Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 05:34

General

  • Target

    382410201721.exe

  • Size

    972KB

  • MD5

    53ee3e51b223773a7db458eba4bd0528

  • SHA1

    5ead7b026aa51ba272548be89118991378f54fb3

  • SHA256

    941d7828d89da175afca52906a1e519707a09685f30332937917505fa8999f87

  • SHA512

    90d7f487adbc5af048cf6c8bbbe4f1997201fbb7bec28a44c55c3a5009995b9377bc09bb48bd62244eecd0910b1e16cc2f7361e2dae195b95d0271ec1e7cc0ad

  • SSDEEP

    12288:bmQWhajfdJLszbiBtI4h9vBGY+RC+dCmFZ59QM8/z+Tw6MapxpYDVp+aN/trfwjY:bk6fdJoqBBy9C0CmAdzBtQXofgxy

Malware Config

Extracted

Family

remcos

Version

3.1.0 Pro

Botnet

RemoteHost

C2

fgtrert.duckdns.org:8494

qweerreww.duckdns.org:8494

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-PHNHQQ

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\382410201721.exe
    "C:\Users\Admin\AppData\Local\Temp\382410201721.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\382410201721.exe
      "{path}"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2332
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\SysWOW64\svchost.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1680
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2308
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1088
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:406540 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2552
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:406561 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1900
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:472094 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2252
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:4076582 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:304
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\SysWOW64\svchost.exe
                7⤵
                  PID:2924
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\SysWOW64\svchost.exe
                  7⤵
                    PID:2612
                  • C:\Windows\SysWOW64\svchost.exe
                    C:\Windows\SysWOW64\svchost.exe
                    7⤵
                      PID:1556
                    • C:\Windows\SysWOW64\svchost.exe
                      C:\Windows\SysWOW64\svchost.exe
                      7⤵
                        PID:2888
                      • C:\Windows\SysWOW64\svchost.exe
                        C:\Windows\SysWOW64\svchost.exe
                        7⤵
                          PID:2836
                        • C:\Windows\SysWOW64\svchost.exe
                          C:\Windows\SysWOW64\svchost.exe
                          7⤵
                            PID:308
                          • C:\Windows\SysWOW64\svchost.exe
                            C:\Windows\SysWOW64\svchost.exe
                            7⤵
                              PID:2708

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                2
                T1112

                Discovery

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C
                  Filesize

                  579B

                  MD5

                  f55da450a5fb287e1e0f0dcc965756ca

                  SHA1

                  7e04de896a3e666d00e687d33ffad93be83d349e

                  SHA256

                  31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

                  SHA512

                  19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
                  Filesize

                  252B

                  MD5

                  e6630993f0d27f8b6689cd6a5643aca5

                  SHA1

                  ef99175f9b6656b1a010da59da59aba818b451fa

                  SHA256

                  d52d7e208a9a71fa74519f20ff7bb1631938a1a069d032d270add070150bfa56

                  SHA512

                  b23c733b645edea086736c794663184a765227e4c8d67b6d60329bf09fe8b55f4dd4a5d640a3b959442b26ba17510daf98f3975e78af52c4cbc256f9e2e29df1

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  19b913e922d35537d1938e320ea757b6

                  SHA1

                  93929320143ad0118c443667fef544788259ca25

                  SHA256

                  71541d97e1c5532a44f065c16bfd11bf9e4419477db62062b538b8910beabe67

                  SHA512

                  93c58453a971f8c3985fd4dea1541a175b5405414658601ded017cf369197eabba82016b18cadac9b7180799f2fdb11903cf8380fd87b0ca9bad32e1f3258850

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  450aa22af0067ade03a7a4c567b658bf

                  SHA1

                  ac359e1d0097d6e0ed4b1bccfe775718ba0dd77e

                  SHA256

                  83fa033c53e1ad5169b098eda813724eac918822a0b39620028b85395f41af52

                  SHA512

                  fc8da1a1175bb80854311eb0b8804e6c25db4220d2fa38abbfdcdf6712f9140a1cad4a0b44768ddf874e1caf1acee13de57626c07c5815ce3686a51a18484e4b

