Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 10:03

General

  • Target

    2025-03-30_5ae083acb92a7e6dfe29b4edb7ec20fb_amadey_karagany_rhadamanthys_smoke-loader.exe

  • Size

    492KB

  • MD5

    5ae083acb92a7e6dfe29b4edb7ec20fb

  • SHA1

    c12a45b9cf33a1881c34e0e3d469e7d039130426

  • SHA256

    7390d25410ff7cf2690c1d340f46578881687443fd3653283cf3818769bbb848

  • SHA512

    75b23e5f3a1fb90424932a211cbdac7c8c3c078a57d8d6754e15d9bdaa4cd7b58ff91abb36a20639597a149b2aa8a1a4feec75a31233afb02a7e4d303f497f5b

  • SSDEEP

    3072:kMSncRzAOP4g5IdrO79+lHNNqqRPsO98bx0NO4lzv:XSncRlPbI1O7kNPRPp98V0xl

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

192.168.168.154:5555

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    remcos_lxuvlzlakuvlhki

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_5ae083acb92a7e6dfe29b4edb7ec20fb_amadey_karagany_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_5ae083acb92a7e6dfe29b4edb7ec20fb_amadey_karagany_rhadamanthys_smoke-loader.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5824
    • C:\Users\Admin\AppData\Local\Temp\BACKDOOR.EXE
      "C:\Users\Admin\AppData\Local\Temp\BACKDOOR.EXE"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5256
        • C:\Windows\SysWOW64\PING.EXE
          PING 127.0.0.1 -n 2
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:6140
        • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
          "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1476
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\PDF.PDF
      2⤵
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2c8,0x2cc,0x2d0,0x2c4,0x360,0x7ff89c37f208,0x7ff89c37f214,0x7ff89c37f220
        3⤵
          PID:1320
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1832,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:3
          3⤵
            PID:4588
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1984,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=1980 /prefetch:2
            3⤵
              PID:4600
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2556,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:8
              3⤵
                PID:4544
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=3508 /prefetch:1
                3⤵
                  PID:4052
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:1
                  3⤵
                    PID:5596
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --init-isolate-as-foreground --pdf-shared-library --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4888,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=4964 /prefetch:2
                    3⤵
                      PID:5336
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --renderer-sub-type=pdf-renderer --pdf-renderer --pdf-shared-library --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags="--ms-user-locale= --jitless" --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5196,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:8
                      3⤵
                        PID:5692
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:8
                        3⤵
                          PID:3696
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:8
                          3⤵
                            PID:2884
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:8
                            3⤵
                              PID:5540
                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:8
                              3⤵
                                PID:1884
                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:8
                                3⤵
                                  PID:4488
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6404,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=6400 /prefetch:8
                                  3⤵
                                    PID:5396
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6544,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=6328 /prefetch:8
                                    3⤵
                                      PID:5248
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=704,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:8
                                      3⤵
                                        PID:5408
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6540,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:8
                                        3⤵
                                          PID:3100
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6508,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5980 /prefetch:8
                                          3⤵
                                            PID:2232
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=2660 /prefetch:8
                                            3⤵
                                              PID:5184
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3324,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5868 /prefetch:8
                                              3⤵
                                                PID:768
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6512,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=6464 /prefetch:8
                                                3⤵
                                                  PID:3408
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=860,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:8
                                                  3⤵
                                                    PID:5248
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5868,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=5580 /prefetch:8
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5888
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,13610756360449836794,7404481612117078938,262144 --variations-seed-version --mojo-platform-channel-handle=3212 /prefetch:8
                                                    3⤵
                                                      PID:244
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
                                                  1⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1904
                                                  • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                                    C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1396
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                  1⤵
                                                    PID:3516
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"
                                                    1⤵
                                                      PID:2948
                                                      • C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                                        C:\Users\Admin\AppData\Roaming\remcos\remcos.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:3412
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                      1⤵
                                                        PID:812
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                          2⤵
                                                            PID:3776

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files\chrome_Unpacker_BeginUnzipping3920_171042876\LICENSE

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          ee002cb9e51bb8dfa89640a406a1090a

