Analysis Overview
SHA256
6008f20f3c7af36172d3675bc509697226453bb87531e30cf96b11c6ab58d2a3
Threat Level: Known bad
The file 6d37f9b3dcc6c0ae8da12d65e37ef3b1.bin was found to be: Known bad.
Malicious Activity Summary
Remcos
NirSoft MailPassView
Nirsoft
NirSoft WebBrowserPassView
Reads user/profile data of web browsers
Checks computer location settings
Accesses Microsoft Outlook accounts
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of SetWindowsHookEx
Suspicious behavior: MapViewOfSection
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-08 01:22
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-08 01:22
Reported
2024-04-08 01:25
Platform
win7-20240221-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Remcos
NirSoft MailPassView
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NirSoft WebBrowserPassView
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Nirsoft
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook accounts
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3012 set thread context of 2492 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2492 set thread context of 1960 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2492 set thread context of 1724 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2492 set thread context of 2004 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kdkZYZHUWsaYyc.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kdkZYZHUWsaYyc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD40.tmp"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qetsuoettjnfsb"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\sggcvgpuhrfrcpjrt"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\calvvzzovzxwevxvklrzs"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\calvvzzovzxwevxvklrzs"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\calvvzzovzxwevxvklrzs"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | paygateme.net | udp |
| US | 146.70.57.34:2286 | paygateme.net | tcp |
| US | 146.70.57.34:2286 | paygateme.net | tcp |
| US | 8.8.8.8:53 | geoplugin.net | udp |
| NL | 178.237.33.50:80 | geoplugin.net | tcp |
Files
memory/3012-0-0x0000000000940000-0x0000000000A26000-memory.dmp
memory/3012-1-0x0000000074C00000-0x00000000752EE000-memory.dmp
memory/3012-2-0x0000000000520000-0x0000000000560000-memory.dmp
memory/3012-3-0x0000000000420000-0x0000000000430000-memory.dmp
memory/3012-4-0x0000000000480000-0x000000000048C000-memory.dmp
memory/3012-5-0x0000000005D20000-0x0000000005DE0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpAD40.tmp
| MD5 | 4c7dcb66218684faf08d7acad850de5d |
| SHA1 | 51d9e4d3e3b60e91eeff8ba20e6df645bc777314 |
| SHA256 | c532510687bc9f1ed9d636baed5f3cfca2d61d48680fcccea04ef77066459a39 |
| SHA512 | a34c0d19866154e412428678eea163fadbc67e235c34c57c7dd59cfc92561223b1317ffb965722c2b9e116d92fc942ca4840183ea6b945a7e5beac68c1fac77c |
memory/2492-13-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-15-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-11-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-17-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-19-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-26-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-28-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-24-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2492-22-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-18-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-16-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-29-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-31-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-33-0x0000000000400000-0x0000000000482000-memory.dmp
memory/3012-30-0x0000000074C00000-0x00000000752EE000-memory.dmp
memory/2492-35-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2532-37-0x000000006F090000-0x000000006F63B000-memory.dmp
memory/2532-39-0x000000006F090000-0x000000006F63B000-memory.dmp
memory/2492-38-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2532-42-0x0000000002790000-0x00000000027D0000-memory.dmp
memory/2532-41-0x0000000002790000-0x00000000027D0000-memory.dmp
memory/2532-40-0x0000000002790000-0x00000000027D0000-memory.dmp
memory/2532-43-0x000000006F090000-0x000000006F63B000-memory.dmp
memory/2492-45-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-44-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-46-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-47-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-49-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1960-53-0x0000000000400000-0x0000000000478000-memory.dmp
memory/1960-56-0x0000000000400000-0x0000000000478000-memory.dmp
memory/1960-58-0x0000000000400000-0x0000000000478000-memory.dmp
memory/1724-65-0x0000000000400000-0x0000000000462000-memory.dmp
memory/2004-69-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2004-67-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2004-72-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2004-71-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1724-62-0x0000000000400000-0x0000000000462000-memory.dmp