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  f8a6bc5995a1d37e0362c9815ba713fa

                  SHA1

                  2dd2dae18c0f97f9478b370a131b8a6844fff19f

                  SHA256

                  1525257320c78507d102bced4075a21c599393949e2e11a5bd6bada552332666

                  SHA512

                  fc1752207ad4ab4ed910da51bdceb16f4f0e403ec606382e8c934176d7405b6bcb083e36074392be1360d1ff4dc6da0622eb7453a6d7fecfdbaefb4ef8aa13ec

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  83ec26c269ede4b43d33051d354a5f79

                  SHA1

                  b2c953a0395f43e4a32b0bad867815de5f531205

                  SHA256

                  9c3cf7d74b361162bb945b7bb7b33bbc8a6cc7695d9a9ab83860b8770f22b950

                  SHA512

                  de213ba5f464ed5ec94a0c2f5244dbb55f37c98991e8b5dc945a6696635ddeb81779aa1b5ddde74784fd5eb18f6a112f38b4cc6c8b7453df123d686868c2e4a7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  8c74c24b87dae1967abf255881589eac

                  SHA1

                  b8f573772badc811bf69bf43c5c46f8b8ff455ac

                  SHA256

                  2eb569ab7c934a88587e60675e62594311472e346ebe557c6347ef840dfd1030

                  SHA512

                  84b6d9b2391da2f6dc3d77a1e7314ebecad237e67f62001220bd1d636e3e8db79ed5a40c09bf14a011e1eb20b8cb95019ecb62354b4a65cace2a93bcfba27eb6

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  4a1f9584655e1b959384452ad5e87355

                  SHA1

                  fd883678dc6198943741a09433f0448ae81e564c

                  SHA256

                  e08ab3ba3ec44ccf2ebf84b5182fc7bf2bfcde163a14bad66e175efcda4a4508

                  SHA512

                  aecd86d2370bf2eb4a64dd5aec2a3a773235de012734b70f851d4e9dff12e6bf7a55d4509b27673f0b436302cecf377094de035e2bf73b00212c31ad0e91c55a

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  ef76e99cea42dcaee4e5bdbda35b780f

                  SHA1

                  8ab41820364a043cc56b778a05c74ddde760ac72

                  SHA256

                  21be5d68769ec4073bd7bb13afbc158ddf94829ce90227323b1c9a6a757d33b7

                  SHA512

                  fe137abd4d7e4c6870c9cb1c75605e0951d755838075aea7d2c0c639f712c38225f852272d403cf58a9b3336f852a91f5990abd6904997422d9639702c089412

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  b64e19efa609c6df8882047f234f1cc5

                  SHA1

                  76580944d59c286bc90ed3ec21e18526d3861599

                  SHA256

                  119dcfe240cd20eb5283232d94a812eee3d29c79257fd3dcc6558f068c1d8bb3

                  SHA512

                  53b053a943c24a2ed6ad14cfda65b57a019c6eea7eeeb025d8480c390c6d543ecebc2e754965fb77afbaf550b70939fd188badc5006b5317ebd1948c51babb7c

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  fa98b19847764cbe5fbb9ff45834e62f

                  SHA1

                  8ef249f78e68159bbaf341ba5b7fde78e117549a

                  SHA256

                  51b9eb3c7feb306641df745aa052a55f0545394f63b95fddf69a5833ad3e49d5

                  SHA512

                  6b95d37ed5ee36727fed03cbbf8a002cf497583ff89756c07360d955b658057a0fcb271dca0eeadb6b13f62b71262f5b89de7031739ae57636c433ea331501ad

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  bc5f0fea63855d9583f1c5fd562e939a

                  SHA1

                  a9759ea932c13cc35268e28d2309b411466248ae

                  SHA256

                  c8a1456c7426ebad7b48bc893e0186c98bac8583e49e35799f9b3c71fec0d580

                  SHA512

                  b91e8605ae940d88ce710fa36b4c060417a748f6663915650e5e204c69b7aead4492735a03a801a5fe723760c8a73e2a403c80d286eb915e3c7db1492b309b38

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  94f345327daeb61ed3f8665f5de3fa74

