Analysis

  • max time kernel
    123s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 23:01

General

  • Target

    7caf240db905f259197cf71b03acf888.exe

  • Size

    960KB

  • MD5

    7caf240db905f259197cf71b03acf888

  • SHA1

    d8d9726a0a67795a01fed368055d9315feada3fd

  • SHA256

    c8017f526793dd8b6b6e98bfa9847fcf3aa7c4096a8432719a8324e06ba8c088

  • SHA512

    1f9464e14d33bfab44dfc85486bea31126a26929e04eae1159e6ecc886aa79877ca29aa93e614512625000d153e090c06b3b2081f9cbc1e8997ad26e59097255

  • SSDEEP

    24576:GzrpUdcKiEWIXZ4aQJkf1dedJNxkTeGnAoEe:cpKiEWIJ4aWkfjedxkTeGAo9

Malware Config

Extracted

Family

remcos

Botnet

Graias

C2

185.234.72.215:4444

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    graias.exe

  • copy_folder

    Graias

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    graias

  • mouse_option

    false

  • mutex

    Rmc-O844B9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7caf240db905f259197cf71b03acf888.exe
    "C:\Users\Admin\AppData\Local\Temp\7caf240db905f259197cf71b03acf888.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7caf240db905f259197cf71b03acf888.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2988
    • C:\Users\Admin\AppData\Local\Temp\7caf240db905f259197cf71b03acf888.exe
      "C:\Users\Admin\AppData\Local\Temp\7caf240db905f259197cf71b03acf888.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Roaming\Graias\graias.exe
        "C:\Users\Admin\AppData\Roaming\Graias\graias.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Graias\graias.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
        • C:\Users\Admin\AppData\Roaming\Graias\graias.exe
          "C:\Users\Admin\AppData\Roaming\Graias\graias.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:580
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1728
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2192
          • C:\Windows\SysWOW64\svchost.exe
            svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1524
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\apdtbihfldgigjqalcxletssvninqd.vbs"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

    Filesize

    252B

    MD5

    5fefa202f39c7547c67b2f5c843006cc

    SHA1

    e3033162b865e1960317710f6d27f8edc5fe004c

    SHA256

    1e5a50f20924e0795b27f9eda8ce174e1ca9a2815c8e47b8f55dd48653b8a70c

    SHA512

    e6c86c585b8d744a37f2dfaf34ce034cb61b19275214a1faa1c99ad0762a493f546b2d3fc9213e207f3b7b6275c320851fe891e623ceddfb9eac82f73427efb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b26646a512e117ce3dd72766bcc78225

    SHA1

    6154ca416876ad20eb30c66e1b5beae7a0f4fd10

    SHA256

    e5b67d71873a3fa796bb16678b350e81298a16753b2432405ff887fbd3ef0d8f

    SHA512

    6e1b297e49c8dcadc31d5e31436ee71dbe7b9ea3aafeef2c1fc1ab5f68ec39ddc60885ddb1e739a1f18575f4d7007d6e696d5073ab97ea18720bae5e8ba54494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80ece70487d60e643658f8132967e6e6

    SHA1

    8fd8cfec63368bfb4db47a3964480ab6e16a451d

    SHA256

    1cc73645354a76d0d6f762046eacf3225d1b787701545925ab3b9c1f5672ef5d

    SHA512

    23fa870c171820e464e8dc3695db343aea16e97b62d8778726e9501ce2b81f0e67c5fa6e525482fa8ef43cee448b705927d138449e752137b8591f3982a511fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b148147333d66df36b91586e8adecec1

    SHA1

    449d740b270e37e2341e7335ad5f6b2f5cfc9937

    SHA256

    e5988627eb4f99f00233652886bb7be08d914832e03fcdc5cee19077e455486e

    SHA512

    314c568c55d9fdbc14fcb0d038dfccc8f0c6456177f34b5a20e31e822e042b4a3d1494429ed046f20e3df3657d6ff5f54cf8bb890d5115b9a7dac15ecb0c3bdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f107cd4774661efade5430d8ea5d8bac

    SHA1

    a2b9f9f9969cab7852c4412c1885968cb0873a76

    SHA256

    db073b136965e56eb39c3c1b0e211b6296b3b532beefa63007ddd13fb05877d7

    SHA512

    bac5d6a20a8949df8b1fd2e160b204362a34bf0e690d944069ede16aeaa9b711d0ddfe358d41ac0a6519ca45d340bb8eb91ca4e8cb7f9ba7a2b0574d1a001fab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47caaca27ceb001717acfb7e25ce1f0b

    SHA1

    488a34750f4a2e76bec15f737165d493e0cbc685

    SHA256

    871e675619706858abd6ae12a7e955998290ab71e05b9a66db91c6223df83e85

    SHA512

    b2333e205a5060349b4ff96b32724e469e844f8db9d5c07d4578da5d9fd96ed6321964df040669177e8381ea33e93407f9540e4fb9452f7e67e91d8e9a458b03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    737244856d9d05f6a438e3b6b67edcae