memory/1960-60-0x0000000000400000-0x0000000000478000-memory.dmp
memory/1724-59-0x0000000000400000-0x0000000000462000-memory.dmp
memory/1960-77-0x0000000000400000-0x0000000000478000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\qetsuoettjnfsb
| MD5 | f3b25701fe362ec84616a93a45ce9998 |
| SHA1 | d62636d8caec13f04e28442a0a6fa1afeb024bbb |
| SHA256 | b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209 |
| SHA512 | 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84 |
memory/2492-81-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-80-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-82-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1724-83-0x0000000000400000-0x0000000000462000-memory.dmp
memory/2492-87-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-90-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-89-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-88-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-84-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-92-0x0000000000400000-0x0000000000482000-memory.dmp
C:\ProgramData\remcos\logs.dat
| MD5 | c9d32be73951be8fca4bb18bda16b2d2 |
| SHA1 | 4835cf00b9a8939b3a1f723b03df75c66384f1c5 |
| SHA256 | 9292246d160ad1dff9cda9804ba464f3868e93276520e03c80595719f587eada |
| SHA512 | 760b2527bcd70a6500625ce487c7d4d77362442513b8f5c640b6332972f1689b34a50344de1361149140515208d9e8e46808c7b10fa7f74ccc145c3213b0914e |
memory/2492-97-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2492-99-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-100-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-108-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-109-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-116-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2492-117-0x0000000000400000-0x0000000000482000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-08 01:22
Reported
2024-04-08 01:25
Platform
win10v2004-20240226-en
Max time kernel
148s
Max time network
152s
Command Line
Signatures
Remcos
NirSoft MailPassView
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NirSoft WebBrowserPassView
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Nirsoft
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook accounts
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1944 set thread context of 2544 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2544 set thread context of 4280 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2544 set thread context of 2032 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
| PID 2544 set thread context of 5064 | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kdkZYZHUWsaYyc.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kdkZYZHUWsaYyc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD92A.tmp"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\hzwilqgrywijtvythovkmrzqinquznpf"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\stkb"
C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe
"C:\Users\Admin\AppData\Local\Temp\NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exe" /stext "C:\Users\Admin\AppData\Local\Temp\cnplmakm"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 159.113.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | paygateme.net | udp |
| US | 146.70.57.34:2286 | paygateme.net | tcp |
| US | 8.8.8.8:53 | 34.57.70.146.in-addr.arpa | udp |
| US | 146.70.57.34:2286 | paygateme.net | tcp |
| US | 8.8.8.8:53 | geoplugin.net | udp |
| NL | 178.237.33.50:80 | geoplugin.net | tcp |
| US | 8.8.8.8:53 | 50.33.237.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 178.223.142.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.173.189.20.in-addr.arpa | udp |
Files
memory/1944-0-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/1944-1-0x0000000000B60000-0x0000000000C46000-memory.dmp
memory/1944-2-0x0000000005B80000-0x0000000006124000-memory.dmp
memory/1944-3-0x0000000005670000-0x0000000005702000-memory.dmp
memory/1944-4-0x0000000005850000-0x0000000005860000-memory.dmp
memory/1944-5-0x0000000005660000-0x000000000566A000-memory.dmp
memory/1944-6-0x00000000058D0000-0x00000000058E0000-memory.dmp
memory/1944-7-0x0000000005900000-0x000000000590C000-memory.dmp
memory/1944-8-0x00000000080A0000-0x0000000008160000-memory.dmp
memory/1944-9-0x000000000A8B0000-0x000000000A94C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpD92A.tmp
| MD5 | 2b021b8ffb8f5d6fe142f6b2ac350b7e |
| SHA1 | 5c6b989941195d9be9529b85b50c4e3f81d0313e |
| SHA256 | 143774d213784394424bc1ca8d270e83ac1b5ac4d46a5ebb614f3cd886f1f7de |
| SHA512 | b79cff2ee0938440cc57c2f42e8bc93579563172f7675252680c7016b5b09750c86ee420175d0e5eef5cf607fbcceb51b2d85660d82891269e8cad29451f8344 |
memory/1664-14-0x0000000002C60000-0x0000000002C96000-memory.dmp
memory/1664-16-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/1664-17-0x0000000002E10000-0x0000000002E20000-memory.dmp