                                                          SHA1

                                                          49ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2

                                                          SHA256

                                                          3dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b

                                                          SHA512

                                                          d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c

                                                        • C:\Program Files\chrome_Unpacker_BeginUnzipping3920_171042876\manifest.json

                                                          Filesize

                                                          79B

                                                          MD5

                                                          7f4b594a35d631af0e37fea02df71e72

                                                          SHA1

                                                          f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57

                                                          SHA256

                                                          530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1

                                                          SHA512

                                                          bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360

                                                        • C:\Program Files\chrome_Unpacker_BeginUnzipping3920_300392826\manifest.fingerprint

                                                          Filesize

                                                          66B

                                                          MD5

                                                          496b05677135db1c74d82f948538c21c

                                                          SHA1

                                                          e736e675ca5195b5fc16e59fb7de582437fb9f9a

                                                          SHA256

                                                          df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7

                                                          SHA512

                                                          8bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c

                                                        • C:\Program Files\chrome_Unpacker_BeginUnzipping3920_300392826\manifest.json

                                                          Filesize

                                                          134B

                                                          MD5

                                                          049c307f30407da557545d34db8ced16

                                                          SHA1

                                                          f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                          SHA256

                                                          c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                          SHA512

                                                          14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          f9fd82b572ef4ce41a3d1075acc52d22

                                                          SHA1

                                                          fdded5eef95391be440cc15f84ded0480c0141e3

                                                          SHA256

                                                          5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                          SHA512

                                                          17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          280B

                                                          MD5

                                                          998db8a9f40f71e2f3d9e19aac4db4a9

                                                          SHA1

                                                          dade0e68faef54a59d68ae8cb3b8314b6947b6d7

                                                          SHA256

                                                          1b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b

                                                          SHA512

                                                          0e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          ebc57b6efd6061b65421f7c1688baa0e

                                                          SHA1

                                                          8889a8a614b4568c54f1367b4ab1b3775978a330

                                                          SHA256

                                                          e456f72d538be0e17d3de682d1e48058e085945155d3ce76f0a1cbe63084c7d0

                                                          SHA512

                                                          b9e8498628ab0cc823e300d59ceeeb9ab5399a54ce84fecf09c125e66bf85253708270218e74d2f45983ee8b3edd49180151c96b044cc75e01e7873b28629d27

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57d06f.TMP

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          f87a7bffce9729726cba1e3546a7fc7b

                                                          SHA1

                                                          d07e6befbbf93f6537503bc76ea0ffff73e74abc

                                                          SHA256

                                                          cb5bcc0149bdf68dab265440d24a90b5bc0048b1a8652bfdf6e61edd85d6f037

                                                          SHA512

                                                          236b61fe4c49170eea5f83919146750af09d5998dd03c7233f01d435819541b7c5b9acee1ca26eef41a4e03647aa9bb4223329abd6fe4d021dc439e0b5bf86d0

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                          Filesize

                                                          2B

                                                          MD5

                                                          99914b932bd37a50b983c5e7c90ae93b

                                                          SHA1

                                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                          SHA256

                                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                          SHA512

                                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                          Filesize

                                                          107KB

                                                          MD5

                                                          40e2018187b61af5be8caf035fb72882

                                                          SHA1

                                                          72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                          SHA256

                                                          b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                          SHA512

                                                          a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          655106a32b4e967066fa019b9ca860c2

                                                          SHA1

                                                          c03f6b4c4f8c0a600eae1751682b829d146cb4e9

                                                          SHA256

                                                          0278e1be1b6c9b593d7415c3368fdc5bb461a064194fcbc8863427cf8f8aa644

                                                          SHA512

                                                          42d136e5fc43742e29f409987293c1ee6cabf005f9b8f7e1d20d6ef095b34848891294808220e39cba75a644c87cd7d9f9e7d3dc8e2cc32625aeae21ae7509b9

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                          Filesize

                                                          2B

                                                          MD5

                                                          d751713988987e9331980363e24189ce

                                                          SHA1

                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                          SHA256

                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                          SHA512

                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                          Filesize

                                                          40B

                                                          MD5

                                                          20d4b8fa017a12a108c87f540836e250

                                                          SHA1

                                                          1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                          SHA256

                                                          6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                          SHA512

                                                          507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          70008cd449c90fae96df65865ce3eab0

                                                          SHA1

                                                          38af2cb31495163c611f0c23c7d6f60bff064351

                                                          SHA256

                                                          6af7544b4c41d5866bc9f7da2f4be294e15b9da5b8eeec0a6e21adeafdeda31d

                                                          SHA512

                                                          1401b02b5200542338691e4a5306e0b1daf103c4a61bb5e9dc0df4ddf6aca2f4ea6edc0904c221d0582ee4d78fbf8872a9228ced40f3ca7bf7dcf9e37c727462

