Analysis

  • max time kernel
    111s
  • max time network
    92s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-09-2024 23:21

General

  • Target

    http://lawyerconsult.top

Malware Config

Extracted

Family

remcos

Botnet

Back-September

C2

fullimmersion777.com:8090

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    hello.exe

  • copy_folder

    windw

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    rimcsl-94LESJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lawyerconsult.top
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff902d99758,0x7ff902d99768,0x7ff902d99778
      2⤵
        PID:2072
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:2
        2⤵
          PID:2848
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
          2⤵
            PID:500
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
            2⤵
              PID:392
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2676 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:1
              2⤵
                PID:1060
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2692 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:1
                2⤵
                  PID:3348
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                  2⤵
                    PID:1732
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                    2⤵
                      PID:2600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4700 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                      2⤵
                        PID:2924
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4584 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                        2⤵
                          PID:4132
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                          2⤵
                            PID:932
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4988 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                            2⤵
                              PID:4320
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4720 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                              2⤵
                                PID:5112
                              • C:\Users\Admin\Downloads\AUGUST.exe
                                "C:\Users\Admin\Downloads\AUGUST.exe"
                                2⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4708
                                • C:\Users\Admin\DZIPR.exe
                                  "C:\Users\Admin\DZIPR.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5092
                                  • C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                    C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: MapViewOfSection
                                    PID:1332
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\SysWOW64\cmd.exe
                                      5⤵
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: MapViewOfSection
                                      PID:2552
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4592
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                                2⤵
                                  PID:1608
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:8
                                  2⤵
                                    PID:4460
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:4936
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:1948
                                    • C:\Users\Admin\Downloads\AUGUST.exe
                                      "C:\Users\Admin\Downloads\AUGUST.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2228
                                      • C:\Users\Admin\DZIPR.exe
                                        "C:\Users\Admin\DZIPR.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:984
                                        • C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                          C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          PID:2188
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\SysWOW64\cmd.exe
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: MapViewOfSection
                                            PID:4692
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:4740
                                    • C:\Users\Admin\Downloads\AUGUST.exe
                                      "C:\Users\Admin\Downloads\AUGUST.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:4464
                                      • C:\Users\Admin\DZIPR.exe
                                        "C:\Users\Admin\DZIPR.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: MapViewOfSection
                                        PID:4492
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\SysWOW64\cmd.exe
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          PID:5040
                                          • C:\Windows\SysWOW64\explorer.exe
                                            C:\Windows\SysWOW64\explorer.exe
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2944
                                    • C:\Program Files\7-Zip\7zG.exe
                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\cmd\" -spe -an -ai#7zMap27064:68:7zEvent1006
                                      1⤵
                                      • Suspicious use of FindShellTrayWindow
                                      PID:1220
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c powershell wget http://127.0.0.1/hello -OutFile C:\Users\Admin\AppData\Roaming/hello.msi && C:\Users\Admin\AppData\Roaming/hello.msi
                                      1⤵
                                        PID:4304
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell wget http://127.0.0.1/hello -OutFile C:\Users\Admin\AppData\Roaming/hello.msi
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:932

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        72B

                                        MD5

                                        9883e2a61a892b54cb9b219d9e067887

                                        SHA1

                                        ccb02e4bbced428cb9ab0bd4c3aab4ddd5c8c92c

                                        SHA256

                                        bc038cefd187af1d73b60cf8b9eac32b3c47c69e0a913f6fbb6f87c8c57ec337

                                        SHA512

                                        0d108ec5f5227203eeb2138265ea47161d5d5b7a817c00e5f5a8751981a9fd610390295596647c75d31d82427d4d67496c3f9ab970f068a35dacf70e412fce64

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        c10f325ca18a2e95735398444955f018

                                        SHA1

                                        ff9c2a0e5ab5b24ea4c473ea2ddf2dd24c931e89

                                        SHA256

                                        815bf49e0787142ff6708efa48badbe365fb813e583eae1c9577ea240768e5fe

                                        SHA512

                                        f685979b0ac6864518aaff4ed307c9dbd6e9b00cd63d1a670ac2a31c137b21d1c02cc5406e430786ab40e0119ce370bde11ad6abb49b55e4410ce55df13b5571

