Analysis

  • max time kernel
    320s
  • max time network
    321s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-09-2024 18:46

General

  • Target

    http://lawyerconsult.top/AUGUST.exe

Malware Config

Extracted

Family

remcos

Botnet

Back-September

C2

fullimmersion777.com:8090

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    hello.exe

  • copy_folder

    windw

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    rimcsl-94LESJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lawyerconsult.top/AUGUST.exe
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1715cc40,0x7ffa1715cc4c,0x7ffa1715cc58
      2⤵
        PID:3924
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1768 /prefetch:2
        2⤵
          PID:920
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2100 /prefetch:3
          2⤵
            PID:4780
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2188 /prefetch:8
            2⤵
              PID:3128
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3028 /prefetch:1
              2⤵
                PID:2288
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3168 /prefetch:1
                2⤵
                  PID:2332
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4840,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4872 /prefetch:8
                  2⤵
                    PID:1560
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4792,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5012 /prefetch:8
                    2⤵
                      PID:1508
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5204,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5196 /prefetch:8
                      2⤵
                        PID:3052
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5024,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5312 /prefetch:8
                        2⤵
                        • Subvert Trust Controls: Mark-of-the-Web Bypass
                        • NTFS ADS
                        PID:4348
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4144,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1000 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3640
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:1852
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:348
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:5040
                          • C:\Users\Admin\Downloads\AUGUST.exe
                            "C:\Users\Admin\Downloads\AUGUST.exe"
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2816
                            • C:\Users\Admin\DZIPR.exe
                              "C:\Users\Admin\DZIPR.exe"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3936
                              • C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                PID:3780
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\SysWOW64\cmd.exe
                                  4⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: MapViewOfSection
                                  PID:1104
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4364
                          • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                            "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UnprotectWrite.xlsx"
                            1⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of SetWindowsHookEx
                            PID:4380

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                            Filesize

                            64KB

                            MD5

                            b5ad5caaaee00cb8cf445427975ae66c

                            SHA1

                            dcde6527290a326e048f9c3a85280d3fa71e1e22

                            SHA256

                            b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                            SHA512

                            92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                            Filesize

                            4B

                            MD5

                            f49655f856acb8884cc0ace29216f511

                            SHA1

                            cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                            SHA256

                            7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                            SHA512

                            599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                            Filesize

                            1008B

                            MD5

                            d222b77a61527f2c177b0869e7babc24

                            SHA1

                            3f23acb984307a4aeba41ebbb70439c97ad1f268

                            SHA256

                            80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                            SHA512

                            d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            fade41a7dcc05bbd27d8214d5519d8be

                            SHA1

                            b8639b35d8cf0747e9139766deed277f74c9b024

                            SHA256

                            15c56a07588ca8b63e183b9ca0dec431bb18364731c5aa7afdccdcad97cd2887

                            SHA512

                            e5140c110e91e1f9d858cea31be60a86f2544239e718a9fbb997d7a2508c4c07cadb47a846ab96b11dff97822e9e7113ce705494a9d72327532aabc26f803e7c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            962B

                            MD5

                            75ee4ddfbed0297ac7edf4c762fa5a5d

                            SHA1

                            bc1cd92f87e55ae3b289f09e693c23142a4954b7

                            SHA256

                            53f664b0f5464ac838b2a39ddde94469255ac7dda2cc625ec1aecbc89144697b

                            SHA512

                            765ae001387e413d1ed75c22ca04a38e026c8af527b68a5104d66bda875cbcb0c41e5aded5f065a9bc832f946010cc79265aeb5ea5406e82f6c04d62fe203876

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            2ca710cb3574c7bd3d1e743dc6e43c10

                            SHA1

                            934980ff39f7427cdf1dd50d698d3f681262bb97

                            SHA256

                            45cb8cb88a1312e1c79e88b96bfd2b82d19ce35820d4366b547ed7d43a4eea4f

                            SHA512

                            cf63506958926316a656a0fefc3610e936f5294a82809a0372b31188c99d8e6f1fe961fbcf06cfd78f9bfadfc7d95cfe6b827445ae6cca358b54cf8e04d4c23f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            c7a1572fa83c7bafacd4445c472ff2a4

                            SHA1

                            83894bf43d8527855992f0a98bdf6c52d27418e8

                            SHA256

                            644938eab2e076f2b774094390326e40eb853124cf47258ae9c8ba1725c2f60b

                            SHA512

                            a0ba352343d7d89f7261705b773a550bcf8c5f6f1b236c6855aa7e3385e8fec275900a719fb7c1a5ffef856346b39bb6a5df6c5319883b722440978d21d63ce3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            88fc4513bb1588c83f8ae7322159fa4d

