Analysis

  • max time kernel
    1049s
  • max time network
    1051s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07/03/2025, 14:53

General

  • Target

    remcos_a.exe

  • Size

    469KB

  • MD5

    43639322671579f8a99a8a42e42777cf

  • SHA1

    0e397ebf8a3c5ab8c84424c674daa74674710519

  • SHA256

    6182c4acf47f39e0ab54ba35cb5e69c8bdbd2ee76a64939c94c26b6bdcbc65bb

  • SHA512

    cd26a73fa99a4e0ec2e353058fc95a02f6e12243aefc0cee07bcff99f6b89fef3c81c90e0fbb7dedd58dd9d114c480f83ed5559edce581b2db9cf72dcc528d72

  • SSDEEP

    12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSIn9:uiLJbpI7I2WhQqZ7I9

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

195.88.218.126:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    1034

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    macrosoft

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-I0SVLJ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    sihost

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Adds policy Run key to start application 2 TTPs 14 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Drops file in System32 directory 9 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcos_a.exe
    "C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\1034\remcos.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Windows\SysWOW64\1034\remcos.exe
          C:\Windows\SysWOW64\1034\remcos.exe
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4884
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            5⤵
            • Adds policy Run key to start application
            • Adds Run key to start application
            • Sets desktop wallpaper using registry
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3332
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              6⤵
                PID:3324
              • C:\Windows\SysWOW64\dxdiag.exe
                "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
                6⤵
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Checks SCSI registry key(s)
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1132
              • \??\c:\program files (x86)\internet explorer\iexplore.exe
                "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\wpcugqsjrwxyxjddtxucfwxndwc"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2836
              • \??\c:\program files (x86)\internet explorer\iexplore.exe
                "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\gjhfhjdkffplzqzhciheqaswdcutpp"
                6⤵
                • Accesses Microsoft Outlook accounts
                • System Location Discovery: System Language Discovery
                PID:3616
              • \??\c:\program files (x86)\internet explorer\iexplore.exe
                "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\jduxiboetnhqkwolusuftnnnmjeuiajrcb"
                6⤵
                  PID:788
                • \??\c:\program files (x86)\internet explorer\iexplore.exe
                  "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\jduxiboetnhqkwolusuftnnnmjeuiajrcb"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2984
                • \??\c:\program files (x86)\internet explorer\iexplore.exe
                  "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\slhvuj"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4960
                • \??\c:\program files (x86)\internet explorer\iexplore.exe
                  "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dfmfvckwt"
                  6⤵
                    PID:2388
                  • \??\c:\program files (x86)\internet explorer\iexplore.exe
                    "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\dfmfvckwt"
                    6⤵
                    • Accesses Microsoft Outlook accounts
                    • System Location Discovery: System Language Discovery
                    PID:3376
                  • \??\c:\program files (x86)\internet explorer\iexplore.exe
                    "c:\program files (x86)\internet explorer\iexplore.exe" /stext "C:\Users\Admin\AppData\Local\Temp\nhzyouvpheya"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5012
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:5024
                    • C:\Windows\SysWOW64\1034\remcos.exe
                      "C:\Windows\SysWOW64\1034\remcos.exe"
                      7⤵
                      • Adds policy Run key to start application
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:2488
                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                        "c:\program files (x86)\internet explorer\iexplore.exe"
                        8⤵
                        • Adds policy Run key to start application
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        PID:1796
                    • C:\Windows\SysWOW64\1034\remcos.exe
                      "C:\Windows\SysWOW64\1034\remcos.exe"
                      7⤵
                      • Adds policy Run key to start application
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      PID:3456
                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                        "c:\program files (x86)\internet explorer\iexplore.exe"
                        8⤵
                        • Adds policy Run key to start application
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: GetForegroundWindowSpam
                        PID:4676
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\SaveMove.html
          1⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffc020a46f8,0x7ffc020a4708,0x7ffc020a4718
            2⤵
              PID:564
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
              2⤵
                PID:4568
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:3
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
                2⤵
                  PID:1080
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                  2⤵
                    PID:4884
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                    2⤵
                      PID:4740
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:8
                      2⤵
                        PID:2684
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1356
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:1
                        2⤵
                          PID:1500
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                          2⤵
                            PID:2336
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17791203014628995690,8438922265394959587,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:1
                            2⤵
                              PID:4132
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3376
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1132
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateBroker.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateBroker.exe" -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:3224
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /broker
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2764
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateOnDemand.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateOnDemand.exe" -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:4016
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ondemand
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4984
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateBroker.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateBroker.exe" -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:1404
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /broker
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1008
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateOnDemand.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateOnDemand.exe" -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:4880
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ondemand
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2176
                              • C:\Windows\system32\taskmgr.exe
                                "C:\Windows\system32\taskmgr.exe" /4
                                1⤵
                                • Checks SCSI registry key(s)
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:4740
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2920
                                • C:\Windows\system32\taskmgr.exe
                                  "C:\Windows\system32\taskmgr.exe" /4
                                  1⤵
                                    PID:4464
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k SDRSVC
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3084