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        3f8cac785f010e0701a0eea3ff07456d

                                        SHA1

                                        6f3647942777d4c921b9adbd3d92ec6100b413fa

                                        SHA256

                                        c7802b97b74a0ea94f3ff726a7bd1bc2f5ab74898d88458955bf27bb04a7a4fe

                                        SHA512

                                        cd50fec24efc1165e664fa29b4ad027b3cfc6163ca243ac35343f0e0c7893dc6bf168c9adfdcd9bb3636455efbf50b0ba22dbb1c36c1e388206fd7d82d3f9323

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        631abf66eea67b4c34cc005d016deefa

                                        SHA1

                                        1d8a04857bf458502ccb3b9140e422e886c95f47

                                        SHA256

                                        a4c1649d680bc7857df65865f1a363916be64d9a07f8888d0febefb3425d453f

                                        SHA512

                                        f9dbea5bb90b17a815c35ffec153afa63da2071d10d38143a3542dc7faffd878ed23c9ecb999bba4464a00d574cb3e39c7b15336e4f9585306ccce41e4f515f0

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        8aff928699917a72f93e6ec4bb64ec25

                                        SHA1

                                        dbe878f77e9d11eb031d335606177c4537b2aaa2

                                        SHA256

                                        5892908346c5453b47e8ba4543cfeaf69389f37d69c9df802913f56e0c82afd1

                                        SHA512

                                        4862c778ef0b047353543eb522bbba298e24f19b600b0c52a82a46d37a5e508c8781686a323cf9cc3e06768c7b77372b33fb01536b9a2ac268492b8dee524d32

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        136KB

                                        MD5

                                        09336c6c59173a330990700f9a0fb1b0

                                        SHA1

                                        a0dcc817b66586227e8661bbe01c84a7775e5f7f

                                        SHA256

                                        08e38ab61e8080a80f8e3af6d9efff9896a210f1a8d0f6342b4563945f0fafe7

                                        SHA512

                                        0dff6e7193e1260443beb858baaab7bbc8044332d39b161d5b8de8f8b3e292884d038003583ddb4cbcb3584ebb69c401d4060b6e419ce5c5978b9665b73eb624

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                        Filesize

                                        105KB

                                        MD5

                                        c6941a3878485598029e28d662099fba

                                        SHA1

                                        9ae3072dc4c9ef3fbdb0261229048a601c4a68f3

                                        SHA256

                                        83e71066c4f82b8e9ab6862fde6f21a667795b15af966cbd646f4eb3435ad23d

                                        SHA512

                                        66df0599358dfe4e984788deb51b32d9e5254a08a883127d824cd88807a7fbaac2300abd98bf0779d86fce0810eb68ac2195ef07520647ed8b0b76ac9d8cf4f0

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58ac97.TMP

                                        Filesize

                                        104KB

                                        MD5

                                        b6118afa453ad77e27ee334e61143980

                                        SHA1

                                        198993edd2036ff6753056d331fa370b326a5199

                                        SHA256

                                        2c04f056361f44444901bb81a9e05efdcb4e33aaf4a4b674ac5526c292d585b1

                                        SHA512

                                        33ab24ac93e87457bbeba913db4adc7d095bb86c3a48483f90d23a3c87247029ddb24e30212e61ed7ddd3273b74e7fc18e932cded8c0a6bbfb04a05831793735

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                        Filesize

                                        2B

                                        MD5

                                        99914b932bd37a50b983c5e7c90ae93b

                                        SHA1

                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                        SHA256

                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                        SHA512

                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                      • C:\Users\Admin\AppData\Local\Temp\718cced