                  SHA1

                  585633d96f89ed4f15e9e1e6c63bcae3bd0b6c2d

                  SHA256

                  c027f3f53a04aa915ab8d166353b3c2fda8671b1af80e03bc9ae339a41a248eb

                  SHA512

                  c2de436537ff2cf728af20f3cad90c237d58382f34e676651ba255e6c8287d74159885a434b0ccfad9d4951c3142662caa8fd41239d9c7bb49ee3629c6497f55

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  302357d51eba79ad73a9f706b7ab06a1

                  SHA1

                  160a80ae7c3bda0cbd0a30e4b2cfa1174f34b0d5

                  SHA256

                  6676b940dc1eb92f227d454d8923eed97e45462100a92b447450571dc173ce7d

                  SHA512

                  d0a5b457093e0a036222b1d06a5ec273a7b48fe60e39be104d224cbdeccc46027c3d9d9fcb09b2855153613fddc6cdc23885f53a0010295f39f5562f6e5b4d21

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  a902c00806094d74b5d2bbe13e340fd6

                  SHA1

                  8fab56ada7d5c96b0da8e56a0aa07a4da9336fd8

                  SHA256

                  6d79621aa26dccc940a4ed66cc644ad340098c326b064fdce5897409883edce2

                  SHA512

                  c55820dc097e0edc1c1402fff406eea9de0c1b87d8421f93bb7e9a417bef28ccdafcbc84bb21c96010f8f5c132bb8ee9a32105e7e678e82c05cd4bc343d5b058

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  2c2fc62bebc71adbb6b61ef12e538b53

                  SHA1

                  0efd9c137f286247be60708741cc6e7b66e3ee21

                  SHA256

                  4338144d52aa1b5913c2a7c5405b86e1ba11be3287be5d59ee7d4278b4a4138e

                  SHA512

                  733744eb8e6ce4c126c5ae5fc9f3f9f7f3a5ef44f2d170b31dfc6710d82f9437fed61ab13af20cc8552fdee4f029a7c1456267fbaa1dbe47f958030d7b68beab

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  cec36e690b4e94c016f43fe1896bc9e0

                  SHA1

                  833890a9c15a27d7665fb49ca28d758fa3765838

                  SHA256

                  ec3d735b888058203e7a5f9a2894cdf976c35579abcbafbcc0f3020d762f4616

                  SHA512

                  ce76362f101152e6aff0e9f43721459794aa21109fcb90cbfdb6435faebd4ba1a23916d663f2183d07071a240c74372415a57252e34ab2bef14e2b713dff7f6d

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  b3a5d514604cdbce158c4dce1ab7077d

                  SHA1

                  b848b41abcb970ed68bc84d9848a955382b1485d

                  SHA256

                  acb66faca658d8a5b8d5cfe05b2c3173853f1a2dd2f434cbebc0dd23f3e617dc

                  SHA512

                  c338cc9dd2837ef0bbb43c5adc91eef2737874d7a8ef3a4e3617c87b1aa74f3e359faa5af92b5748f5d3efe31b35899111817894599d02144f173cc9c5ff377e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  1d2681074030cffedcd29331efbd5a4d

                  SHA1

                  6dcf3849716c796d823514c118db8b38782d11b1

                  SHA256

                  a93b5de1bbe3ef9826b8ce2d176c07b070a042848f2396ce23210c366a4a7890

                  SHA512

                  68fb2fc430b071db704b0f1aca0efbc81fbd5b30a87cf99e89cf77b86c6dd0a791c0b9a09be8d6f39db207dece088ff5126c4a558f5b52fdf39ee4382519d31b

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  e2426c8a2a0bdd2d9d1c9d3d870e6919

                  SHA1

                  56f817ff986841193a159c02f1bf2cf1ecb36021

                  SHA256

                  cd92d7d9af372aba743ba07484163a2beb9ea5d94dc8680853dab9be73807a86

                  SHA512

                  0e5d0b7331e8444ad32227e4685f0901404915e1a3016f1eaa39599b9516a0bb39cc814076e7b8652c587b535cb6f440014193423561dd93fca5362b739efd4d