                            SHA1

                            5a7af83c355581c792246320b8712c86f82d7390

                            SHA256

                            a54d514361654ba6c2092d71bb8bf5159614c3ec45508cb6706a3c1615584dcf

                            SHA512

                            6af24a59797f86019e94c8d57fca83f754b40986c1771c85a72b38f75c6eb85ab21c76067bd64dcfcc41ce659099d6a2ee516cba83661933b0fdf672ca83364f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            90e80ae03e440bf98ad96fadf89744b7

                            SHA1

                            69a4364a9da1bb263869ab6d927f524cd8774f5b

                            SHA256

                            06c5ab2167b1de9361c3ee2d3f3b2d67f0f067ecf0649b6b14fa5ce317f4e2d4

                            SHA512

                            8e386a92b7d7b2b5e7c962a88c2bf8e28fe882f697ab795001c9375c8822fa9efe43e38f4e381633312aa203a8e41e42728d434be3fb8439ce4be1c7833df72f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            5834701549efc1c5c8e6162a49f8e1fa

                            SHA1

                            f9c77c2e90087d9e6c48910cea7c46483ca57290

                            SHA256

                            c071fe3b1d1a03f9c7854456916d57fd43ac1804cfe0faa23e784888fe7544fc

                            SHA512

                            70d0c5e2a863942eb7c32f4d02fee842f63a396e71072c62d33f88c965389c4f873ea9491d8156ff5b79de4f9c0263b920fb5615fe90efa4369fef8a9c8e0368

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            980d8633150fd7f884acdedf2d9ec044

                            SHA1

                            c15f1bab28bc105e2d7ee54f9ad4b7f1cf46154f

                            SHA256

                            787592454a563288d6a213285b8e081d74bfe70fd55b7361360c6b5489055d3c

                            SHA512

                            1a407a1dfb9b353bb8aa0ddee4eab8bc4a44095e3f270432a5277edf0db7b3ec5311ee673b63f2c67cd0723845d45a08025b1e5bd50003833e8942f03a197470

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            3fef15e77851a83a14c702ab289753e9

                            SHA1

                            071fa59b379ee98e57ef6b8b71133016de145747

                            SHA256

                            96e4f181934e9985aa8934cbe8010064259657ad2ea96b3b1a0c2f54e2056c90

                            SHA512

                            afca7cf687977c2177ad534259bd3a78f391802cbb61a1de010179296782e23377326eb1a2f6f7a246e3b2a296a55c6269b44342bcc4c4974c09f64f32442cba

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            58f4f8503c39ac40181d43b763573eff

                            SHA1

                            553d42ad25674933d75979cfe9c23fb364786661

                            SHA256

                            6c327d009cef49077b752bc4cf0924fe8e165e19e0c195d98de83108d011491f

                            SHA512

                            89c499a186f314687cb1812383e169fd6971027cc6114757fd41fb30695fd5162f01d132b0a6301a14b6411df0be47d5dfcdf456d9923100e3aabfecd0083090

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            5d093a0fd7280b9c86db98b70b2d6a00

                            SHA1

                            7232136d3bf1ce7f230922d837530d54cce02993

                            SHA256

                            f21a5ad4f09698cabc47ad24af957bebca00b375199382ab9732425556dd0a89

                            SHA512

                            23af2356c249d6434d58773f81bdd26cea00d402d73f144b2cffb94a03640ca6c2eaea5836490436af88639d814df704ba620fc87faf480ce1f11454c1808682

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            49b5242dcd770a10b8e91e0dac5d9ccf

                            SHA1

                            3f4036a88580be1dd6f47349eba8963e844aa532

                            SHA256

                            496596c968f49acffad6171d229b1770c3a408d1181d4581c7e9bc1758c8d0a0

                            SHA512

                            b38d911928d88316eb3ce813fd2938fe59084ddaa1b48c9aebc19a5bfa817115113ba63f2020d78df004df814a7e093ab4030e481e18aed71bccdd31cb90d476

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            f7b8acd4bec24680fe34b47097fc4b82