    SHA1

    6fb5f96395d8315bdbb8955d3096001745fa89e0

    SHA256

    dc67aadfc056248f652262e546d22724b40b68a9b767e2674b145dda935e17c1

    SHA512

    1c636568304a6fc13a165e71245ac0002795f4030d284caa52b5ad81b4a72618af202a13849876c029b5efb6aeaff3d5cbaa463f8a5cc474b7e5e599a9e36d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99580d95fb8982d8a0be937750211d98

    SHA1

    5570ff1b6a7aa4e1b5d795f69ddb65b0cae16644

    SHA256

    6ca069369a9c6e2f8861b3311f642b5ed2c1e1a7022be3e0745a0c288a76ae38

    SHA512

    c631f4f277da2c73513ed28625a8395f7a2682125724c768495fd9204592010dd391697a5f1e10ab745fc06c293799f2b149f4341376fde49963f0fa505d2e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a254b8c751e6d461b4384d0b7ccee13d

    SHA1

    b7f77662a273ade1685bcdfbb6207e3c56c74ef6

    SHA256

    b62c854703477914ce0139e60541edfaec4eabe5d2f20f11537df44febed5eed

    SHA512

    907612fe29de08a93c830f89c3b564b96a3c34cf23398c9c8905380939a4c3420503fdbc0888e800beb011f14f1e9c0e1b1b99ede344c7dee2d5f860e1628be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d219abdab9f53f470f043b5f7555103

    SHA1

    ed6e6f1edfd48f18765ccee8252c8c3861ec5d7d

    SHA256

    54e02e0c4bf16be2031f495c0478b64a180aac4edc3fe776928fc3581dff8a80

    SHA512

    00140634e3dcaf45b866aeaa954ebe175c2a2c49f597872b628a72841839585584a18a351c120c73978c5e7352c974de4312b9ccea49569894d17203f6519962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eb8e29c05dc8109b91d8e6fe12edd59

    SHA1

    c42da7890fb01e1272486248ac08e02edf8456b8

    SHA256

    3c98aa05c31f954c8cc2bca0cc7e82998488c11a75b1b5e083dcc4dbd53eb3f2

    SHA512

    29953ff56e11d6bec53dd4911c481ce6f549048e192028c95fafaf448ccc601178cd4ac9df8534266ef54524b64e9a4cc6c609fd04595e640a88d11d8f394f0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ef7176493cd97a032f4eb1a6db584fe

    SHA1

    01232e022f9203c9bafd491a91a1ab0c9e10fa13

    SHA256

    08f0d46b3d18798f986a9aaff651774b72b7e4493966b253d4e1a73d88733fe7

    SHA512

    6c97323e38f0adad8ec5a192fbf4a89b28fb0535469337b9874fc51f38bd9e973086792fd0fddf41180d6b456e7114b5b17f2b2d38e2c78fdd5fff55f50ed2cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a77dbbca72dfbc45192ec615f2871bed

    SHA1

    c0015852f8ff1db8bfde8b14a0cf1e32149839f8

    SHA256

    d62e548d2066f4f52f1abf1afd16e266fd58154772743bdb1ae3d8e5780c1e7a

    SHA512

    3cdc7009b5f0e90afbf34efeeae10b80905bbf6e2eb7dd1a3becf974622affde91a0aa89e21f142fc79357cf4b17b510a2da86a473217bb75741dc69ae0e4a9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98908f7cccc489b0697cf4abbd7e6bfe

    SHA1

    56f1e2412553ee3446239d4f88ac802bfd36c8bb

    SHA256

    2558fc6e890b788c04fca39fc4fd5e99f8091f65e6e031112c38409b624b981e

    SHA512

    dcac1f019ee90ef1691139dc4bc270ad35eda1832a0f91b7f3b64e424da669be9b3c4e12f2ddbfd38c537b8e33484147998818b2c827cb9fe93535b29956c836

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df326463da63ad25a8f4fde25e966b0e

    SHA1

    e90d38447a787f3b8cbe09d929ee2cad82393e83

    SHA256

    5bf573000178be4cbf652b5866a502f0efbd6ab8d6398864c082bb4dd5ea3d4d

    SHA512

    7f94831d029992f39c282691a2e41917c8addba4763acf2210a6f59b7549f263f7d50037b96b22468f348b2d72ed51403659d3da2f32938864a6c17ec56b5c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62723f901888c91af4b94fbbc782e3c4