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  bf8455f7ed0c2f32172facb74702fceb

                  SHA1

                  3c7a70c3973de3ba6b57a35bc225fbcb0cfe7159

                  SHA256

                  7b782eacc1eba6eeab3f946261f5586bc94380c1dd16a0780ede3cd6f10d39de

                  SHA512

                  86ab6a508d7b717688e823c37f43ffcb85bdb6837aa50e674ac37cc06ae7cf36bba5c9e8527600c0ee48a15a4cb231cee83dd5caf0aa1c238fdac1443f0a9ee7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  7b2bc414f49ed21dab7473920a9c1087

                  SHA1

                  869c29ab2f084708618c466967aac6c0189879e6

                  SHA256

                  50849c32831e34fbeda8c8d5fa146b51db38ccba33b72dbb048bff0a177cd83f

                  SHA512

                  43baf150526dc1fff47afdee9d43831143958162e37606f75df07c08703e7e6d2a5048a9c401ba6effc4e024a1b4bac7c0a73d42cd2816fac5d626893bf6671c

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  749d5b53016918c54f3b8c7db95ee52b

                  SHA1

                  454f348dad9855f5a3cb318683d5aa9cfa0ed5ed

                  SHA256

                  e48d235a4b78a573c9bd074372b6178e0e1bb531ce870b6704336425f1ff5fe6

                  SHA512

                  adfdf4f8c06a0d26de04f30912f624f7ce51ee6b6d030f95be1387cc7033ed481e45ed1f93381ae1106d668aa129d84e5555e448f654bdbe768ddf6e4cdeba75

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  5c0c11f9bab2e97dcb131cc1e7026b08

                  SHA1

                  99f9d85c33326f375a9f57764b0c07d70385294a

                  SHA256

                  8ce706455693f892db909c61af6ceaef7ff3292760235c20b3d2a336b4887b11

                  SHA512

                  ddf017d22b5dd1e413167c20666b62fba82589f333f63bc0f63e09c65b20f908164bda66ee48a972347109127cd7776b1d9ea9db47857aff6a7fea1099cbe6be

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  e8cc113d2e4809e1d4ae7ebc9a510bd6

                  SHA1

                  86d5b8ed1c89d69f76acb2d7f55add7c8750a2d7

                  SHA256

                  3c7259c44bc1a42e9c1d3277878d8bf6849e3926237d3dae67e9037f8a46fee5

                  SHA512

                  9b07aabfea342f2f1e0738391c2bf32a1d743b21113de178e49a2a4c20896655f0e3b4a47bcc5cf62080f6fac003424c275c523ddae93f252e5c995719b2819b

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  39c4dfd9f5db22fa95013260802953fe

                  SHA1

                  510e7c685154efa16965e79e9c28e0a3402d49dc

                  SHA256

                  813e6eef16b1c4aaab9b140aad488955236548b2d666487b14869c11397ee54d

                  SHA512

                  6c835478109003c3972d2a00dac64eb9e5270980cbe9c1641d5b0695abb875106419dc2003e31f3ce96e1221a97ac6cb0e8ead9e7f0234aad0846ad1849fddef

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  640adc367c9911ce9fc4a60e15a36a8f

                  SHA1

                  06aece7c8760794343aa2dc8e9eeff523b34a8a3

                  SHA256

                  5f4ff0376396de319a5976d61361e3c3b30cb58e8229da63235f08ff9490ded6

                  SHA512

                  a5d74da1d1db3093fb71fe40ae47d83530f246a9f36e168c6e284c933b680e1722b2333d9c97ff182c4b3fdcf1d8291ebf4717defb339d8d737aec3af095889e

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  6a14c17804f3587299bb3b66112ac76f

                  SHA1

                  0fd3de94dd58b38d9dee5e0da7861a205864fe9b

                  SHA256

                  c7914599b4c4cc1558731e215fd3ed7bedebb35edbbd33af1c32329805cf2641

                  SHA512

                  ba3f75b1005e2b74be274917cd2f6a817554d50a9dd43d1ec30d07e5a76212c076d9ea5715735626f64214c2e6e59073c4fe28a37891f1d0a7f2f44a82198ad2