                            SHA1

                            64614e5bf491a02022476e22fdb2106d232a492e

                            SHA256

                            bdcfb3e86f7dcd44fb559dfa2c57b121b671c7c03254a2c411b45ce6c6fa5d9d

                            SHA512

                            45da876fe8de37880d92c7f0859f18e731ca7292c0451f0c40029eb5e9e3c1fd0cee30b5a46a75b82e09880bb8ff408cc054b7655a9434742cf26c274e40d797

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            e36db221540cdf356c266b2653f7ab1a

                            SHA1

                            4111e238033f59080c95f41de801be522c4d1754

                            SHA256

                            615460dece94f94badf54de025346b14859f61ef118965c80b9d5fd42bf308db

                            SHA512

                            6679c2212f30f0ffc80a501fd8165e3b950cb6e1d53721a11aabedf3b6ca4eb9027460da4d907459ee4b42dd328a2a2660d4d45d701633c73279380780ba7e0a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            de204fcda7c674bbcf67a72842bf0040

                            SHA1

                            1d66fde3402ce74aff29ee72f002575c9d7bedae

                            SHA256

                            508af04ae3cc17741f0ffe5bede55fc3c23163677114d4e93c9c41bed56eb76a

                            SHA512

                            148688c4ae282b1817cb9f82f9e747468cb895070122d477daaa0ffc769621d1a4245fea78efdc3995d826369b7b75a9539234715fb8307ecbed077178a6e8fa

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            deebd7e3c27875f11a59d2535f89acc3

                            SHA1

                            44627ff47398ef0bab49824b7e6773ef0f42ab63

                            SHA256

                            0da73ee6f5d108658d1abf749436531a3d3461c8ead3787d8143cb03a296a0cf

                            SHA512

                            ead8a31178c1de3d9a455432305944427b2bc512bf172672ccf8000d6c3d6f2fd39d3118ab9ea07f6feced7c64651298430f3b2320bfbd9d48be01c6a05c2563

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            e41d8f558a03f90f517c0a70791c23e9

                            SHA1

                            402a16a42c06f16953fd997b5c3d3f0f04a30161

                            SHA256

                            e55a15e03f80c13e19a15cf760294d28b9aedef687b5fb2e316622d48c51dfee

                            SHA512

                            164cde642326e5604ea61da7a8421dfeab6ac4f4b3d771161492b8d0b0dcfcbd481865e45e4446398031d21087c7c8ddce854a1806882f2801c69cfc178e2348

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            3cd13d1f768aa7595fc60f22161054c7

                            SHA1

                            453e3526b8c984a8e6fcc5ff0ed28ba43ae63016

                            SHA256

                            fdfcd314a6390a78423860f8a4fb8a73e0734ea63edaa9b0819be67e0216d40d

                            SHA512

                            882ccef22df5df7263aab2d9b2ed40caa68a419b1031a0d2c4760825af92d27900e43eb2b07c230688cd84660f7651dcc47b9ebbb3c1b7b9e5e1f3e42ae50954

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            91ebc8305df05784cee10e46b206bf14

                            SHA1

                            6e88b867ba6c077825e047c067fd27c75a472122

                            SHA256

                            ef18d1e29d9805eaad78ecd6e21e1e7e98436e2c26b4e852fa3e3cf238786589

                            SHA512

                            c305475b2dc14715ae1e4e1805c0dde67f33de7a19c4420130c8a600a2e758bdea9dab5e5ab545c63b207cc044abde11d87a9417023ff5607326ea8169670991

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            6b34e6fa60dabeb870e7f6a1e0299e38

                            SHA1

                            20955ef7ce1bd593c9b2a8f21922513cc0025977

                            SHA256

                            62595df2e41d3b5979d4279b2c56a30465771e5f5bce3d9210d673fa9dca7773

                            SHA512

                            414ddac2b15121df8ad02bf1870fe4d4c773a85dc2f27cec8b25102f28d861401f23e93fc8ebe66d81e5277470e465183e78fa92a1d32b826d8a6ac0c77ea82c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            f2809e663e35d03da4eddf7cd90bc8aa

                            SHA1

                            3a14505a46cc28bc30469767875bfa77821429aa

                            SHA256

                            965f8af67c3551ad52873d9d57bba7f0e22b3468524919a42102528e5df680be

                            SHA512

                            769f5921ee4a59fb74b1f50b3151f7dc9656e3d8684b0fe9a7535bb36fe619fd385067c1a4ca6469bc839130254d70cc77945b1dcbc95282cb64d641d9ba7be5

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            195KB

                            MD5

                            5fa6700c80626682fe68b34ea1d49300

                            SHA1

                            cc33bd8b93ffa48142b19a0dc43fee6f3d820398

                            SHA256

                            cb2be85d5804540b72e354651db466e6fafc70edb261c1bf62d75a7563e0ebef

                            SHA512

                            4b60e3f6acd616526b4f79dc5c50a627fe72352da8e9005f95939aa89d73a62f7970b1f4d3286c956d7f56a333496af2bfe20140b819aaf1572cd18f706ad03e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            195KB

                            MD5

                            d70541fef19548c4daca5d4f961b6040

                            SHA1

                            5fa63a7c4bc106f1f0dc7f5d00b7ed9ba49bcc1a

                            SHA256

                            9c32091f6b4924a96b016ba4598366af1c928460ba8755fe4fc339bae5b5b363

                            SHA512

                            101f75a7fb12f9cd6788aae63b6a5f335f0827abb3915e02f7bf24e608c386ecb7682de31fbabec842ab3ab0a237bc560828f5b36274639f4ece161b99e2d229

                          • C:\Users\Admin\AppData\Local\Temp\7f75d136

                            Filesize

                            1.2MB

                            MD5

                            e3c1305648943696e29d87f538c0fd04

                            SHA1

                            3becb5d187abdae23dc3c07e3397ced024462fc5

                            SHA256

                            c47c0a8609bd173015aa8a0cd6df0841184d568207ef116c5eae5a220e0403ae

                            SHA512

                            e3296d6b66ab8fdaeef4a55c31160980284e337cfc416427612a6a09f97ab8612788fffede61a59801a10362495bc17158bdd2f6e601bbea62a2d2b1d1cb5d8d

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                            Filesize

                            274B

                            MD5

                            df1702034e379527708dc1d5d2dbe820

                            SHA1

                            22b3a8fdc7dabd2c179cfbff8f8f7f8921e4a7f9

                            SHA256

                            010b466a9daf3d09c221128d14b4240b8f03fc8f7e241ff39c0133f5d28d4956

                            SHA512

                            7abe0b6786aa1fbc64cae396b885c5a271131c619eeb43ba9774e792c588e322efd49bae08c2e2f796be8e5d62e9a96b219b7827e60388152861516b3113845c

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                            Filesize

                            1KB

                            MD5

                            d868fc4cf7b943a81418c3e5cac9f5f5

                            SHA1

                            e30337e5f53c69a77c8f250cd5a34cfbd3ef3ed9

                            SHA256

                            b452740a6638deb578890890ea2efccb1753412e496a19e2b1c424d35dadd24d

                            SHA512

                            5398f742b81af720e736097c9a97cbb09fce7c48d9527e3af49e17a6f27da9a9662b634019bcd22b4c898a0ba4bcd7ba583ee84b132da792eee83eaff0213d28

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                            Filesize

                            1KB

                            MD5

                            b3fa2dc696854ffc69aa9e1fe5a17ef7

                            SHA1

                            fe2e6bc59bb6296dab5a68a3a9864af58b6a745a

                            SHA256

                            87ba807acb532172c42506b7e8a14f0c54779989459960a6fdbab901d3bae8ac

                            SHA512

                            79453346e6124952738804791904455a1518321cc4fc972f33980ad45fb8e416beaf0a78614c3c80bf5c5e601b62a6daa9ad393f90831fe3441ea666e9b993a2

                          • C:\Users\Admin\DZIPR.dll

                            Filesize

                            346KB

                            MD5

                            ad28d4167571382569d2384ffd7bd2a9

                            SHA1

                            efc7534bcb1645d4056702e073519f571d8db77b

                            SHA256

                            f919a8e63ec0f2f05ac01a6cab4088c13fbf14a38b071cfa9f710c9e069462eb

                            SHA512

                            8f28867b46dd7a801cbf70d8d7fe5f2bfb8654a417c40ba264faf81af8bb1a28e1a1200fdc9828a4a4c6df0a13817055290c16f9468d311b8d8049a2439348d9

                          • C:\Users\Admin\DZIPR.exe

                            Filesize

                            8.4MB

                            MD5

                            ec9ce1d67f98072281015c7726fba245

                            SHA1

                            e89b16265acf4a251b527ddf22830f2650987263

                            SHA256

                            9ab4145d5525ae741b80f4e66f505abba59adcbe01868dfef84fbe4450634cc1

                            SHA512

                            21db8f3ae325021589de9c2489ab2ce6814722a17a92476a56147478aa9767ce5c4769169f287060cc08ad76019178ba547fcef32074ef1afb1926845e7158e1