    SHA1

    d283fa7924d8f980cbfeffd7ad337d763b86519e

    SHA256

    4bc4cb130eb6b7530c24e29562922c66c3916d93fbabe8c3bf58d365b68ec236

    SHA512

    30c63f9f81d0132468e70e256fb696286814e8eff70431daca6f8efd1e900bf1bbdb1a8df99d48f179d68ceb9c59ecfa29496296e3e1fb4813e678468cac78b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efdae9586620494e9e57ca8cf257d3c2

    SHA1

    cd0b4fd706f212a295da8bb09b5942a231870367

    SHA256

    6e800ecf906a1ba685d9e6fe6df7228cb31731c5ab335ef6fab18fb591d2f72c

    SHA512

    8dc0cdaee53288d5622be0f8452a5cb3a8d137c6a93ac8c2b78aaf59ec5ab8dbabb66fb513ec282dc04ee19a709a037dff55cd1863101e109f42a46b63b65e94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4c9baa772eb830864f43db74a1901c3

    SHA1

    dc36a734405a993a774b5bb2550e041bd2772655

    SHA256

    bb86579b01e2a983adc6dfcd8bd48f82eeaf957de73e3365c1333f243009f264

    SHA512

    f886ccf1955df7a8c2538f8be99be419b7c7e4d672419673833d8169d2793daf064f7496f5a478cf868e9edc3215e0dff313ac98ea9b3b846954ca8db0de1d9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1c51213fe06e868a9c0de30af26e986

    SHA1

    1afe28e6a145bb22d05ff2664d7a400cda98c01d

    SHA256

    fc0b3d4c3cad317d9ac3854dbe000f48ad65d1637bfed6f714862504668bf181

    SHA512

    b5d38239709e415a9ea052f643b800858499c108ef095a44089d4e05a4da0d034cdb5e3e6d830b458802d48cd95b01b0340805092f011b834fc7f977cd41f962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41641ec8162b819376809388cc979f08

    SHA1

    9efdee2d7bcc023313f52336ab7633775f0aad3d

    SHA256

    d960a2631b99aa76fe69f72ca9b593d54d2306ddd725535fe680f7d1e37d6aca

    SHA512

    afc3b8a9a38434d5b28744cdb98edc724641d08638f139844586de0a8adba1a9c2b62a8e941f2dd540a0e1463443956856be3e9e8e521fa71c05b4421a47ec0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9037d5f1dff633fc7e571c9642ec3593

    SHA1

    eb2f280937f72d3ad197ac4d0d4f1b3dceab5a5b

    SHA256

    594d6b9a3f56d32feca88969aa80af24cdfcfc4752a3a7e7d2c43b66f68b090e

    SHA512

    84bb37263f13c324ad112db16ea965bb39c281f753d3b3cbc847ef264f1c65b2ded9c5c407970e48d4448aefe667e0e9ec608a586ddeadb34a3936b79f999719

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bfef046ac089802cd3b3d73d245b567

    SHA1

    fc0fa5df6e28cc7e3ee597179b2993025cc43ce8

    SHA256

    125137f59415d898ac683834f589b7fe15086a2db54e8441002e2bb9692844d0

    SHA512

    ebe6f3e66d1c0f6d8c4640781bbc08a369f7209d2f214b576e0ba7eaacb74200ab688188865e8763fd35e41df8078fa39987d5249a8ba2a7927cec571d8b98de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6188284e4d15bcf7c994182a0ca31c38

    SHA1

    085f4c3ee4bbe7643688d6c481b98e2d10b9d55e

    SHA256

    9c92169d44d15977c10f876d9cb22b9bcd2c7796cd387e199734a89308db3617

    SHA512

    fa6897cd8e1e7fc31db04f611fb93e9dff1c5bdc7463fde46721b14e3076e740a2231d3b058f240082df60d529400be9f168565543f189768bc756cddd560d6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d516e8f9c603fe67d6c5328401599b32

    SHA1

    33690375b104f9bbfa92a7528e4f2877abae70d6

    SHA256

    56f6f5f2a6922f7b41cb76381f7d463659bbbf5265bb0995d318612ac47502ce

    SHA512

    03ffade716ec821bead1406d68cb7157b8168013355ac137ca92f95ebd17d63093813e24f7b29ea462b61ef9170275986922da8073de0304531778ddbad2aeed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c561b3e21c72c0d75350489b169e55db

    SHA1

    72c11b712e0736759f441038f21ddd205f5cd5e9

    SHA256

    4d835ed9474847c3c7d0aa995c7c0c6e0f89c54bd748b469ab51ce6d6e0a46f7

    SHA512

    c91b8cd38b6e9e549579bf9ffa110df9672a846cb88c737e5f114774ca522667c0028b7ed3bcb631c0837eab11fb6ef0a9a59798a81701872f79de38028843b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd709ae4927c1d01075f88787aae96aa