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  9e9bee916292e31049f669a0c1b3a074

                  SHA1

                  3ec56f55cccff427760a5b7fc26a9ad34a095df8

                  SHA256

                  6ae8a30cdeaca734b95c3f54d96d587250861fd2e557b86d9241c5820793b57d

                  SHA512

                  4a75eb86f399d57903f21b65cca7cc521c0b666ad50c6fa1c8aa1fb788786158c59e9cb0dce1c9368738310379df8981c2906d9f92aa30dc360c3700c4f5c992

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  3e3cefdb07e81944ebc597709ce97b0c

                  SHA1

                  59922e2b94d89a59d5450ac62beffde6351936ca

                  SHA256

                  93950cd6c945abac0428adff301322a6df0c3db0bd1742615df9179ce64557ff

                  SHA512

                  9b9c1c2d6a7cf493c4e4598a467da5cfe9462c81bb92865dcbfb5c3577c5537fc3d03c9e57b91b493b2432d78ef25a80b7d2ee8e327f4bd356c68af30c094ff7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  d65256b22d708b121c38fdd3e2c36db9

                  SHA1

                  cc7d2ee63b6fca1b25cf9c8d7594aec5c439ec58

                  SHA256

                  bae74a0b96fd4651ec90cfe48c92ca2e1dc5d0e20cd773540ffdb25e7540b0de

                  SHA512

                  dcda306690985c3c5f18528976a4e718259af8a20aafcffb81eef109415a334b277d3608b39ed38917bb22da7075b2308f5a99c5f785df492ccfc041e0a2eb44

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  de8fca4f555dbd111c3e5e0a016ea45e

                  SHA1

                  7ddf6cd71c813bc880634097ac2631458ebe6f0f

                  SHA256

                  248b211741c5723a006d87bbac6a092d0bc4a0bdb10fc498ac93edf2d5c81b16

                  SHA512

                  59a72879dd19993bdc02305ad25f941b7b150612d3ec09772ef511353e8125f7e24459c892041ba234e3184042e638230dc40bba3228280ee1ac689a291e9784

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  57c99f84f5d0e1cedb38b07e16371d1a

                  SHA1

                  cb222f5f6e649638e084658d374a9b4457db4668

                  SHA256

                  21471002f88d9709d5fde6629110f3dc37bb8dbaa4e631c04caa7bfd54adf87c

                  SHA512

                  a8dd7730672e24f7737cf4753fdc37f9885d045d454f9b6110e9f105a490f9c2f0516692371bbbaeb8c6adeea3a41b24bc80975c3d4057fed22236e16e8d335a

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  8d71e391c189cf4abf1172add42706aa

                  SHA1

                  df190e39c1ef171376e35a5de4cc79899a0eadda

                  SHA256

                  01b57e0ee226c19b410eb2c84a8a048ccde2d89ff8132564c5f9c40e12411ee1

                  SHA512

                  8ae5a8af00525173bfadebad9b561d3f45b37e75e50bb9290cfb344e844cc87fecdd582fd34a93d82c801840e4ba2b93db0b2fe1a13168ed5a952fe6a85b1d23

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  342B

                  MD5

                  2a73bdb0504483557221bccb6e1505a7

                  SHA1

                  358479f13954071b97f1fc1ec3d1429fa328df29

                  SHA256

                  3b15b760e3f374c5b2dde1cbe21c7f321bfdd901c1a97a0d9ae89d22a3844bc1

                  SHA512

                  b033fda4624a5607fa8be581566d1c9af05793abd044b99d43ec7358265334f2be2203188387ccdce6d259861019e7d12741dfae215ba52b491b4a7f7db57d29

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\down[1]
                  Filesize

                  748B

                  MD5

                  c4f558c4c8b56858f15c09037cd6625a

                  SHA1

                  ee497cc061d6a7a59bb66defea65f9a8145ba240

                  SHA256

                  39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

                  SHA512

                  d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\errorPageStrings[1]
                  Filesize