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          ea688632bb580604c51b3a23bd06fce3

                                                          SHA1

                                                          22f1462505c6d7a366aaf0dbaa1bd1f5008240e9

                                                          SHA256

                                                          1b3d17642b277c41e9904a5dc156dcc722dd80971322b90bc9dd6a1cd359381f

                                                          SHA512

                                                          8250433930f21ce84b8af4342e3ceaadf69a1ecd239b71a969dd7d079782591598526579a6dc10435ec93fd6c760717d6ccd416923925278edff80cf22fa0dd5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                          Filesize

                                                          36KB

                                                          MD5

                                                          60b734a3a06348fbb164a480920ce164

                                                          SHA1

                                                          38d1a55ce07a7596f17db65ccbcc27e6402f0e57

                                                          SHA256

                                                          17b61fc53bbadb5a94b9e4d85bbf2b6f06a0ee96dd65ac98402c04e683adc365

                                                          SHA512

                                                          47da5f4a56ec2111c18640c873294aef63544e7c23c762bd9718cc3cb02af816d677053074d4d2e1d0ceec8263be71449c4b9c0fab4f05ccd5b5cacfab0ca4c7

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                          Filesize

                                                          23KB

                                                          MD5

                                                          2a6020420fd10db7e1aa0fb1bb45791d

                                                          SHA1

                                                          34b6b29d6c517f2f4be1d5d12506f6af8d075bef

                                                          SHA256

                                                          342eb6766c738b0ec908f40c2c76a8291ba467e8a6f05ee9107c97c45059dd20

                                                          SHA512

                                                          e7946516c3f86f21ff8fd64b9de6e775560e3ecd58c1187dd5535cdd3c8e34b4d9927abad476bb5fdbc6b2097c38dd26bb6c6593cc9fd0c53b2ea7f7ecb934e6

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                          Filesize

                                                          465B

                                                          MD5

                                                          8643655c7f71fdf07e59823e5cac74d2

                                                          SHA1

                                                          570fe0ac8fb471b0c4c413e34a65c35fffebab9d

                                                          SHA256

                                                          06a2c2b7934019850a1901271edc75e888d50f1f97c50475fa65a393a44bb4e6

                                                          SHA512

                                                          4dbab625abf1671c64cca29c845c65510e44d2fd6ae76620bd29ea48861a0454e22fb15e71f09cb2cbd2573c824539c399a58afc8f9372ce085ed3b94b927200

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                          Filesize

                                                          23KB

                                                          MD5

                                                          38db01f74d4b33959e9a386596424375

                                                          SHA1

                                                          5df88d3341cbdb3fd277cf5f61071417f1f1e237

                                                          SHA256

                                                          c2c54890d811e1fe533432497c70a744c5632e4db4eda3322db77385076ae0e0

                                                          SHA512

                                                          d8271427970f089f109fa2383f97f520d3033e6ae9336048ee11ea271c651cb52967d000ce11cdd8945ba9e568319ec8b7f39503ed4ecb6011a359d05692b7f9

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                          Filesize

                                                          896B

                                                          MD5

                                                          b09c093b29616c9792a57d58192276e9

                                                          SHA1

                                                          48144f56144f03b481684633c619d9d561597312

                                                          SHA256

                                                          e058055039ac24d8321a0fc8bb5ba5f0edfa0bcdfd125a012e1e95b588aeca0a

                                                          SHA512

                                                          556539992177867a39378c06eb4d7e2516815c54a2004addbdc02a34b9574aedbeba8c62b0ff10ef44ecfba9f7f0fad6bb111be229c13a952f172f10482f353d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                          Filesize

                                                          19KB

                                                          MD5

                                                          41c1930548d8b99ff1dbb64ba7fecb3d

                                                          SHA1

                                                          d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                          SHA256

                                                          16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                          SHA512

                                                          a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          ed877e6a669669ef543f8803e63df41f

                                                          SHA1

                                                          cca18ba0386c0c4c99d0db675feaf5b3a0b449a4

                                                          SHA256

                                                          a33b1f5e8b21d485abbb75ccf99be80ab5e7afe870efac848cb42c7c81f2ce77

                                                          SHA512

                                                          74bd28497fd29b8eafbf570fe036bfb0cc0b0cde7678a67d7628a36dceeaf899a21de95ae0c7122e944ec6a639e7888adb584b428e95d7332c2964e84eabb53c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          0ecc6825c18a283fb838a30387eab51c