memory/2544-18-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1944-19-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/1664-20-0x00000000057B0000-0x0000000005DD8000-memory.dmp
memory/2544-21-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-22-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1664-24-0x00000000055A0000-0x00000000055C2000-memory.dmp
memory/1944-27-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/2544-26-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-25-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1664-30-0x00000000056C0000-0x0000000005726000-memory.dmp
memory/1664-31-0x0000000005F50000-0x0000000005FB6000-memory.dmp
memory/2544-32-0x0000000000400000-0x0000000000482000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_di2gztuv.in5.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2544-39-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-33-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1944-29-0x0000000005850000-0x0000000005860000-memory.dmp
memory/1664-44-0x0000000005FC0000-0x0000000006314000-memory.dmp
memory/2544-45-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1664-47-0x0000000006540000-0x000000000655E000-memory.dmp
memory/1664-48-0x00000000065F0000-0x000000000663C000-memory.dmp
memory/2544-49-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-50-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-51-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-52-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-54-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1664-55-0x0000000002E10000-0x0000000002E20000-memory.dmp
memory/1664-56-0x000000007F110000-0x000000007F120000-memory.dmp
memory/1664-57-0x0000000007510000-0x0000000007542000-memory.dmp
memory/1664-58-0x0000000070F50000-0x0000000070F9C000-memory.dmp
memory/1664-68-0x0000000006B10000-0x0000000006B2E000-memory.dmp
memory/1664-69-0x0000000007750000-0x00000000077F3000-memory.dmp
memory/1664-71-0x0000000007870000-0x000000000788A000-memory.dmp
memory/1664-70-0x0000000007EB0000-0x000000000852A000-memory.dmp
memory/1664-72-0x00000000078E0000-0x00000000078EA000-memory.dmp
memory/1664-74-0x0000000007AF0000-0x0000000007B86000-memory.dmp
memory/1664-75-0x0000000007A70000-0x0000000007A81000-memory.dmp
memory/4280-76-0x0000000000400000-0x0000000000478000-memory.dmp
memory/2032-78-0x0000000000400000-0x0000000000462000-memory.dmp
memory/5064-81-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4280-80-0x0000000000400000-0x0000000000478000-memory.dmp
memory/2032-83-0x0000000000400000-0x0000000000462000-memory.dmp
memory/5064-86-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4280-85-0x0000000000400000-0x0000000000478000-memory.dmp
memory/2032-88-0x0000000000400000-0x0000000000462000-memory.dmp
memory/5064-90-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2032-94-0x0000000000400000-0x0000000000462000-memory.dmp
memory/5064-96-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1664-95-0x0000000007AA0000-0x0000000007AAE000-memory.dmp
memory/1664-97-0x0000000007AB0000-0x0000000007AC4000-memory.dmp
memory/1664-98-0x0000000007BB0000-0x0000000007BCA000-memory.dmp
memory/1664-99-0x0000000007B90000-0x0000000007B98000-memory.dmp
memory/4280-101-0x0000000000400000-0x0000000000478000-memory.dmp
memory/2544-103-0x0000000010000000-0x0000000010019000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\hzwilqgrywijtvythovkmrzqinquznpf
| MD5 | 32a7b06ba8a0426235849b55b563b06b |
| SHA1 | 47157e4608ac7375544e6a59c7353f5bea8167f5 |
| SHA256 | 14bb01cde2127abdc8cbef51092d1327d4fc63d40b47ca4621947c0dd8475e52 |
| SHA512 | 0a610acf3ee1abcbb198d0d52de567d8c40d3460897ad9cb53d1a9cc463935b13c13e880b23716a429d8680794d24e1d1ecfce2f386e3861798bd03bbf1f8cf6 |
memory/1664-107-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/2544-109-0x0000000010000000-0x0000000010019000-memory.dmp
memory/1664-110-0x0000000002E10000-0x0000000002E20000-memory.dmp
memory/2544-106-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2544-111-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2544-112-0x0000000000400000-0x0000000000482000-memory.dmp
memory/1664-115-0x0000000074B50000-0x0000000075300000-memory.dmp
memory/2544-117-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-118-0x0000000000400000-0x0000000000482000-memory.dmp
C:\ProgramData\remcos\logs.dat
| MD5 | 7756873e99f8e943ad2813b4c46cdd58 |
| SHA1 | 38b5d3eb1e6416d7f9011d6ff576f3237ff93868 |
| SHA256 | 34971abe8f788894c36b66928be8aa973a5cae7f76fa575bbd8cd11484064772 |
| SHA512 | 49b176afc0a0893fd166c6c9cb8bc900d9409e7079dd632284b93eda6987ba3623169bb314d6b243ef802574ff16590365b711605fdc06430032c6e762740e87 |
memory/2544-122-0x0000000010000000-0x0000000010019000-memory.dmp
memory/2544-126-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-127-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-135-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-136-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-143-0x0000000000400000-0x0000000000482000-memory.dmp
memory/2544-144-0x0000000000400000-0x0000000000482000-memory.dmp