                  2KB

                  MD5

                  e3e4a98353f119b80b323302f26b78fa

                  SHA1

                  20ee35a370cdd3a8a7d04b506410300fd0a6a864

                  SHA256

                  9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

                  SHA512

                  d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\invalidcert[1]
                  Filesize

                  2KB

                  MD5

                  8ce0833cca8957bda3ad7e4fe051e1dc

                  SHA1

                  e5b9df3b327f52a9ed2d3821851e9fdd05a4b558

                  SHA256

                  f18e9671426708c65f999ca0fd11492e699cb13edc84a7d863fa9f83eb2178c3

                  SHA512

                  283b4c6b1035b070b98e7676054c8d52608a1c9682dfe138c569adfecf84b6c5b04fe1630eb13041ad43a231f83bf38680198acd8d5a76a47ec77829282a99fa

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\green_shield[1]
                  Filesize

                  810B

                  MD5

                  c6452b941907e0f0865ca7cf9e59b97d

                  SHA1

                  f9a2c03d1be04b53f2301d3d984d73bf27985081

                  SHA256

                  1ba122f4b39a33339fa9935bf656bb0b4b45cdded78afb16aafd73717d647439

                  SHA512

                  beb58c06c2c1016a7c7c8289d967eb7ffe5840417d9205a37c6d97bd51b153f4a053e661ad4145f23f56ce0aebda101932b8ed64b1cd4178d127c9e2a20a1f58

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\invalidcert[1]
                  Filesize

                  4KB

                  MD5

                  a5d6ba8403d720f2085365c16cebebef

                  SHA1

                  487dcb1af9d7be778032159f5c0bc0d25a1bf683

                  SHA256

                  59e53005e12d5c200ad84aeb73b4745875973877bd7a2f5f80512fe507de02b7

                  SHA512

                  6341b8af2f9695bb64bbf86e3b7bfb158471aef0c1b45e8b78f6e4b28d5cb03e7b25f4f0823b503d7e9f386d33a7435e5133117778291a3c543cafa677cdc82d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\ErrorPageTemplate[1]
                  Filesize

                  2KB

                  MD5

                  f4fe1cb77e758e1ba56b8a8ec20417c5

                  SHA1

                  f4eda06901edb98633a686b11d02f4925f827bf0

                  SHA256

                  8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

                  SHA512

                  62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\red_shield[1]
                  Filesize

                  810B

                  MD5

                  006def2acbd0d2487dffc287b27654d6

                  SHA1

                  c95647a113afc5241bdb313f911bf338b9aeffdc

                  SHA256

                  4bd9f96d6971c7d37d03d7dea4af922420bb7c6dd46446f05b8e917c33cf9e4e

                  SHA512

                  9dabf92ce2846d8d86e20550c749efbc4a1af23c2319e6ce65a00dc8cbc75ac95a2021020cab1536c3617043a8739b0495302d0ba562f48f4d3c25104b059a04

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\background_gradient_red[1]
                  Filesize

                  868B

                  MD5

                  337038e78cf3c521402fc7352bdd5ea6

                  SHA1

                  017eaf48983c31ae36b5de5de4db36bf953b3136

                  SHA256

                  fbc23311fb5eb53c73a7ca6bfc93e8fa3530b07100a128b4905f8fb7cb145b61

                  SHA512

                  0928d382338f467d0374cce3ff3c392833fe13ac595943e7c5f2aee4ddb3af3447531916dd5ddc716dd17aef14493754ed4c2a1ab7fe6e13386301e36ee98a7d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\httpErrorPagesScripts[1]
                  Filesize

                  8KB

                  MD5

                  3f57b781cb3ef114dd0b665151571b7b

                  SHA1

                  ce6a63f996df3a1cccb81720e21204b825e0238c

                  SHA256

                  46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

                  SHA512

                  8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\red_shield_48[1]
                  Filesize

                  4KB

                  MD5

                  7c588d6bb88d85c7040c6ffef8d753ec

                  SHA1

                  7fdd217323d2dcc4a25b024eafd09ae34da3bfef

                  SHA256

                  5e2cd0990d6d3b0b2345c75b890493b12763227a8104de59c5142369a826e3e0

                  SHA512

                  0a3add1ff681d5190075c59caffde98245592b9a0f85828ab751e59fdf24403a4ef87214366d158e6b8a4c59c5bdaf563535ff5f097f86923620ea19a9b0dc4d