                                                          SHA1

                                                          bab394533a86ece5477ffe7291bd1c6dcf7fcfe5

                                                          SHA256

                                                          4a378e086bac229577eebf9ddfbabaf51f51aca4ae5cfcd559bf3bde278117e4

                                                          SHA512

                                                          7f44e8c2e58bca37b1aa14ae6ba4f9cfbf74a1f64b05e1f3c0297cb85c430c5cde5759f3fbf52618838c87029d232e87cd86a07f8957e46ca890cfa9a1f85a8e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          50KB

                                                          MD5

                                                          ee27ba853fffd17b2fa43ea92174ac64

                                                          SHA1

                                                          5f0e086503e3b5880cc428494a426cb42a2aebd4

                                                          SHA256

                                                          689fed53b8c59694bb114c8e8ef3a89c9a9643ff3ecea2f7b6c21c3d04178410

                                                          SHA512

                                                          7580115291ac286c8b3e5b295be21ac28b04c175de1e71bbeb74359e55cebe985201206a5f6f452ca5804a436256629bf473203781f787817c35d8bbf641cd5f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          bef4f9f856321c6dccb47a61f605e823

                                                          SHA1

                                                          8e60af5b17ed70db0505d7e1647a8bc9f7612939

                                                          SHA256

                                                          fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5

                                                          SHA512

                                                          bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                          Filesize

                                                          152KB

                                                          MD5

                                                          dd9bf8448d3ddcfd067967f01e8bf6d7

                                                          SHA1

                                                          d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                          SHA256

                                                          fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                          SHA512

                                                          65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          4f9709f958ef4a79fbf35a945aeb5056

                                                          SHA1

                                                          a6bc68f83eb9bdeee8629b92457afbbda8b1cd21

                                                          SHA256

                                                          b61905bd485e9176540796ee145cf4c599a357f05aab86b7094f49fa7ae48821

                                                          SHA512

                                                          4118dbece03e9bc98bbe569f163a553724f67fb3d8a74492495699eb6bf727ed2b128bef6cdfb8625d1fa9eb94be9358786aa84393179c37190ec3da16bf6f72

                                                        • C:\Users\Admin\AppData\Local\Temp\BACKDOOR.EXE

                                                          Filesize

                                                          36KB

                                                          MD5

                                                          cffddc7c3177706625765eb684410c7d

                                                          SHA1

                                                          04d82ea5e2b0e8e06a3284715146e11148209d2d

                                                          SHA256

                                                          39ecab5ce3b3d2049f707937f679015daf7b3bb56a313cf44683d75887511166

                                                          SHA512

                                                          2165e1553c40291f49823e7fac5454d137f1d2170e54c1e237afe62f2fc43361db8dadd4c1bed5c61aed8c4ee4c9a405685f7620f5f25efada7bc33957cb2765

                                                        • C:\Users\Admin\AppData\Local\Temp\PDF.PDF

                                                          Filesize

                                                          40KB

                                                          MD5

                                                          7b3c39fbf5b0b43b3c01d00c1e065366

                                                          SHA1

                                                          a425c056d064305e394e92b055043272c4d89ee7

                                                          SHA256

                                                          a4f71b309275fa1c9aba3dbb96ccba45ec6f18e57a99e8bf31607931e3a0494e

                                                          SHA512

                                                          f2d763ad3804bb450b9c8646482cf1ac0da9e00b4769a711971083ad963c484f6f6b44a61414f299a7eedcca2b454e0715b6c09869f6f22f4bd04b15a92b3ac6

                                                        • C:\Users\Admin\AppData\Local\Temp\install.bat

                                                          Filesize

                                                          99B

                                                          MD5

                                                          76c1687d97dfdbcea62ef1490bec5001

                                                          SHA1

                                                          5f4d1aeafa7d840cde67b76f97416dd68efd1bed

                                                          SHA256

                                                          79f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4

                                                          SHA512

                                                          da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925

                                                        • memory/1396-21-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1396-19-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-600-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-500-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-644-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-537-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-498-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-692-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1476-715-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1584-23-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/1584-8-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB

                                                        • memory/3412-92-0x0000000000400000-0x0000000000419000-memory.dmp

                                                          Filesize

                                                          100KB