    SHA1

    14a173d37bc3d813dad5565f79e356cc824c94a5

    SHA256

    f3f39dcaffeb6933d881f6f28bf953d4f7a3a1b03195b4af77922083f6a243d8

    SHA512

    b5196b76666caad583f3a434555283109c4ed3b765f932c5770c1467f68e78855a7cd4b2575028e8a12ae94a5e3def630e277b5f7a7acc0b50c51156107409e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de8282f31d7c67450938cd1e02f03738

    SHA1

    b5067c936839e5e8a60faf56c576f6a3d478491b

    SHA256

    9a83fbfb604021a406bb311e9daa49edeabede808ce0d981977843dbbc2fcc52

    SHA512

    28f652ee6b23dd119c30eb3d01e00405b0b4847fee60c1bfa8f468f19a8e3e68865e90f9b2a499e01a372a83b4fbfc8bf7daf9092ae927acc64ebde0d889c0fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9efb0ea86736bd9fd0546805849bec01

    SHA1

    86b7a2c52fb556b68bbb00cdf7a84d5ab0e23bd3

    SHA256

    b2cbc97512229527035f034f510e6ad822f04f5f84c70388d32b75e9c34de204

    SHA512

    9b378fce4f23b80286cb9d5900c6556aaa2d4d5fcb81ce5f0d0f28334c6768954c22b4329960bb96f6195a0a0a0950dac574f4969f72457be7056a48a41e84c0

  • C:\Users\Admin\AppData\Local\Temp\CabC9B5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCAA4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\apdtbihfldgigjqalcxletssvninqd.vbs

    Filesize

    626B

    MD5

    5fe4d29ae4e2c8fd88019dd9172956dc

    SHA1

    ab27bec93ab691dfac13ea3b07944d8aba514834

    SHA256

    bc74fae3c825622eb10cf3dcc6b12b87451193930e68a2a9068228894bfe4b09

    SHA512

    ed68d649775b7372fa0dad87df23cd7e07215bf255ef5fb31833b52ce8decfe48f4274c670bd2ef8b1f77f95232ef445e7bd15d27363e02ba14d3f7038b20693

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    0c5a066ba29d49aa28d32ee437b0c515

    SHA1

    fcf15cd9dfc618b519144e1edcd5192a6a898b0c

    SHA256

    ad8bcf5bfa1db7bb19d813661e77ce827a42b8b76a9f7b61a03db18da20afa0c

    SHA512

    26474c574cf9a5303aebc81aa32e5a03080d391e58ef41eb8355cb73a30821907be14485627d9f757f52fd358403095900d6768b30385ac6967ddfed1b8d9d3e

  • \Users\Admin\AppData\Roaming\Graias\graias.exe

    Filesize

    960KB

    MD5

    7caf240db905f259197cf71b03acf888

    SHA1

    d8d9726a0a67795a01fed368055d9315feada3fd

    SHA256

    c8017f526793dd8b6b6e98bfa9847fcf3aa7c4096a8432719a8324e06ba8c088

    SHA512

    1f9464e14d33bfab44dfc85486bea31126a26929e04eae1159e6ecc886aa79877ca29aa93e614512625000d153e090c06b3b2081f9cbc1e8997ad26e59097255

  • memory/580-53-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-541-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-534-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-533-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-532-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-69-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/580-55-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-455-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-62-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-549-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-536-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-60-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-61-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-49-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-50-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/580-456-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1524-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1524-73-0x00000000000D0000-0x00000000001C6000-memory.dmp

    Filesize

    984KB

  • memory/1524-72-0x00000000000D0000-0x00000000001C6000-memory.dmp

    Filesize

    984KB

  • memory/1524-71-0x00000000000D0000-0x00000000001C6000-memory.dmp

    Filesize

    984KB

  • memory/2316-10-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-9-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-12-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-16-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-18-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2316-11-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-8-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2316-7-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2660-21-0x00000000744A0000-0x0000000074B8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/2660-6-0x0000000005B10000-0x0000000005BD2000-memory.dmp

    Filesize

    776KB

  • memory/2660-5-0x00000000744A0000-0x0000000074B8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-4-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/2660-3-0x00000000004C0000-0x00000000004D8000-memory.dmp

    Filesize

    96KB

  • memory/2660-2-0x00000000744A0000-0x0000000074B8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-1-0x0000000000810000-0x0000000000906000-memory.dmp

    Filesize

    984KB

  • memory/2708-33-0x0000000000DD0000-0x0000000000EC6000-memory.dmp

    Filesize

    984KB

  • memory/2952-56-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2952-59-0x0000000000100000-0x00000000001F6000-memory.dmp

    Filesize

    984KB

  • memory/2952-57-0x0000000000100000-0x00000000001F6000-memory.dmp

    Filesize

    984KB

  • memory/2952-58-0x0000000000100000-0x00000000001F6000-memory.dmp

    Filesize

    984KB