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    401KB

                                    MD5

                                    fc8337a24383afd107140c3a24571802

                                    SHA1

                                    55f99083caa4e3fdf0e592cf4c73ef3169fc810f

                                    SHA256

                                    9ab7d38f73e1a829258a297d58581ff5982510224f97a963aa287bd3eed1db16

                                    SHA512

                                    e70f280175fec4dfac163bf7aa9188f707e846c4053e3fed03481a8de1fa58afb6ca2a352d6ae87ec8f890f0704cb5a113f400e7f9db75e488c239b73bfd5d62

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    402KB

                                    MD5

                                    8c95f12e4ecc3353ff15fe43ac7bcba7

                                    SHA1

                                    9cb5623ffc80de32baa1a7b3ca2a14f4d3ae309e

                                    SHA256

                                    c3cb05975ebd0729cf2b61892b9921408327b9818c27aea1e9572e7053923ab4

                                    SHA512

                                    43772bb398b8cd97f745eecc377bad7080c7bc50f6b3cc988481ebc0d05c2a6e91c8344e68c7c8c0978cbbc5a75da18627e0303ecba3a54fd276a16a2da9cbc3

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    404KB

                                    MD5

                                    034fa7de09d8d5a73922cba9aeca04b7

                                    SHA1

                                    3c084f2ede363fea017aeffd13e2fb20e644ded5

                                    SHA256

                                    34779d6d66d412234dda80dd4c191e534907f39b5063a22cfb55f1521b337722

                                    SHA512

                                    769af4efcc0282550f29caea22c8386c1c1effff36d16fcf3e42bda5cb76c2c690726064ca730ff7f14eb07ea8b8f3d8fd7c50a27a7ae00659074ae5f5a7fc4c

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    406KB

                                    MD5

                                    924afe58c257196e5c50e9f12befd92e

                                    SHA1

                                    4e41ef7eddb551dde316810a066788d94a7c62cd

                                    SHA256

                                    a12308e39131d598a33b35a5d63ebdba079e09dd97b9ca30dba41a302dc28341

                                    SHA512

                                    4c89000eedef89dc0f6bb57c061649521fbc1c29e84b09761d1673ddf5ae0b3861c39de9dc09ccfd2d5fb0ef25e059effd0113179d716b6b40ba0633f4161d5b

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    408KB

                                    MD5

                                    e392b8cecba39bcf706d363d904e229e

                                    SHA1

                                    d9f3bce4c1372efa3d4197022b4a95b952793415

                                    SHA256

                                    7efb091cd82d222e4c9ac59100e10f7e2e75ef6936aef2c7b0dfa83035fa37e3

                                    SHA512

                                    f034122c40d6c3a3657a51178e4c6c4944028b379db9ef13e8d4cd0e27c99a2dde649fe2bae2014472fb918848008d9bd94ca0079e90460089f1d30c13d0ab91

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    410KB

                                    MD5

                                    f23cfe029cda388be4696b629d6c87a0

                                    SHA1

                                    455b9d093c09c46943a49ca097394c40aeeb74b1

                                    SHA256

                                    a0fc394ad8ba78002054281346102688995b2d4155ba6f3af3593829a3810d71

                                    SHA512

                                    07dfe432c9aea8500ff1b1971858928b93497dbed015cb87a41b38f873b61330d92971bdfb38ab542921d1041909db7b76a0fa4ea7403bee001dfc90629e543a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    44bece4054174f5a1281bf9f1787867a