                                        Filesize

                                        1.2MB

                                        MD5

                                        e4d7547f3b0c288582190e57f7f58111

                                        SHA1

                                        38377ae9cfbc1cffe33ec7f7bd8c725f9be2e25f

                                        SHA256

                                        d9a2e39e0627edfe897e7ffc3ec26b40bf52365bbb26e4ed38862a05b5704d46

                                        SHA512

                                        ee05f6056f807beaf6f8ce1633b49ba1e4bd1ca67338255486f5e73eb855e0dab8eef2b17d1a7a9c8357e822bbb452f379b389128408a3569c6a2a7e8a7d511c

                                      • C:\Users\Admin\AppData\Local\Temp\83288517

                                        Filesize

                                        1.2MB

                                        MD5

                                        32daafc9ffa19e1f8fe6c7af4cde97a2

                                        SHA1

                                        2458ee8cc5b774a11b6fcd1b33a47a4f1b118e77

                                        SHA256

                                        83f3179847705bd1d74dbf5c40544979c456444b2bab1b0f693428298c1068a5

                                        SHA512

                                        a5066ef086bb3a6631630a4d50e4bbffae1de5556a8c2808c45c581cb0fc29d55db8fad41fc90639cc299a361608f31a01751cd1939a051874b72710a7ea66ea

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d04sgvkz.y2o.ps1

                                        Filesize

                                        1B

                                        MD5

                                        c4ca4238a0b923820dcc509a6f75849b

                                        SHA1

                                        356a192b7913b04c54574d18c28d46e6395428ab

                                        SHA256

                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                        SHA512

                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                      • C:\Users\Admin\AppData\Local\Temp\e10ae96e

                                        Filesize

                                        1.2MB

                                        MD5

                                        174d2d3e016e6fdc298255823a606de8

                                        SHA1

                                        ad749fc432378426e25789e25d3b55fbbc903779

                                        SHA256

                                        c8cdc707944320080fc684a1c51d672c208ce781820472909a0ff1d33ca4aadc

                                        SHA512

                                        6db7e3e3ee36a927a87187933df538eece40fa5d28b3d65980fdb8de0ff608ede29424547800d6f5a347feadb1a0aa1e2b23f59390d63877e7c355d813e959a3

                                      • C:\Users\Admin\DZIPR.dll

                                        Filesize

                                        346KB

                                        MD5

                                        ad28d4167571382569d2384ffd7bd2a9

                                        SHA1

                                        efc7534bcb1645d4056702e073519f571d8db77b

                                        SHA256

                                        f919a8e63ec0f2f05ac01a6cab4088c13fbf14a38b071cfa9f710c9e069462eb

                                        SHA512

                                        8f28867b46dd7a801cbf70d8d7fe5f2bfb8654a417c40ba264faf81af8bb1a28e1a1200fdc9828a4a4c6df0a13817055290c16f9468d311b8d8049a2439348d9

                                      • C:\Users\Admin\DZIPR.exe

                                        Filesize

                                        8.4MB

                                        MD5

                                        ec9ce1d67f98072281015c7726fba245

                                        SHA1

                                        e89b16265acf4a251b527ddf22830f2650987263

                                        SHA256

                                        9ab4145d5525ae741b80f4e66f505abba59adcbe01868dfef84fbe4450634cc1

                                        SHA512

                                        21db8f3ae325021589de9c2489ab2ce6814722a17a92476a56147478aa9767ce5c4769169f287060cc08ad76019178ba547fcef32074ef1afb1926845e7158e1

                                      • C:\Users\Admin\Downloads\Unconfirmed 51200.crdownload

                                        Filesize

                                        4.6MB

                                        MD5

                                        25860926414bf43383246f7c773a8d6c

                                        SHA1

                                        760390a4a14df085f4c841067f52c79409cdc93e

                                        SHA256

                                        a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958

                                        SHA512

                                        61825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07

                                      • C:\Users\Admin\Downloads\cmd.zip

                                        Filesize

                                        1KB

                                        MD5

                                        366c282c7a62e3d9c015712e853b8306

                                        SHA1

                                        ddd78e90728521a9900efea258be422dced9db0a

                                        SHA256

                                        3df71d7698545780cb5b0e5d61dc514e093ef824ad99bf6a57594ba3ca9620c6

                                        SHA512

                                        f9ad50a6c1e97a864b428a5850bf0b9653dba7f734ee0758a7f51c72a0c261c1f4540cd042ac5c9d49810dbe614b8c1ff3834497842f47acb314cfe886a1a06e

