Analysis

  • max time kernel
    420s
  • max time network
    419s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 16:44

General

  • Target

    https://bazaar.abuse.ch/sample/f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b/

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

192.3.101.137:5980

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-DO8TMQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bazaar.abuse.ch/sample/f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b/
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5a86cc40,0x7fff5a86cc4c,0x7fff5a86cc58
      2⤵
        PID:1852
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:4936
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2172 /prefetch:3
          2⤵
            PID:1472
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2464 /prefetch:8
            2⤵
              PID:396
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3164 /prefetch:1
              2⤵
                PID:4464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3440 /prefetch:1
                2⤵
                  PID:4484
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4560 /prefetch:1
                  2⤵
                    PID:4020
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4888 /prefetch:8
                    2⤵
                      PID:1728
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3372 /prefetch:8
                      2⤵
                        PID:4192
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:5064
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:1072
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:3608
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap20562:190:7zEvent23156
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:1544
                          • C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe
                            "C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"
                            1⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2704
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"
                              2⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4696
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JhWUOJ.exe"
                              2⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1668
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JhWUOJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD889.tmp"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:1092
                            • C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe
                              "C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of SetWindowsHookEx
                              PID:2328
                          • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                            "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\PushConfirm.xlsx"
                            1⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of SetWindowsHookEx
                            PID:3608

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\remcos\logs.dat

                            Filesize

                            222B

                            MD5

                            88a3b7805392ae7a8f1f898637a350cf

                            SHA1

                            be03526b35c23b79156378d156be61ebd3212a6a

                            SHA256

                            16b5bf9457aeb3ba4767124f1539eaa04c9494f45b3747a53d0633bb423b2b30

                            SHA512

                            f2d912e190f23d03ac8f0975519e6e0fb21a7898ec24302b31376a65d08bfc483569a0631ee5d0c43276f32bf9fc12a12c3c0e03a474cf0bec91b93643d9128e

                          • C:\ProgramData\remcos\logs.dat

                            Filesize

                            446B

                            MD5

                            3bb7f5a2a70c622d2686bedaa916bf06

                            SHA1

                            3ff90abb8a545a8e375045a44f8800e273f47460

                            SHA256

                            b5807c8433515c64e6c34128c513e0803b50fa996c3d20213ae0d0b547738ac7

                            SHA512

                            dd2a50ccab6782e9b2eda616fb9ca256b273ab796350943e45f3c68b5d637a82be7613c67882f429aabcd4bb8dab7b97bfbb9846e7238320b07a4b7b6878ee18

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            3209040ef508258e33c30470f0a32451

                            SHA1

                            b7f5e4101f9e90a8b1796486af7975bde732b068

                            SHA256

                            af4eca6ef82443446a81144173f4953f34d959cb82ffc406a553ee0245236085

                            SHA512

                            9867340a3ade625c1468c5557cae75b2666015b46e64866909c1f6c3ebd6321bdf9e086294859cb825140a73fe14101f1a7b83e16ed484197d8936b5c2f227fc

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                            Filesize

                            213KB

                            MD5

                            f942900ff0a10f251d338c612c456948

                            SHA1

                            4a283d3c8f3dc491e43c430d97c3489ee7a3d320

                            SHA256

                            38b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6

                            SHA512

                            9b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            480B

                            MD5

                            59fcbcb22a276f4ff79a44440fc600cd

                            SHA1

                            2c63eb3b098f6883ac92a440e46ce2e8268b5db2

                            SHA256

                            a4fcc09f5bf387332520b441a7f2874068775f17da41789088722f3aec0d550b

                            SHA512

                            2bab59be3a3bc5211ec2d4794018d83e3828763d99d9d44b605be18ebbcdaf980d9ad52e3ffcc2d1f101536eab86f20d6fa22045194d75b4667c3a51a2845b14

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            250c0bbe4fae3e2da68ce611c55d82d0