                                    SHA1

                                    29b718ceb54e82ddcfeb11fa3e3b14dd8c43c8fe

                                    SHA256

                                    5b549271cd6e1685657d580831a3814628a27d3c38bb125de874198018d3aeea

                                    SHA512

                                    243128b08b7364ade001ac7b573253e5cf72121877e0446f30a771367aaa0ff5670b32d8e5c0c3fe7352e7c58800280527493b69c6d96b2598c55e43a78fbfaf

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2ad91bf1-a570-4ad5-8eed-fd8c45c6a1f9.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    53ad351aff16f6f7c20a2a1d9595861f

                                    SHA1

                                    e1cb0bfd9d33f987ca2acedcb713aab98581c1b3

                                    SHA256

                                    5c3c6d9ba34d146bbf2e3eb99bcf98ded40f3453530fc5a66e39d60ac6d0ff9c

                                    SHA512

                                    0db4f7274c939782847b4c451d9e06d94c13213a8b6a2f826c42d18d35c2c2fb91f0a5af3b55d1b5d52f8c2a72f59e8b964a1c0b79f2f7d7798ef954f5c85bac

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    2KB

                                    MD5

                                    6c8aa108fe557b420bb7324339031cef

                                    SHA1

                                    e13e597f436281b3844e49b72e196c8e157ea4b6

                                    SHA256

                                    2169171c443321cd8cb65c71b2431ee1d340b0ba228a4f143c4dd4008a338b2c

                                    SHA512

                                    2e66442e74cdd3dd2baaea4c4f1005e5194adc838f9068430fcd041a3cc32fcc52e5a72220700064c3198a8f19207a2895ee6520a302b433f958e0a0ee2e9a08

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data

                                    Filesize

                                    48KB

                                    MD5

                                    df554fba47bf0aac246cbbe4d77eb82f

                                    SHA1

                                    eab48eff57ff23742b96532776fc283ee2d93de1

                                    SHA256

                                    80b0ab43f17f7ad64fa759bf7f3a9f55686d252166206ca3f0b65823369d291e

                                    SHA512

                                    f5c088af02340f5590c521157503e4bd631bee473a19bc8d608e352b66933a48fba6c11bda537fa552d3315726e462f231d5c4df4f0ca7383a123d7044aacc5b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    759B

                                    MD5

                                    8095877f8b717f1296ff4097316479ab

                                    SHA1

                                    ba58dd9b279f4e367e711fc98c4b20dc895c4d3f

                                    SHA256

                                    3ad11096b2001d435e49b1e6ccf9eeeded0a9ac5a92a3978b9f5ef91f4ab4953

                                    SHA512

                                    c2b0c7f2872a33edaef998e767f5e085b0addd8079af70f06b90e87cec1a163c7c9ae54ac6435b0f7c6b9605980cbe09c7e5429325fd258d73c3cf9f1204d710

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    285252a2f6327d41eab203dc2f402c67

                                    SHA1

                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                    SHA256

                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                    SHA512

                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2981f728c4e4db6209de247a23e96965

                                    SHA1

                                    4941acde537f0f0ed54f49e516be45f629d63b42

                                    SHA256

                                    77ae7b6b6ee8dc8c66a6e2e4549d25f2da10c80d69704f3b24e048fbada0c729

                                    SHA512

                                    7aa8cd3bcf5ff6bebe52f55650713b1adb04e2581c9a81f086e879590089651356530c9427094c3b3fc861cd656fd7314cb75acfa27240ca25b68357328905fb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    9f5b65826d4db794b064ddbf777dab24

                                    SHA1

                                    9ac56f245789bbc6efae196f8171ad6b2042fe21

                                    SHA256

                                    72b2c05ce985cf264e35d4133f60b9b6457a78dc6a61d310558dc489c142ad9e

                                    SHA512

                                    2af8dd1b00c9927cebd495e24a02e091b46d4f0f256dd706572cad986c6fe8e5b565f2e63204dcb2cf4ab58aab8c32b9e6512257d6de294c57aa4ca9f4d1def5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    07c3c465c08f18cda42f4cf4c75d3220