                                      • C:\Users\Admin\ekqqtq

                                        Filesize

                                        952KB

                                        MD5

                                        4649f3a4e58c6040b07f6d486c149a71

                                        SHA1

                                        64f8fc631c5fb4e5f6bc20c207047d8e2b500587

                                        SHA256

                                        5d81ca77492946aa2cfe00349342de8cceb317d8649bedbfd95992dca885f184

                                        SHA512

                                        4e1b229d30403b594e992fe0893e568161c8d901fe20461093d11159ab03b5dd410d1834bc64ac4ccc39d4f6b072946703f06eeb982d79b1c9a1b773b57013b7

                                      • C:\Users\Admin\ipqtwm

                                        Filesize

                                        70KB

                                        MD5

                                        f125e72b3968ca233ef3c7e2f4db34e7

                                        SHA1

                                        4fb34044ef18cedbd3ede4272c44416d3f11735c

                                        SHA256

                                        ced30560c6c0fc15cbdbdbc0d480dca6b41ce3183057e43b419dd6814a33db92

                                        SHA512

                                        b645d1eb685a69b9ca9bbdb1f4638af8ae151ddfb9527c423f7779971246ed60f981ce26ce8af2fc7b63164e7c13e9c6e98a7f148831a1e59318e60e5a39f881

                                      • C:\Windows\Tasks\lnfast_x64.job

                                        Filesize

                                        280B

                                        MD5

                                        07ffd26e875ec1713b4c00e881700143

                                        SHA1

                                        98cc5bd54c1c6a8dbabd2146227e81114434670d

                                        SHA256

                                        0cc329fcac6b775dddc649da8fb9e09414182f79bacae46e25584f94dc1da6cf

                                        SHA512

                                        6444daad44721dd20520bde5896ede02b41bc4b1f9ff3f475c333f1a796767f19b3d786c6a3beb58d254726e9a5b03a56cc2ec67536f4db8cb31c2fa996ca5f4

                                      • memory/932-289-0x0000020B7BA70000-0x0000020B7BBA8000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/932-249-0x0000020B7B290000-0x0000020B7B2B2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/932-252-0x0000020B7B450000-0x0000020B7B4C6000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/984-121-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/984-128-0x0000000000400000-0x0000000000C69000-memory.dmp

                                        Filesize

                                        8.4MB

                                      • memory/984-120-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/1332-90-0x0000000000400000-0x0000000000C69000-memory.dmp

                                        Filesize

                                        8.4MB

                                      • memory/1332-88-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/1332-85-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/1332-79-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/2188-146-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/2188-134-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/2188-135-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/2552-94-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/2552-101-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/2552-136-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/2944-216-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/2944-231-0x0000000000400000-0x0000000000484000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4492-174-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/4492-175-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4492-184-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/4492-186-0x0000000000400000-0x0000000000C69000-memory.dmp

                                        Filesize

                                        8.4MB

                                      • memory/4592-188-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-157-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-291-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-217-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-197-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-290-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-232-0x00000000004E0000-0x0000000000564000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4592-152-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4692-153-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4740-193-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4740-194-0x0000000000400000-0x0000000000484000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/4740-200-0x0000000000400000-0x0000000000484000-memory.dmp

                                        Filesize

                                        528KB

                                      • memory/5040-190-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/5092-68-0x0000000000400000-0x0000000000C69000-memory.dmp

                                        Filesize

                                        8.4MB

                                      • memory/5092-61-0x00007FF90EED0000-0x00007FF90F0AB000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/5092-60-0x0000000072610000-0x000000007278B000-memory.dmp

                                        Filesize

                                        1.5MB