 241.162.157.185.in-addr.arpa udp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 48.254.221.88.in-addr.arpa udp
US 8.8.8.8:53 252.15.104.51.in-addr.arpa udp

Files

C:\Users\Public\vlkkqasyibgdtlsvhzbnyahry.bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

memory/4448-5-0x0000000003720000-0x0000000003723000-memory.dmp

memory/4348-6-0x0000000000400000-0x0000000000482000-memory.dmp

memory/4348-7-0x0000000000400000-0x0000000000482000-memory.dmp

memory/4348-8-0x0000000000400000-0x0000000000482000-memory.dmp

memory/4348-10-0x0000000000400000-0x0000000000482000-memory.dmp

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

memory/4348-21-0x0000000000400000-0x0000000000482000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JRPRPPGG\encrypt[1].bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

C:\Users\Public\vlkkqasyibgdtlsvhzbnyahry.bin

MD5 9ff228d096ee65bf9d214b5793bde076
SHA1 1d388f9f9c9d1fe1db1f79948b959625a9ac33c1
SHA256 3f7f8b96bd1f1bf7d5ef5bd8c0fe2f6de28295be2514243fd903bab2165697cc
SHA512 ed6a9c7d3e38b621903bd269b6b64825db5e9224fb6e9972615b7db30c2b65959e0014073bc1335e6bdb5c68bbec3e4ab5d942c4217aa83033ff4bba6a6db62d

C:\ProgramData\Remcos\remcos.exe

MD5 6a9957dd2a19a1bf4af05ca7be1694de
SHA1 72c945a8acf762df42d5d5ae1a281a2e5c3d9196
SHA256 17d18a7a41119c12455a644fefca70b4504db83e0122d6dc2652f46f98de8992
SHA512 42076c0d76914a89e2785eddef8d5049ab8fd958cc363279e0fbb18b819684157d212c2f922502fa6a7e10471eda806b257e37b4712f389cb56eac94c69d5113

memory/1560-28-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-29-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-30-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-31-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-32-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-33-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-34-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-37-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-38-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-39-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-40-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-41-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-42-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-43-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-44-0x0000000000400000-0x0000000000482000-memory.dmp

memory/1560-45-0x0000000000400000-0x0000000000482000-memory.dmp