                                    SHA1

                                    7f810a97bf96a43b75a46e2b5c2cdb22e03afa9a

                                    SHA256

                                    fcb5b3b857d81d7a8102820b93514ef676a49a116af11ad5b5993b16a70b3dc8

                                    SHA512

                                    309957a643f1f9b18045dd7f6f68c0db2f0831b948f2d4558227c4979445f645ca0181abae18f6ad10e92985b73eea9883c512d80218c4152ccdb0741e3eb460

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    0b8f2b90f1c7c323cf6edd552407b23c

                                    SHA1

                                    784b6f8825ddfdfc8a487e01af2f0304d0a37638

                                    SHA256

                                    8ab836ebdf79e31d56698e3867c6838866af2ef47c8a9f5fd9b60dcac8f436cd

                                    SHA512

                                    38581f17a05c636ceeb6b7a0a178ee5d38ba2d6408daa82014d945b853ad5d00b2eedb13c17437f567dcbfe49500c5ab1454559aff99fdde0d21c94597a91074

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    701ee90fe9175d8096f1a706ff18bb4e

                                    SHA1

                                    a5220e69f25bbd5d4fe5795329eb86d7f771801a

                                    SHA256

                                    9aee2d5c155b63e6eca57a4728a408e6cbeb83d766764e7ebbdac9848b426065

                                    SHA512

                                    5d3142034360f601333cb8c24a8b4731c4e3f69324074431ccf5b38a7ad87de676c78a91db661ea81e3b4ff71cd2c9d940dcaa30be1b8acc8b5689e6bb22f851

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5a2de7.TMP

                                    Filesize

                                    1KB

                                    MD5

                                    14c94737dd887c14465f456a87c55e1f

                                    SHA1

                                    204ac1512400de72bdb4c0eb49b29bc8212b5caf

                                    SHA256

                                    320088181aadf7265b0a0fefbc988003c8c22f813b7a5243f926c3e0be5dd427

                                    SHA512

                                    0f04b3e28b4d87711d7266514e3099cb3f1ed8f19bd9c48b17f3d797b674fb5efe51756bfeda6eb9eeffe5d19b41fd388d92305f0364f0d984a3937c2b14eb9d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                    Filesize

                                    112KB

                                    MD5

                                    e03fc0ff83fdfa203efc0eb3d2b8ed35

                                    SHA1

                                    c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664

                                    SHA256

                                    08d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe

                                    SHA512

                                    c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    10912c67e684e458ccf161c17274eee5

                                    SHA1

                                    ae60dce9343c4eebef81f7175a8eff2ab2624654

                                    SHA256

                                    b276e293949eb89109ce69ef5936b76aaabe005e8655b3c00c35981f04235beb

                                    SHA512

                                    a07367d644bcd1c1065ac8bccc1af77b447ac44ff23e078e94afce1ba56b39072c4ad69f099e17fbcf84e0a3d96435ddb5232841e2f0091bf22ce0ce82375d3b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    3a34bb387c9f2ea3abb8d8b4f308917e

                                    SHA1

                                    902af1c13cf6e161fa5adf111a41e20cedd01721

                                    SHA256

                                    7131b197b4cd34f76c101a00f1e3118d076cbae4051929f10000147264207eec

                                    SHA512

                                    41e122eba5c9f9b9da6b2ebee53f8e3669665bd527a7c96b6d7b5994a4be26208d560df8cd7127dc6703f39a76cc548b8c7784d793b351cb557c9b470e7fc383

                                  • C:\Users\Admin\AppData\Local\Temp\install.vbs

                                    Filesize

                                    392B

                                    MD5

                                    2d8a449cb6f9305edf06d1d41096a959

                                    SHA1

                                    7b707ed7559d491dd224f85c72453839ea17578d

                                    SHA256

                                    4209f29e5ee910794e83f75ad5880f00af4b11225f978944170a225dd88bbca7

                                    SHA512

                                    de60b300a990d836b47c5f8c83c29326ff513d74cf9b055a88a208dcd44095bef04f493f013fa202c4c4f650b215fbe7312c9d2d7fee50274711c80277dd16b8

                                  • C:\Users\Admin\AppData\Local\Temp\slhvuj

                                    Filesize

                                    5KB

                                    MD5

                                    28488de67aab14600e5115203fdf68ac

                                    SHA1

                                    71d66240127464e26a4f65146f978191692c3eac

                                    SHA256

                                    2c4614ab2d0c368085a28a0ad730a5160b4185a74bb0ad00cbe103e17739e5a4

                                    SHA512

                                    6adff5618312e3cca4d121bf68d4c5bd4f0b3f19853910f11634b7daf5ec144b6589c75b9d1599b7856e3b7b668ddfbec11c5c9c768bb59ce5c26120925bb8ef

                                  • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt

                                    Filesize

                                    84KB

                                    MD5

                                    3a247bbfd6a84ae2ca062f8710f6fb09

                                    SHA1

                                    fe8d0ce6c4430697f20b116b140864970dd5056d

                                    SHA256

                                    42387bae98d16bb347c7ec9f8d5b6ebcc9780a637933cba5c5f943bf754e35eb

                                    SHA512

                                    6ff875587a570777f29514265e574b5053ee7c36533c165bd15f5860c5e1087796a1412ebd0033ee3484421b67d3cf74489db96410cf0910939bfcf48b8a038d

                                  • C:\Users\Admin\AppData\Local\Temp\wpcugqsjrwxyxjddtxucfwxndwc

                                    Filesize

                                    4KB

                                    MD5

                                    7f48241d2d1ceb2dfdbe928ac856b60c

                                    SHA1

                                    0b454218ffa94cd6b4dcd211307dc0ceb2e58665

                                    SHA256

                                    ef9a73ecc38dba9361b3e3c38cd3c3c0e962b9276a718acbc2a8776d31ce05cf

                                    SHA512

                                    539405588fc2c79779412fa3b496d083ed00aa400af59ca4fedac673bb6735819aab811c0038053d177e38ea5b38b24b0475bf5411c09f169ef40f60f0f10c4d

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                    Filesize

                                    2B

                                    MD5

                                    f3b25701fe362ec84616a93a45ce9998

                                    SHA1

                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                    SHA256

                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                    SHA512

                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                  • C:\Windows\SysWOW64\1034\remcos.exe

                                    Filesize

                                    469KB

                                    MD5

                                    43639322671579f8a99a8a42e42777cf

                                    SHA1

                                    0e397ebf8a3c5ab8c84424c674daa74674710519

                                    SHA256

                                    6182c4acf47f39e0ab54ba35cb5e69c8bdbd2ee76a64939c94c26b6bdcbc65bb

                                    SHA512

                                    cd26a73fa99a4e0ec2e353058fc95a02f6e12243aefc0cee07bcff99f6b89fef3c81c90e0fbb7dedd58dd9d114c480f83ed5559edce581b2db9cf72dcc528d72

                                  • memory/1132-51-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-39-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-40-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-50-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-49-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-48-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-47-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-46-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-45-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1132-41-0x00000000023B0000-0x00000000023B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2836-81-0x0000000000400000-0x0000000000478000-memory.dmp

                                    Filesize

                                    480KB

                                  • memory/3324-17-0x0000000000F50000-0x0000000000FCF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3324-18-0x0000000000F50000-0x0000000000FCF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-31-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-34-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-73-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-74-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-75-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-76-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-77-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-78-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-79-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-80-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-68-0x0000000010000000-0x0000000010006000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3332-754-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-70-0x0000000010000000-0x0000000010006000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3332-71-0x0000000010000000-0x0000000010006000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/3332-65-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-38-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-37-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-36-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-35-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-72-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-33-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-32-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-30-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-29-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-28-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-27-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-26-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-25-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-24-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-21-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-19-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-20-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-10-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-16-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-15-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-11-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-9-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3332-8-0x0000000001380000-0x00000000013FF000-memory.dmp

                                    Filesize

                                    508KB

                                  • memory/3616-82-0x0000000000400000-0x0000000000457000-memory.dmp

                                    Filesize

                                    348KB