                            SHA1

                            71089566fa308accb468b1c5d0515b7b9d15b9de

                            SHA256

                            8fd770f44d3b2762ec3f253e96164b9da125dcbee88f74039180ce6e32f6d6ef

                            SHA512

                            4cfaec5fa4469ecdae4c764e6c34da16bd63aebf7ebe32c2e8082b0da2e0c915d507e94e3569d6ede09de4e6fa69ddde2567d7731b8208b240220b89a382850c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            688B

                            MD5

                            5bf8e3a7f14f0f1dbbe6160c370e84a3

                            SHA1

                            186cf0e30c09167cbbc4038b60320cb09beee717

                            SHA256

                            9305f10140cd5a304c1bd238728bca990a67fd5961a5d41dfbc02cab22b53e2c

                            SHA512

                            d2f43cf336579d1f18f47f0ef8e03921784c4760736eb50007af72f0590b4924f06220ac7673e63c07601b3121112ae194d79b690ed9fd280687803dd0d7b65e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            688B

                            MD5

                            647cd182f7cf3f45f99b1d1df39a65ea

                            SHA1

                            832ec069bfc7b14160876032e2184ab9857ff7f6

                            SHA256

                            90aa04ec85e983e29403e80924458ab9c7bdaf7e77bba02bf59294cc20954048

                            SHA512

                            26f0ce4dde25239e347a19fb7c9b961521252db97aefeb52f7e1143edc70eea288da35c6d105354c574bf81a95f9dd62e24edc4c1353d137b32df51dbbb57ecf

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            5cd3e67646784a8a6ed64af9cff7a95b

                            SHA1

                            a1ceed3a649e313120d781bdf39b14edd8afa024

                            SHA256

                            cf9962459ccd7b9adfbb1fec667b8ecc3cd606110d1a782002da050ee11ae0e9

                            SHA512

                            2d618b5cd806e31cc43eedb3ba986229df0bba91f747fd114e7af0554c3375b028ba9d3c5d02f5db3071ca207784793e9fd2e3917e7334a46fbb697eeb368edc

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            c05f7ad95e788761ca260b1e2526b3d8

                            SHA1

                            cca338c2b0ba0589826f1ac9479fca60c81e214b

                            SHA256

                            ec390cd159fbdbea43eed59d03841e3a7c45f482c949dd6c0bfb5365db8883e9

                            SHA512

                            4de8208784d10d625de59b3c69859df0b98a33bfdd9eef5125c2e6938ed85ef1223688fdd2ae61157fd0e68c6df81ad2942425572474270d3736c5c2c49dd654

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            42113c08fa18ce0fa775e939d102f0d6

                            SHA1

                            232f85acf9a07f10af58f70fb4847fc656530b9f

                            SHA256

                            db5b09071304bcfea5debce02485517a7c43527b07c8da5747630536e0a3309c

                            SHA512

                            25d377629a4715939a5be8b19f7f180305b753d2761c2f640dedf9918fad97a4a587c0340ba4fec369c2325e1ebdff3b2695c25539073b1f70d48b73f8b6e17e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            35a2f995d0d18f57e0ded5bafc9772b4

                            SHA1

                            84302fbfed3fc22b8dc0babceb47bbfe6698e783

                            SHA256

                            c4afe3a9f7d24d7103a8cd6b9218ee3478f2f4d7f254d214645e2409d4c27dce

                            SHA512

                            936f633800b63034580ababc65709950147c36d66d8af6d2707733b846253bacba971d4646832504481f89094646ed3c7c59ca582c0195b9f351b7e637e9621e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            968cb9309758126772781b83adb8a28f

                            SHA1

                            8da30e71accf186b2ba11da1797cf67f8f78b47c

                            SHA256

                            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                            SHA512

                            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            18KB

                            MD5

                            de28a7f9f993c51952133457a642c5af

                            SHA1

                            63c057f70c06769f1e548781d3a774c523e85d2b

                            SHA256

                            1ced593465d45aea24d9e21ca2a5485e743530229da59e51e85efb2faf7ed09f

                            SHA512

                            fa360a7769d1ef5378fd20474a8db64f502a20326c395f342f23961cf505b476c11d7fd51f35a7c6c6501d7ff0472138336564af66e0b8c7c1141531fb3f8f0a

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_stemgwi2.fpg.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\tmpD889.tmp

                            Filesize

                            1KB

                            MD5

                            86e67ed09f3432523ac3116e9725e8f8

                            SHA1

                            ba1a5d6fe96ef3683fd0d793d80de55964406a38

                            SHA256

                            23fb7743692d006f8dc235f9374708900359cbf51c88951c0587b1cc14f3eb1b

                            SHA512

                            4ce01f87f8529c29de0caaf20f8184a4aa323e982022478e910861a4693c65f29e81707994a890de3982affba4c8a45d3e41a274423a9c2ef80b72ad08c60c6c

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                            Filesize

                            319B

                            MD5

                            a9c306eeceabe78204b398c3b109df6c

                            SHA1

                            3db4fbda845c2b4cc720a6ccaf385d1d524ef2b0

                            SHA256

                            ac04d34695bbf5ae91a4ad5cc21c04b975e9d6406080289497269142671ccb57

                            SHA512

                            3fefd1b46aee55519447ffdd3000f308b8751786a94153ce348fdca7a5f286e7e0d543402ee32d8cf04062bed9b6c1fcda94aa7021253e4d844ac09dd7df38af

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                            Filesize

                            1KB

                            MD5

                            be701c3b08f5218a930be288cad25593

                            SHA1

                            b89c166ac8c0607c599ccb13ff68b3a18321dc28

                            SHA256

                            08188cccb8aa021f4b0e93a8b13fc60ad1c39751abc75d0ffbfb680af6c24f0d

                            SHA512

                            b3e332b0c7420bbc1c094a802a3b1018f59cd3092a143296f6e4967bff335b6227eb8a63b72d0f5514f1c5bca018c60a0adb167c0ba8cade46a69acb07763285

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                            Filesize

                            1KB

                            MD5

                            e2af71ccd1439f3b1a76f7d824af28de

                            SHA1

                            e2dc2820d4d686364a3ba4ecf9a98821696e808a

                            SHA256

                            e7476652a0e79d02bfe49479e97ef5253f9cf1c7d3bbcaa552e71a34d6769459

                            SHA512

                            fae059acc3e4aa213e196c02aea8dbbd0d5bcf28c833bb2e671d543fbc274eecc7074b0522df6fddbf59e72f32f7562d7f3ca3c7df600828e6f795a0c99ca037

                          • C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe

                            Filesize

                            908KB

                            MD5

                            7b9844639ef183122af8383ce901b8e0

                            SHA1

                            87514d622f74e94720cd77243326dd8c8217dfae

                            SHA256

                            f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b

                            SHA512

                            c98ad33821fbe4f71480a3ea36133d47dafbbb41dda3c3dc31ff4d6755491ea42a5418179e3f7f9d27fddb55a9b933ae221650b850a53096c6a216d39e151bf0

                          • C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.zip

                            Filesize

                            854KB

                            MD5

                            c2c83c072880d1bdc4859daea5c7361a

                            SHA1

                            16aa0f8080fba4472c33f3a65ec69e32fd72f628

                            SHA256

                            e22a8036f75ce550ae164ad47c6629941279bf4b5d7eaa206973877ee26d9da3

                            SHA512

                            324b0088e1d84a382dd89dd774750d8182e041e52f0f88b5945f1f83b173735f3cca51be1e3e07b34d0b697e3324d2b00074c3952d55628e22c239f6a33d2019

                          • memory/1668-235-0x0000000005DC0000-0x0000000005E26000-memory.dmp

                            Filesize

                            408KB

                          • memory/1668-299-0x0000000007570000-0x0000000007606000-memory.dmp

                            Filesize

                            600KB

                          • memory/1668-275-0x0000000073380000-0x00000000733CC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1668-234-0x0000000005D50000-0x0000000005DB6000-memory.dmp

                            Filesize

                            408KB

                          • memory/1668-302-0x0000000007530000-0x0000000007544000-memory.dmp

                            Filesize

                            80KB

                          • memory/1668-301-0x0000000007520000-0x000000000752E000-memory.dmp

                            Filesize

                            56KB

                          • memory/1668-300-0x00000000074F0000-0x0000000007501000-memory.dmp

                            Filesize

                            68KB

                          • memory/1668-233-0x0000000004FF0000-0x0000000005012000-memory.dmp

                            Filesize

                            136KB

                          • memory/1668-298-0x0000000007360000-0x000000000736A000-memory.dmp

                            Filesize

                            40KB

                          • memory/1668-296-0x0000000007930000-0x0000000007FAA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1668-303-0x0000000007630000-0x000000000764A000-memory.dmp

                            Filesize

                            104KB

                          • memory/1668-294-0x0000000007180000-0x000000000719E000-memory.dmp

                            Filesize

                            120KB

                          • memory/1668-266-0x0000000005B70000-0x0000000005B8E000-memory.dmp

                            Filesize

                            120KB

                          • memory/1668-267-0x0000000005BD0000-0x0000000005C1C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2328-328-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-319-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-270-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-272-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-268-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-250-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-438-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-437-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-426-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-425-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-255-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-260-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-263-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-264-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-246-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-445-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-446-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-418-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-368-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-367-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-311-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-312-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-359-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-269-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-327-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-417-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-335-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-336-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-343-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-344-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-351-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-352-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2328-360-0x0000000000400000-0x0000000000482000-memory.dmp

                            Filesize

                            520KB

                          • memory/2704-222-0x00000000055E0000-0x00000000055EA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2704-224-0x0000000006AD0000-0x0000000006B90000-memory.dmp

                            Filesize

                            768KB

                          • memory/2704-225-0x00000000093F0000-0x000000000948C000-memory.dmp

                            Filesize

                            624KB

                          • memory/2704-219-0x0000000000B10000-0x0000000000BFA000-memory.dmp

                            Filesize

                            936KB

                          • memory/2704-220-0x0000000005CB0000-0x0000000006254000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/2704-221-0x00000000055F0000-0x0000000005682000-memory.dmp

                            Filesize

                            584KB

                          • memory/2704-223-0x00000000058A0000-0x00000000058B0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-374-0x00007FFF28E70000-0x00007FFF28E80000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-376-0x00007FFF269D0000-0x00007FFF269E0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-377-0x00007FFF269D0000-0x00007FFF269E0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-375-0x00007FFF28E70000-0x00007FFF28E80000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-372-0x00007FFF28E70000-0x00007FFF28E80000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-373-0x00007FFF28E70000-0x00007FFF28E80000-memory.dmp

                            Filesize

                            64KB

                          • memory/3608-371-0x00007FFF28E70000-0x00007FFF28E80000-memory.dmp

                            Filesize

                            64KB

                          • memory/4696-230-0x0000000002260000-0x0000000002296000-memory.dmp

                            Filesize

                            216KB

                          • memory/4696-304-0x00000000071A0000-0x00000000071A8000-memory.dmp

                            Filesize

                            32KB

                          • memory/4696-297-0x0000000006E80000-0x0000000006E9A000-memory.dmp

                            Filesize

                            104KB

                          • memory/4696-295-0x0000000006D30000-0x0000000006DD3000-memory.dmp

                            Filesize

                            652KB

                          • memory/4696-273-0x0000000006AE0000-0x0000000006B12000-memory.dmp

                            Filesize

                            200KB

                          • memory/4696-274-0x0000000073380000-0x00000000733CC000-memory.dmp

                            Filesize

                            304KB

                          • memory/4696-245-0x0000000005580000-0x00000000058D4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4696-231-0x0000000004D30000-0x0000000005358000-memory.dmp

                            Filesize

                            6.2MB