                          • C:\Users\Admin\Downloads\AUGUST.exe

                            Filesize

                            4.6MB

                            MD5

                            25860926414bf43383246f7c773a8d6c

                            SHA1

                            760390a4a14df085f4c841067f52c79409cdc93e

                            SHA256

                            a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958

                            SHA512

                            61825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07

                          • C:\Users\Admin\Downloads\AUGUST.exe:Zone.Identifier

                            Filesize

                            26B

                            MD5

                            fbccf14d504b7b2dbcb5a5bda75bd93b

                            SHA1

                            d59fc84cdd5217c6cf74785703655f78da6b582b

                            SHA256

                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                            SHA512

                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                          • C:\Users\Admin\Downloads\Unconfirmed 330882.crdownload

                            Filesize

                            3.3MB

                            MD5

                            deef6c92694c8b75c065c76f8c25757b

                            SHA1

                            cda0424e80a79c0b9ed8d9e8690a3ab4d63ac854

                            SHA256

                            2017c397fbd9b2b6f0213df9401c3c8e6f98853cc323ec8a1a2ce2549dc51ee0

                            SHA512

                            d9c10a20cd99c0fd9b856aaa1ddad87726f14000dafd2d581d49b3c800b50b06afc2496d2adb9bd49b5455d03c6d7675ab0468bf87ac19db92fc28f601061d38

                          • C:\Users\Admin\ekqqtq

                            Filesize

                            952KB

                            MD5

                            4649f3a4e58c6040b07f6d486c149a71

                            SHA1

                            64f8fc631c5fb4e5f6bc20c207047d8e2b500587

                            SHA256

                            5d81ca77492946aa2cfe00349342de8cceb317d8649bedbfd95992dca885f184

                            SHA512

                            4e1b229d30403b594e992fe0893e568161c8d901fe20461093d11159ab03b5dd410d1834bc64ac4ccc39d4f6b072946703f06eeb982d79b1c9a1b773b57013b7

                          • C:\Users\Admin\ipqtwm

                            Filesize

                            70KB

                            MD5

                            f125e72b3968ca233ef3c7e2f4db34e7

                            SHA1

                            4fb34044ef18cedbd3ede4272c44416d3f11735c

                            SHA256

                            ced30560c6c0fc15cbdbdbc0d480dca6b41ce3183057e43b419dd6814a33db92

                            SHA512

                            b645d1eb685a69b9ca9bbdb1f4638af8ae151ddfb9527c423f7779971246ed60f981ce26ce8af2fc7b63164e7c13e9c6e98a7f148831a1e59318e60e5a39f881

                          • memory/1104-169-0x0000000073FF0000-0x000000007416D000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/1104-167-0x00007FFA25E40000-0x00007FFA26049000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1104-203-0x0000000073FF0000-0x000000007416D000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/3780-148-0x00007FFA25E40000-0x00007FFA26049000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/3780-165-0x0000000000400000-0x0000000000C69000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/3780-147-0x0000000073FF0000-0x000000007416D000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/3780-163-0x0000000073FF0000-0x000000007416D000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/3936-133-0x0000000073060000-0x00000000731DD000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/3936-134-0x00007FFA25E40000-0x00007FFA26049000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/3936-141-0x0000000000400000-0x0000000000C69000-memory.dmp

                            Filesize

                            8.4MB

                          • memory/4364-311-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-353-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-273-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-384-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-285-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-288-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-289-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-290-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-233-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-300-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-301-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-374-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-236-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-249-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-321-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-322-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-364-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-332-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-363-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-342-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-343-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4364-223-0x00007FFA25E40000-0x00007FFA26049000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4364-272-0x0000000000400000-0x0000000000484000-memory.dmp

                            Filesize

                            528KB

                          • memory/4380-178-0x00007FF9E3C10000-0x00007FF9E3C20000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-177-0x00007FF9E3C10000-0x00007FF9E3C20000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-175-0x00007FF9E5ED0000-0x00007FF9E5EE0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-174-0x00007FF9E5ED0000-0x00007FF9E5EE0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-176-0x00007FF9E5ED0000-0x00007FF9E5EE0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-173-0x00007FF9E5ED0000-0x00007FF9E5EE0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4380-172-0x00007FF9E5ED0000-0x00007FF9E5EE0000-memory.dmp

                            Filesize

                            64KB