                • C:\Users\Admin\AppData\Local\Temp\Cab38CE.tmp
                  Filesize

                  68KB

                  MD5

                  29f65ba8e88c063813cc50a4ea544e93

                  SHA1

                  05a7040d5c127e68c25d81cc51271ffb8bef3568

                  SHA256

                  1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                  SHA512

                  e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                • C:\Users\Admin\AppData\Local\Temp\Cab394D.tmp
                  Filesize

                  70KB

                  MD5

                  49aebf8cbd62d92ac215b2923fb1b9f5

                  SHA1

                  1723be06719828dda65ad804298d0431f6aff976

                  SHA256

                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                  SHA512

                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                • C:\Users\Admin\AppData\Local\Temp\Tar3971.tmp
                  Filesize

                  181KB

                  MD5

                  4ea6026cf93ec6338144661bf1202cd1

                  SHA1

                  a1dec9044f750ad887935a01430bf49322fbdcb7

                  SHA256

                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                  SHA512

                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                • C:\Users\Admin\AppData\Local\Temp\install.vbs
                  Filesize

                  418B

                  MD5

                  b92d64fe5b1d1f59df4b738262aea8df

                  SHA1

                  c8fb1981759c2d9bb2ec91b705985fba5fc7af63

                  SHA256

                  fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a

                  SHA512

                  2566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2

                • C:\Users\Admin\AppData\Roaming\Remcos\logs.dat
                  Filesize

                  111B

                  MD5

                  d4b266d96cca6c6958d7b0130cf9a5c0

                  SHA1

                  965756ed9ff37448c1672a4485263ac96ab65e4b

                  SHA256

                  6baecf5472fec539627c756b03cce147db74e03337ebc32e9912aa819a4ebf6d

                  SHA512

                  101c73dc7745c9ff075270fde14d82ea440a28e55e0966ffc9e68be0120ed4723cc301e5f7e3e47478b0e1a5c8236d96693903b4d64739e04337309582aeab01

                • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
                  Filesize

                  972KB

                  MD5

                  53ee3e51b223773a7db458eba4bd0528

                  SHA1

                  5ead7b026aa51ba272548be89118991378f54fb3

                  SHA256

                  941d7828d89da175afca52906a1e519707a09685f30332937917505fa8999f87

                  SHA512

                  90d7f487adbc5af048cf6c8bbbe4f1997201fbb7bec28a44c55c3a5009995b9377bc09bb48bd62244eecd0910b1e16cc2f7361e2dae195b95d0271ec1e7cc0ad

                • memory/1680-56-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-60-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-62-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/1680-65-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-66-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-67-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/1680-58-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/2236-22-0x0000000074C30000-0x000000007531E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/2236-5-0x0000000005D60000-0x0000000005E32000-memory.dmp
                  Filesize

                  840KB

                • memory/2236-4-0x0000000074C30000-0x000000007531E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/2236-3-0x0000000000440000-0x0000000000448000-memory.dmp
                  Filesize

                  32KB

                • memory/2236-2-0x0000000074C30000-0x000000007531E000-memory.dmp
                  Filesize

                  6.9MB

                • memory/2236-0-0x0000000074C3E000-0x0000000074C3F000-memory.dmp
                  Filesize

                  4KB

                • memory/2236-1-0x0000000000030000-0x000000000012A000-memory.dmp
                  Filesize

                  1000KB

                • memory/2332-53-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2332-55-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2332-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/2332-49-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2332-50-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2764-29-0x0000000000C00000-0x0000000000CFA000-memory.dmp
                  Filesize

                  1000KB

                • memory/2900-19-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-17-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-12-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-8-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-13-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-14-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/2900-11-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-7-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-10-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2900-9-0x0000000000400000-0x0000000000478000-memory.dmp
                  Filesize

                  480KB

                • memory/2924-79-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/2924-78-0x0000000000400000-0x00000000004FA000-memory.dmp
                  Filesize

                  1000KB

                • memory/2924-76-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB