Create Interactive Tour

Analysis Report Remcos Professional Cracked By Alcatraz3222.exe

Overview

General Information

Sample Name:Remcos Professional Cracked By Alcatraz3222.exe
Analysis ID:422809
MD5:efc159c7cf75545997f8c6af52d3e802
SHA1:b85bd368c91a13db1c5de2326deb25ad666c24c1
SHA256:898ac001d0f6c52c1001c640d9860287fdf30a648d580e9f5dd15e2ef84ab18e
Infos:

Most interesting Screenshot:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Njrat
.NET source code references suspicious native API functions
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Creates files with lurking names (e.g. Crack.exe)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: System File Execution Location Anomaly
Tries to detect debuggers by setting the trap flag for special instructions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses dynamic DNS services
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Netsh Port or Application Allowed
Tries to load missing DLLs
Uses 32bit PE files
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Remcos Professional Cracked By Alcatraz3222.exe (PID: 6504 cmdline: 'C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe' MD5: EFC159C7CF75545997F8C6AF52D3E802)
    • cmd.exe (PID: 2408 cmdline: 'C:\Windows\System32\cmd.exe' /c copy 'C:/Users/user/Desktop/Remcos Professional Cracked By Alcatraz3222.exe' '%temp%\Profile Remcos\Update_Lock_Remcos.exe' /Y MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 1744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5088 cmdline: 'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 6488 cmdline: reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • cmd.exe (PID: 6400 cmdline: 'C:\Windows\System32\cmd.exe' /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • taskhost.exe (PID: 6236 cmdline: C:\Users\user\AppData\Local\Temp\taskhost.exe MD5: D621FD77BD585874F9686D3A76462EF1)
      • netsh.exe (PID: 6612 cmdline: netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
        • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{
  "Campaign ID": "HacKed",
  "Version": "0.7d",
  "Install Name": "3b570ffeeb3d34249b9a5ce0ee58a328",
  "Install Dir": "20",
  "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run",
  "Host": "TEMP",
  "Port": "3202",
  "Network Seprator": "svchost"
}
SourceRuleDescriptionAuthorStrings
00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x5ebc:$a1: netsh firewall add allowedprogram
      • 0x5e8c:$a2: SEE_MASK_NOZONECHECKS
      • 0x5ab0:$b1: [TAP]
      • 0x5fb0:$c3: cmd.exe /c ping
      00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x5e8c:$reg: SEE_MASK_NOZONECHECKS
      • 0x5c7c:$msg: Execute ERROR
      • 0x5cdc:$msg: Execute ERROR
      • 0x5fb0:$ping: cmd.exe /c ping 0 -n 2 & del
      00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        17.2.taskhost.exe.400000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x61b0:$x1: cmd.exe /c ping 0 -n 2 & del "
        • 0x5ec2:$s3: Executed As
        • 0x5ea0:$s6: Download ERROR
        17.2.taskhost.exe.400000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          17.2.taskhost.exe.400000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x60bc:$a1: netsh firewall add allowedprogram
          • 0x608c:$a2: SEE_MASK_NOZONECHECKS
          • 0x5cb0:$b1: [TAP]
          • 0x61b0:$c3: cmd.exe /c ping
          17.2.taskhost.exe.400000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
          • 0x608c:$reg: SEE_MASK_NOZONECHECKS
          • 0x5e7c:$msg: Execute ERROR
          • 0x5edc:$msg: Execute ERROR
          • 0x61b0:$ping: cmd.exe /c ping 0 -n 2 & del
          0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0x43b0:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0x40c2:$s3: Executed As
          • 0x40a0:$s6: Download ERROR
          Click to see the 13 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: System File Execution Location Anomaly
          Source: Process startedAuthor: Florian Roth, Patrick Bareiss, Anton Kutepov, oscd.community: Data: Command: C:\Users\user\AppData\Local\Temp\taskhost.exe, CommandLine: C:\Users\user\AppData\Local\Temp\taskhost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\taskhost.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\taskhost.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\taskhost.exe, ParentCommandLine: 'C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe' , ParentImage: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe, ParentProcessId: 6504, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\taskhost.exe, ProcessId: 6236
          Sigma detected: Direct Autorun Keys Modification
          Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f, CommandLine: reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: 'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5088, ProcessCommandLine: reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f, ProcessId: 6488
          Sigma detected: Netsh Port or Application Allowed
          Source: Process startedAuthor: Markus Neis, Sander Wiebing: Data: Command: netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE, CommandLine: netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE, CommandLine|base64offset|contains: l, Image: C:\Windows\SysWOW64\netsh.exe, NewProcessName: C:\Windows\SysWOW64\netsh.exe, OriginalFileName: C:\Windows\SysWOW64\netsh.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\taskhost.exe, ParentImage: C:\Users\user\AppData\Local\Temp\taskhost.exe, ParentProcessId: 6236, ProcessCommandLine: netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE, ProcessId: 6612
          Sigma detected: Windows Processes Suspicious Parent Directory
          Source: Process startedAuthor: vburov: Data: Command: C:\Users\user\AppData\Local\Temp\taskhost.exe, CommandLine: C:\Users\user\AppData\Local\Temp\taskhost.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\taskhost.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\taskhost.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\taskhost.exe, ParentCommandLine: 'C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe' , ParentImage: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe, ParentProcessId: 6504, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\taskhost.exe, ProcessId: 6236

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sample
          Source: Remcos Professional Cracked By Alcatraz3222.exeAvira: detected
          Antivirus detection for dropped file
          Source: C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exeAvira: detection malicious, Label: TR/Dropper.Gen
          Found malware configuration
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "3b570ffeeb3d34249b9a5ce0ee58a328", "Install Dir": "20", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "TEMP", "Port": "3202", "Network Seprator": "svchost"}
          Multi AV Scanner detection for dropped file
          Source: C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exeReversingLabs: Detection: 55%
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeReversingLabs: Detection: 31%
          Multi AV Scanner detection for submitted file
          Source: Remcos Professional Cracked By Alcatraz3222.exeVirustotal: Detection: 63%Perma Link
          Source: Remcos Professional Cracked By Alcatraz3222.exeReversingLabs: Detection: 55%
          Yara detected Njrat
          Source: Yara matchFile source: 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: taskhost.exe PID: 6236, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Remcos Professional Cracked By Alcatraz3222.exe PID: 6504, type: MEMORY
          Source: Yara matchFile source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped file
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exeJoe Sandbox ML: detected
          Machine Learning detection for sample
          Source: Remcos Professional Cracked By Alcatraz3222.exeJoe Sandbox ML: detected
          Source: 17.2.taskhost.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Utente\Desktop\njRAT v0.7d Professional Edition By Dark .NET\njRAT v0.7d Professional Edition By Dark .NET\NJ RAT 7 Stub Source\Nero 7\Nero 7\obj\x86\Release\Nero 7.pdb source: Remcos Professional Cracked By Alcatraz3222.exe, 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, taskhost.exe, 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp
          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: taskhost.exe, taskhost.exe.0.dr
          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.dr

          Networking:

          barindex
          C2 URLs / IPs found in malware configuration
          Source: Malware configuration extractorURLs: TEMP
          Uses dynamic DNS services
          Source: unknownDNS query: name: dllsys.duckdns.org
          Source: global trafficTCP traffic: 192.168.2.6:49723 -> 84.220.8.178:3202
          Source: Joe Sandbox ViewASN Name: TISCALI-IT TISCALI-IT
          Source: unknownDNS traffic detected: queries for: dllsys.duckdns.org
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://breaking-security.net/terms
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://breaking-security.net/termsopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://breakingsec02.co.nf/Remcos/upd_free.txtU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://www.geoplugin.net
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://www.geoplugin.net/json.gp?ip=
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: http://www.geoplugin.netU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpString found in binary or memory: https://Breaking-Security.net
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426649149.0000000004AB8000.00000004.00000001.sdmpString found in binary or memory: https://Breaking-Security.netpf
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/clientarea/support
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/clientarea/supportopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/contact
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/contactopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/forum
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/forumopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/keylogger
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/keyloggeropenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/meteorite-downloader
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/meteorite-downloaderopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/octopus
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/octopusopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/poseidon
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/poseidonopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcos
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcos/changelog
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcos/changelogopenCongratulations
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcos/manual
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcos/manualopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/remcosopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/shop/remcos/
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/shop/remcos/open
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/source-codes/delphisources
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/source-codes/delphisourcesopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/terms
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/termsopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/viotto-binder
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.net/viotto-binderopenU
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpString found in binary or memory: https://breaking-security.netopenU

          E-Banking Fraud:

          barindex
          Yara detected Njrat
          Source: Yara matchFile source: 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: taskhost.exe PID: 6236, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Remcos Professional Cracked By Alcatraz3222.exe PID: 6504, type: MEMORY
          Source: Yara matchFile source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)
          Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Creates files with lurking names (e.g. Crack.exe)
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remcos Professional Cracked By Alcatraz3222.exe.logJump to behavior
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\taskhost.exe 2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
          Source: Remcos Professional Cracked By Alcatraz3222.exe.0.drStatic PE information: Number of sections : 12 > 10
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Remcos Professional Cracked By Alcatraz3222.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: taskhost.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: taskhost.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: taskhost.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Update_Lock_Remcos.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000000.00000003.429024045.00000000099C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMSBuild.exeT vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000000.00000002.447468740.00000000066D0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNero 7.exe. vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426344142.0000000004A3E000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427480274.0000000004C30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426839163.0000000004B00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamekernel32j% vs Remcos Professional Cracked By Alcatraz3222.exe
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dfddccccccccccccccccccccccccccccccccccccccccccccccccccccddddfll.dllJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dfddccccccccccccccccccccccccccccccccccccccccccccccccccccddddfll.dllJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dfddccccccccccccccccccccccccccccccccccccccccccccccccccccddddfll.dllJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dfddccccccccccccccccccccccccccccccccccccccccccccccccccccddddfll.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dataexchange.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: d3d11.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dcomp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: coremessaging.dllJump to behavior
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f
          Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: taskhost.exe.0.dr, Microsoft.Build/CommandLine/OutOfProcTaskHostNode.csTask registration methods: 'RegisterTaskObject', 'UnregisterPacketHandler', 'RegisterPacketHandler', 'UnregisterTaskObject', 'GetRegisteredTaskObject'
          Source: taskhost.exe.0.dr, Microsoft.Build/Shared/TaskLoader.csTask registration methods: 'CreateTask'
          Source: taskhost.exe.0.dr, Microsoft.Build/BackEnd/TaskParameter.csTask registration methods: 'CreateNewTaskItemFrom'
          Source: taskhost.exe.0.dr, Microsoft.Build/Shared/RegisteredTaskObjectCacheBase.csTask registration methods: '.cctor', 'GetLazyCollectionForLifetime', 'RegisterTaskObject', 'DisposeObjects', 'IsCollectionEmptyOrUncreated', '.ctor', 'UnregisterTaskObject', 'DisposeCacheObjects', 'GetRegisteredTaskObject', 'GetCollectionForLifetime'
          Source: taskhost.exe.0.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: taskhost.exe.0.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
          Source: taskhost.exe.0.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
          Source: taskhost.exe.0.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: taskhost.exe.0.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.425074300.0000000002C38000.00000004.00000020.sdmpBinary or memory string: Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBp
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
          Source: taskhost.exe, taskhost.exe.0.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD
          Source: taskhost.exe, taskhost.exe.0.drBinary or memory string: *.sln
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: MSBuild MyApp.csproj /t:Clean
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: /ignoreprojectextensions:.sln
          Source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.drBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
          Source: classification engineClassification label: mal100.troj.evad.winEXE@20/9@24/1
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remcos Professional Cracked By Alcatraz3222.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6408:120:WilError_01
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMutant created: \Sessions\1\BaseNamedObjects\REMCOS_C&C_MUTEX
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1744:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5836:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_01
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeMutant created: \Sessions\1\BaseNamedObjects\3b570ffeeb3d34249b9a5ce0ee58a328
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeJump to behavior
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Remcos Professional Cracked By Alcatraz3222.exeVirustotal: Detection: 63%
          Source: Remcos Professional Cracked By Alcatraz3222.exeReversingLabs: Detection: 55%
          Source: unknownProcess created: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe 'C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe'
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe 'C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe'
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:/Users/user/Desktop/Remcos Professional Cracked By Alcatraz3222.exe' '%temp%\Profile Remcos\Update_Lock_Remcos.exe' /Y
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\taskhost.exe C:\Users\user\AppData\Local\Temp\taskhost.exe
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe 'C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe' Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:/Users/user/Desktop/Remcos Professional Cracked By Alcatraz3222.exe' '%temp%\Profile Remcos\Update_Lock_Remcos.exe' /YJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /fJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.IdentifierJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\taskhost.exe C:\Users\user\AppData\Local\Temp\taskhost.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /fJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLEJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeWindow found: window name: TComboBoxJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic file information: File size 18539216 > 1048576
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1160200
          Source: Remcos Professional Cracked By Alcatraz3222.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: C:\Users\Utente\Desktop\njRAT v0.7d Professional Edition By Dark .NET\njRAT v0.7d Professional Edition By Dark .NET\NJ RAT 7 Stub Source\Nero 7\Nero 7\obj\x86\Release\Nero 7.pdb source: Remcos Professional Cracked By Alcatraz3222.exe, 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, taskhost.exe, 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp
          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: taskhost.exe, taskhost.exe.0.dr
          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbD source: taskhost.exe, 00000011.00000002.614945241.00000000008E2000.00000002.00020000.sdmp, taskhost.exe.0.dr
          Source: initial sampleStatic PE information: section where entry point is pointing to: .viotto1
          Source: Remcos Professional Cracked By Alcatraz3222.exe.0.drStatic PE information: section name: .didata
          Source: Remcos Professional Cracked By Alcatraz3222.exe.0.drStatic PE information: section name: .viotto0
          Source: Remcos Professional Cracked By Alcatraz3222.exe.0.drStatic PE information: section name: .viotto1
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeJump to dropped file
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile created: C:\Users\user\AppData\Local\Temp\taskhost.exeJump to dropped file
          Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exeJump to dropped file

          Boot Survival:

          barindex
          Creates an undocumented autostart registry key
          Source: C:\Windows\SysWOW64\reg.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows LoadJump to behavior

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Overwrites code with unconditional jumps - possibly settings hooks in foreign process
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2A60005 value: E9 FB BF 3C 75 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 77E2C000 value: E9 0A 40 C3 8A Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2BA0008 value: E9 AB E0 2C 75 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 77E6E0B0 value: E9 60 1F D3 8A Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2BB0005 value: E9 CB 5A 50 74 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 770B5AD0 value: E9 3A A5 AF 8B Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2BD0005 value: E9 5B B0 50 74 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 770DB060 value: E9 AA 4F AF 8B Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2BF0005 value: E9 DB F8 F9 73 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 76B8F8E0 value: E9 2A 07 06 8C Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2C00005 value: E9 FB 42 FB 73 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 76BB4300 value: E9 0A BD 04 8C Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2C10005 value: E9 FB 99 24 75 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 77E59A00 value: E9 0A 66 DB 8A Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 2C20007 value: E9 7B 4C 27 75 Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeMemory written: PID: 6932 base: 77E94C80 value: E9 8E B3 D8 8A Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion:

          barindex
          Tries to detect debuggers by setting the trap flag for special instructions
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSpecial instruction interceptor: First address: 1853acb instructions rdtsc
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403942636.0000000000762000.00000020.00020000.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurements
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 00000000018896CF second address: 00000000018896E8 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 dec dl 0x00000006 not cl 0x00000008 sub cl, FFFFFF82h 0x0000000b sub dx, di 0x0000000e bsr edx, esp 0x00000011 xor bl, cl 0x00000013 dec ax 0x00000016 sal eax, FFFFFFE6h 0x00000019 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 0000000001963009 second address: 0000000001846175 instructions: 0x00000000 rdtsc 0x00000002 adc ax, si 0x00000005 jmp 00007F9A5485A15Ah 0x0000000a movzx ecx, byte ptr [edi] 0x0000000d btc ax, FFE7h 0x00000012 clc 0x00000013 xor cl, bl 0x00000015 xchg ax, dx 0x00000017 sal dh, cl 0x00000019 add cl, FFFFFFE2h 0x0000001c sar edx, 29h 0x0000001f adc eax, 4AD259B5h 0x00000024 xor cl, 0000001Fh 0x00000027 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 00000000018C994F second address: 00000000018C995A instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 bt ax, 0032h 0x00000009 add eax, ebp 0x0000000b rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 00000000018C995A second address: 00000000018C997C instructions: 0x00000000 rdtsc 0x00000002 xor cl, 00000051h 0x00000005 shl al, FFFFFF88h 0x00000008 movsx dx, ch 0x0000000c cdq 0x0000000d neg cl 0x0000000f btc ax, dx 0x00000013 ror eax, 3Ah 0x00000016 not cl 0x00000018 ror dx, cl 0x0000001b movzx edx, di 0x0000001e ror cl, 1 0x00000020 xor bl, cl 0x00000022 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 0000000001505987 second address: 0000000001505992 instructions: 0x00000000 rdtsc 0x00000002 not cl 0x00000004 bt ax, 0032h 0x00000009 add eax, ebp 0x0000000b rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 0000000001505992 second address: 00000000015059B4 instructions: 0x00000000 rdtsc 0x00000002 xor cl, 00000051h 0x00000005 shl al, FFFFFF88h 0x00000008 movsx dx, ch 0x0000000c cdq 0x0000000d neg cl 0x0000000f btc ax, dx 0x00000013 ror eax, 3Ah 0x00000016 not cl 0x00000018 ror dx, cl 0x0000001b movzx edx, di 0x0000001e ror cl, 1 0x00000020 xor bl, cl 0x00000022 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 0000000001129138 second address: 000000000129ECD3 instructions: 0x00000000 rdtsc 0x00000002 sub edi, 00000008h 0x00000008 test dh, dl 0x0000000a mov dword ptr [edi], edx 0x0000000c mov dword ptr [edi+04h], eax 0x0000000f adc ax, 000072BAh 0x00000013 mov eax, dword ptr [esi] 0x00000015 lea esi, dword ptr [esi+00000004h] 0x0000001b clc 0x0000001c xor eax, ebx 0x0000001e ror eax, 03h 0x00000021 jmp 00007F9A54392860h 0x00000026 bswap eax 0x00000028 inc eax 0x00000029 test ebp, 079613ADh 0x0000002f neg eax 0x00000031 sub eax, 26BE4558h 0x00000036 jmp 00007F9A5466D96Ch 0x0000003b xor ebx, eax 0x0000003d cmp dx, 19C7h 0x00000042 add ebp, eax 0x00000044 jmp 00007F9A53EDCFAAh 0x00000049 jmp 00007F9A53F8BC0Ch 0x0000004e lea eax, dword ptr [esp+60h] 0x00000052 jmp 00007F9A54272ACAh 0x00000057 cmp edi, eax 0x00000059 jmp 00007F9A54B94EDFh 0x0000005e ja 00007F9A53C61DEFh 0x00000064 push ebp 0x00000065 ret 0x00000066 mov ecx, dword ptr [edi] 0x00000068 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 0000000000F77410 second address: 0000000000F77429 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 dec dl 0x00000006 not cl 0x00000008 sub cl, FFFFFF82h 0x0000000b sub dx, di 0x0000000e bsr edx, esp 0x00000011 xor bl, cl 0x00000013 dec ax 0x00000016 sal eax, FFFFFFE6h 0x00000019 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 000000000076762B second address: 0000000000F523BB instructions: 0x00000000 rdtsc 0x00000002 adc ax, si 0x00000005 jmp 00007F9A54B7922Eh 0x0000000a movzx ecx, byte ptr [edi] 0x0000000d btc ax, FFE7h 0x00000012 clc 0x00000013 xor cl, bl 0x00000015 xchg ax, dx 0x00000017 sal dh, cl 0x00000019 add cl, FFFFFFE2h 0x0000001c sar edx, 29h 0x0000001f adc eax, 4AD259B5h 0x00000024 xor cl, 0000001Fh 0x00000027 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 00000000011CEBCC second address: 0000000001247CD7 instructions: 0x00000000 rdtsc 0x00000002 sar al, 00000034h 0x00000005 rol al, cl 0x00000007 mov eax, dword ptr [esp+ecx] 0x0000000a rol dh, cl 0x0000000c lea esi, dword ptr [esi-00000004h] 0x00000012 bts dx, cx 0x00000016 mov dword ptr [esi], eax 0x00000018 lea ebp, dword ptr [ebp-00000004h] 0x0000001e rcr edx, cl 0x00000020 mov edx, dword ptr [ebp+00h] 0x00000024 xor edx, ebx 0x00000026 test edi, 4C1D4763h 0x0000002c cmc 0x0000002d cmp al, CEh 0x0000002f neg edx 0x00000031 sub edx, 16B2299Dh 0x00000037 stc 0x00000038 cmc 0x00000039 clc 0x0000003a ror edx, 02h 0x0000003d stc 0x0000003e clc 0x0000003f bswap edx 0x00000041 cmp bp, 3AA2h 0x00000046 xor ebx, edx 0x00000048 cmp ah, ah 0x0000004a clc 0x0000004b add edi, edx 0x0000004d jmp 00007F9A546FBA14h 0x00000052 lea edx, dword ptr [esp+60h] 0x00000056 cmp di, sp 0x00000059 test si, 1D39h 0x0000005e cmp esi, edx 0x00000060 jmp 00007F9A5462173Fh 0x00000065 ja 00007F9A547C4E77h 0x0000006b jmp edi 0x0000006d sub ebp, 00000001h 0x00000073 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeRDTSC instruction interceptor: First address: 00000000011B801E second address: 0000000001268E07 instructions: 0x00000000 rdtsc 0x00000002 sub esi, 00000008h 0x00000008 cmp ebx, edi 0x0000000a mov dword ptr [esi], edx 0x0000000c test edi, esi 0x0000000e mov dword ptr [esi+04h], eax 0x00000011 and eax, edi 0x00000013 stc 0x00000014 sub ebp, 00000004h 0x0000001a mov eax, dword ptr [ebp+00h] 0x0000001e stc 0x0000001f xor eax, ebx 0x00000021 cmc 0x00000022 jmp 00007F9A54149C8Ch 0x00000027 ror eax, 02h 0x0000002a clc 0x0000002b cmp bl, 00000052h 0x0000002e sub eax, 7802521Eh 0x00000033 ror eax, 1 0x00000035 cmp esi, eax 0x00000037 sub eax, 07845C0Bh 0x0000003c xor ebx, eax 0x0000003e stc 0x0000003f add edi, eax 0x00000041 jmp 00007F9A5440282Ch 0x00000046 jmp 00007F9A53F9D03Eh 0x0000004b lea eax, dword ptr [esp+60h] 0x0000004f cmp sp, 6C62h 0x00000054 cmc 0x00000055 stc 0x00000056 cmp esi, eax 0x00000058 jmp 00007F9A5421EE84h 0x0000005d ja 00007F9A54846A04h 0x00000063 jmp edi 0x00000065 mov ecx, dword ptr [esi] 0x00000067 cmc 0x00000068 or dl, 0000002Ah 0x0000006b rdtsc
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeWindow / User API: threadDelayed 4371Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe TID: 6668Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exe TID: 6736Thread sleep count: 4371 > 30Jump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: VMware
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: chkVMwareClick
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: TCheckBoxchkVMware
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426839163.0000000004B00000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.415818426.00000000037A0000.00000002.00000001.sdmp, taskhost.exe, 00000011.00000002.619666334.0000000005D10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpBinary or memory string: chkVMware
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: chkSandboxieClickTCheckBoxchkVMware
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426839163.0000000004B00000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.415818426.00000000037A0000.00000002.00000001.sdmp, taskhost.exe, 00000011.00000002.619666334.0000000005D10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: chkVMwareClickTCheckBox
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpBinary or memory string: chkVMware\
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426839163.0000000004B00000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.415818426.00000000037A0000.00000002.00000001.sdmp, taskhost.exe, 00000011.00000002.619666334.0000000005D10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426160944.00000000049EA000.00000004.00000001.sdmpBinary or memory string: chkVMware`
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.425246252.0000000002C91000.00000004.00000020.sdmp, taskhost.exe, 00000011.00000002.616186244.0000000001044000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426839163.0000000004B00000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.415818426.00000000037A0000.00000002.00000001.sdmp, taskhost.exe, 00000011.00000002.619666334.0000000005D10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSystem information queried: ModuleInformationJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging:

          barindex
          Hides threads from debuggers
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeSystem information queried: KernelDebuggerInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exeProcess queried: DebugObjectHandleJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          .NET source code references suspicious native API functions
          Source: taskhost.exe.0.dr, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
          Allocates memory in foreign processes
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory allocated: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 400000 protect: page execute and read and writeJump to behavior
          Injects a PE file into a foreign processes
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 400000 value starts with: 4D5AJump to behavior
          Writes to foreign memory regions
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 402000Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 40A000Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: 40C000Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeMemory written: C:\Users\user\AppData\Local\Temp\taskhost.exe base: A9D008Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe 'C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe' Jump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:/Users/user/Desktop/Remcos Professional Cracked By Alcatraz3222.exe' '%temp%\Profile Remcos\Update_Lock_Remcos.exe' /YJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /fJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.IdentifierJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeProcess created: C:\Users\user\AppData\Local\Temp\taskhost.exe C:\Users\user\AppData\Local\Temp\taskhost.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /fJump to behavior
          Source: taskhost.exe, 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: taskhost.exe, 00000011.00000002.616394084.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: taskhost.exe, 00000011.00000002.616394084.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: taskhost.exe, 00000011.00000002.616394084.00000000016A0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
          Source: taskhost.exe, 00000011.00000002.616394084.00000000016A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeQueries volume information: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeQueries volume information: C:\Users\user\AppData\Local\Temp\taskhost.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings:

          barindex
          Modifies the windows firewall
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE
          Uses netsh to modify the Windows network and firewall settings
          Source: C:\Users\user\AppData\Local\Temp\taskhost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE

          Stealing of Sensitive Information:

          barindex
          Yara detected Njrat
          Source: Yara matchFile source: 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: taskhost.exe PID: 6236, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Remcos Professional Cracked By Alcatraz3222.exe PID: 6504, type: MEMORY
          Source: Yara matchFile source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected Njrat
          Source: Yara matchFile source: 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: taskhost.exe PID: 6236, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Remcos Professional Cracked By Alcatraz3222.exe PID: 6504, type: MEMORY
          Source: Yara matchFile source: 17.2.taskhost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.42027c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Remcos Professional Cracked By Alcatraz3222.exe.41faf30.2.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection312Masquerading11Credential API Hooking1Security Software Discovery531Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsNative API1Registry Run Keys / Startup Folder1Scheduled Task/Job1Modify Registry1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)DLL Side-Loading1Registry Run Keys / Startup Folder1Disable or Modify Tools21Security Account ManagerVirtualization/Sandbox Evasion151SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol21Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)DLL Side-Loading1Virtualization/Sandbox Evasion151NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncSystem Information Discovery213Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 422809 Sample: Remcos Professional Cracked... Startdate: 24/05/2021 Architecture: WINDOWS Score: 100 49 dllsys.duckdns.org 2->49 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus detection for dropped file 2->57 59 13 other signatures 2->59 9 Remcos Professional Cracked By Alcatraz3222.exe 9 2->9         started        signatures3 process4 file5 41 C:\Users\user\AppData\Local\...\taskhost.exe, PE32 9->41 dropped 43 Remcos Professiona...By Alcatraz3222.exe, PE32 9->43 dropped 45 C:\Users\user\...\Update_Lock_Remcos.exe.lnk, MS 9->45 dropped 47 2 other malicious files 9->47 dropped 61 Creates files with lurking names (e.g. Crack.exe) 9->61 63 Writes to foreign memory regions 9->63 65 Allocates memory in foreign processes 9->65 67 Injects a PE file into a foreign processes 9->67 13 taskhost.exe 3 2 9->13         started        17 Remcos Professional Cracked By Alcatraz3222.exe 9->17         started        19 cmd.exe 3 9->19         started        22 2 other processes 9->22 signatures6 process7 dnsIp8 51 dllsys.duckdns.org 84.220.8.178, 3202, 49723, 49725 TISCALI-IT Italy 13->51 71 Uses netsh to modify the Windows network and firewall settings 13->71 73 Modifies the windows firewall 13->73 24 netsh.exe 1 3 13->24         started        75 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->75 77 Hides threads from debuggers 17->77 37 C:\Users\user\...\Update_Lock_Remcos.exe, PE32 19->37 dropped 39 C:\...\Update_Lock_Remcos.exe:Zone.Identifier, ASCII 19->39 dropped 26 conhost.exe 19->26         started        28 reg.exe 1 1 22->28         started        31 conhost.exe 22->31         started        33 conhost.exe 22->33         started        file9 signatures10 process11 signatures12 35 conhost.exe 24->35         started        69 Creates an undocumented autostart registry key 28->69 process13

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand
          SourceDetectionScannerLabelLink
          Remcos Professional Cracked By Alcatraz3222.exe63%VirustotalBrowse
          Remcos Professional Cracked By Alcatraz3222.exe55%ReversingLabsByteCode-MSIL.Trojan.Occamy
          Remcos Professional Cracked By Alcatraz3222.exe100%AviraTR/Dropper.Gen
          Remcos Professional Cracked By Alcatraz3222.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe100%AviraTR/Dropper.Gen
          C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe55%ReversingLabsByteCode-MSIL.Trojan.Occamy
          C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe8%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe31%ReversingLabs
          C:\Users\user\AppData\Local\Temp\taskhost.exe0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\taskhost.exe0%ReversingLabs
          SourceDetectionScannerLabelLinkDownload
          17.2.taskhost.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.geoplugin.net0%VirustotalBrowse
          http://www.geoplugin.net0%Avira URL Cloudsafe
          https://Breaking-Security.netpf0%Avira URL Cloudsafe
          https://breaking-security.net1%VirustotalBrowse
          https://breaking-security.net0%Avira URL Cloudsafe
          http://www.geoplugin.net/json.gp?ip=0%Avira URL Cloudsafe
          https://breaking-security.net/keylogger0%Avira URL Cloudsafe
          https://breaking-security.netopenU0%Avira URL Cloudsafe
          https://breaking-security.net/remcos/changelogopenCongratulations0%Avira URL Cloudsafe
          https://breaking-security.net/remcos/manualopenU0%Avira URL Cloudsafe
          https://breaking-security.net/remcosopenU0%Avira URL Cloudsafe
          https://breaking-security.net/shop/remcos/0%Avira URL Cloudsafe
          https://breaking-security.net/remcos0%Avira URL Cloudsafe
          https://breaking-security.net/octopus0%Avira URL Cloudsafe
          https://breaking-security.net/viotto-binder0%Avira URL Cloudsafe
          https://breaking-security.net/keyloggeropenU0%Avira URL Cloudsafe
          https://breaking-security.net/meteorite-downloader0%Avira URL Cloudsafe
          https://breaking-security.net/remcos/changelog0%Avira URL Cloudsafe
          https://breaking-security.net/forum0%Avira URL Cloudsafe
          http://breaking-security.net/terms0%Avira URL Cloudsafe
          https://breaking-security.net/source-codes/delphisources0%Avira URL Cloudsafe
          https://breaking-security.net/poseidon0%Avira URL Cloudsafe
          https://breaking-security.net/viotto-binderopenU0%Avira URL Cloudsafe
          http://breaking-security.net/termsopenU0%Avira URL Cloudsafe
          https://breaking-security.net/shop/remcos/open0%Avira URL Cloudsafe
          https://breaking-security.net/source-codes/delphisourcesopenU0%Avira URL Cloudsafe
          https://breaking-security.net/clientarea/support0%Avira URL Cloudsafe
          https://breaking-security.net/contactopenU0%Avira URL Cloudsafe
          TEMP0%Avira URL Cloudsafe
          https://breaking-security.net/poseidonopenU0%Avira URL Cloudsafe
          https://breaking-security.net/meteorite-downloaderopenU0%Avira URL Cloudsafe
          http://www.geoplugin.netU0%Avira URL Cloudsafe
          https://breaking-security.net/contact0%Avira URL Cloudsafe
          https://breaking-security.net/remcos/manual0%Avira URL Cloudsafe
          https://breaking-security.net/octopusopenU0%Avira URL Cloudsafe
          https://breaking-security.net/terms0%Avira URL Cloudsafe
          https://breaking-security.net/termsopenU0%Avira URL Cloudsafe
          https://breaking-security.net/forumopenU0%Avira URL Cloudsafe
          https://breaking-security.net/clientarea/supportopenU0%Avira URL Cloudsafe

          Download Network PCAP: filteredfull

          NameIPActiveMaliciousAntivirus DetectionReputation
          dllsys.duckdns.org
          84.220.8.178
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            TEMPtrue
            • Avira URL Cloud: safe
            low
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.geoplugin.netRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://Breaking-Security.netpfRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.426649149.0000000004AB8000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.netRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.geoplugin.net/json.gp?ip=Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/keyloggerRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.netopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/remcos/changelogopenCongratulationsRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/remcos/manualopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/remcosopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/shop/remcos/Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/remcosRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://breaking-security.net/octopusRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=Remcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              high
              https://breaking-security.net/viotto-binderRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/keyloggeropenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/meteorite-downloaderRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/remcos/changelogRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/forumRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://breaking-security.net/termsRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/source-codes/delphisourcesRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/poseidonRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/viotto-binderopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://breaking-security.net/termsopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/shop/remcos/openRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/source-codes/delphisourcesopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://breaking-security.net/clientarea/supportRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://breakingsec02.co.nf/Remcos/upd_free.txtURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                high
                https://breaking-security.net/contactopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://breaking-security.net/poseidonopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://breaking-security.net/meteorite-downloaderopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.geoplugin.netURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://breaking-security.net/contactRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://breaking-security.net/remcos/manualRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://Breaking-Security.netRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.427683251.0000000004CD0000.00000004.00000001.sdmpfalse
                  unknown
                  https://breaking-security.net/octopusopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://breaking-security.net/termsRemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://breaking-security.net/termsopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://breaking-security.net/forumopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://breaking-security.net/clientarea/supportopenURemcos Professional Cracked By Alcatraz3222.exe, 00000005.00000002.403412459.0000000000401000.00000020.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  84.220.8.178
                  dllsys.duckdns.orgItaly
                  8612TISCALI-ITtrue

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:422809
                  Start date:24.05.2021
                  Start time:16:01:32
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 9m 2s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:Remcos Professional Cracked By Alcatraz3222.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:32
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@20/9@24/1
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 85.3% (good quality ratio 73.5%)
                  • Quality average: 38.1%
                  • Quality standard deviation: 20%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 104.42.151.234, 204.79.197.200, 13.107.21.200, 40.88.32.150, 92.122.145.220, 168.61.161.212, 52.139.176.199, 2.20.142.209, 2.20.143.16, 52.155.217.156, 20.54.26.129, 92.122.213.194, 92.122.213.247, 184.30.20.56, 20.82.210.154
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, iris-de-prod-azsc-eas.eastasia.cloudapp.azure.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                  • Execution Graph export aborted for target Remcos Professional Cracked By Alcatraz3222.exe, PID 6504 because it is empty
                  • Execution Graph export aborted for target taskhost.exe, PID 6236 because there are no executed function
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  16:03:11API Interceptor1x Sleep call for process: Remcos Professional Cracked By Alcatraz3222.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  TISCALI-ITnetworkservice.exeGet hashmaliciousBrowse
                  • 94.34.105.225
                  z3hir.x86Get hashmaliciousBrowse
                  • 82.84.52.23
                  R8WWx5t2RE.dllGet hashmaliciousBrowse
                  • 78.12.42.38
                  yVn2ywuhEC.exeGet hashmaliciousBrowse
                  • 94.36.132.239
                  Astra.x86Get hashmaliciousBrowse
                  • 94.37.176.246
                  http://tiscali.itGet hashmaliciousBrowse
                  • 213.205.32.58
                  1.exeGet hashmaliciousBrowse
                  • 84.223.33.1
                  Emotet1902.docGet hashmaliciousBrowse
                  • 213.205.38.25
                  Emotet1902.docGet hashmaliciousBrowse
                  • 213.205.38.25
                  www.sunsmart.co.in/overdue-paymentGet hashmaliciousBrowse
                  • 213.205.38.29
                  8b9eaeff00382210a583a0b5611c1d3f_976b00382cbb63c03e8fcd6677e4f973_Kovter.exeGet hashmaliciousBrowse
                  • 84.220.127.151
                  uHTaztm0Zh.exeGet hashmaliciousBrowse
                  • 213.205.33.61
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Users\user\AppData\Local\Temp\taskhost.exeshipping documents.exeGet hashmaliciousBrowse
                    e98ba3ccd39858a7416e4769ae962ce5.exeGet hashmaliciousBrowse
                      CN-Invoice-XXXXX9808-190111432879905.exeGet hashmaliciousBrowse
                        CN-Invoice-XXXXX9808-190111432871000.pdf.exeGet hashmaliciousBrowse
                          PURCHASE ORDER_RFQ1923639152134 URGENT.exeGet hashmaliciousBrowse
                            PO#42038-3524.exeGet hashmaliciousBrowse
                              A-SPP_Piping_BOM_BOQ_Rev.0_20210430_Expansion Joint.exeGet hashmaliciousBrowse
                                Shipping Documents Original BL, Invoice & Pa.exeGet hashmaliciousBrowse
                                  Shipping Documents Original BL, Invoice & Pa.exeGet hashmaliciousBrowse
                                    Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                      SN-346.exeGet hashmaliciousBrowse
                                        insurance certificate , BL.exeGet hashmaliciousBrowse
                                          E5ew8dBzdN.exeGet hashmaliciousBrowse
                                            kHisp6Vo3M.exeGet hashmaliciousBrowse
                                              aVzenPkPSm.exeGet hashmaliciousBrowse
                                                GT42536.scr.exeGet hashmaliciousBrowse
                                                  NEWPO-243769001.exeGet hashmaliciousBrowse
                                                    Purchase Order-877.exeGet hashmaliciousBrowse
                                                      W29wJd8rZ5.exeGet hashmaliciousBrowse
                                                        INV#6534524.exeGet hashmaliciousBrowse
                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remcos Professional Cracked By Alcatraz3222.exe.log
                                                          Process:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):522
                                                          Entropy (8bit):5.348034597186669
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/KDLI4MWuPk21t92n4M9XKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2f84qXKDE4KhK3VZ9pKhk
                                                          MD5:2BB2F12BA5748B56A733B09151565321
                                                          SHA1:3D3EC51320B4BD72C20E5472FBA4675B5BD7E550
                                                          SHA-256:4114743647967ADE8811D6824ABC4C9ABD4EF0177A0082BACEBFC70C53EE3B16
                                                          SHA-512:84B7D2949FC3E4900A2F74E63C314CC331528BC3010F7867462B8C78AC530075F01C6B7576AE0ACAD909DA200AC28F8BD312F77E0013A73E1D81918CD513DE3F
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                          C:\Users\user\AppData\Local\Temp\Profile
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):73
                                                          Entropy (8bit):4.6906762603832455
                                                          Encrypted:false
                                                          SSDEEP:3:PLrgUOYEE1ULNfCys2lM9yn:P/XrEEiLNC/2W9y
                                                          MD5:1A32B94BD8D51DF35D766B6AFFDFACFC
                                                          SHA1:B35BA7F44B350DD9E86C74ACFC722EE7373B77EE
                                                          SHA-256:3D464700F406245D63409C36AAE1504DD9FB63C784CBF7AE8957052068213937
                                                          SHA-512:9F31CB9B0972EFAB2BA566ACD10E0355ACB316B49A8CDB5C3B0787CBA9F97670EA592E385182FE143F54A2EFFB565C1F78083223BC4600CD961BBFFC8F01D3BD
                                                          Malicious:false
                                                          Preview: [zoneTransfer]ZoneID = 2 Remcos\Update_Lock_Remcos.exe:Zone.Identifier..
                                                          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):18539216
                                                          Entropy (8bit):7.9879261117410865
                                                          Encrypted:false
                                                          SSDEEP:393216:GYuGvp8EHb+in8f4Zg41+Q4AXf5ZZcyfHDMxVpSc+q+eOFxdx:3mqSi8fN4sAXfrZcyfo7p0eYHx
                                                          MD5:EFC159C7CF75545997F8C6AF52D3E802
                                                          SHA1:B85BD368C91A13DB1C5DE2326DEB25AD666C24C1
                                                          SHA-256:898AC001D0F6C52C1001C640D9860287FDF30A648D580E9F5DD15E2EF84AB18E
                                                          SHA-512:D06A432233DCEB731DEFD53238971699FEF201D0F9144EE50E5DD7D6620DFDD6C298D52618BF2C9FEB0519574F4565FB0177B00FD8292768FBD8B85DD11E650D
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 55%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^..].....................d....... ... ...@....@.. ....................................@.................................. ..J....@...a........................................................................... ............... ..H............text........ ...................... ..`.rsrc....a...@...b..................@..@.reloc...............f..............@..B................. ......H...........|m..........................................................N+.+.*(y...+.(....+.2(-....(z...*...2(-....({...*....0...........+z-N&8|.........8{...+:(-....(....-.+,s|..........+.s}..........,.&s~........+....E......................................+.*(....8|...s....8z....8......0..........~....+.*o....+....*...*..0..#.......~....+.~....+.+.(....*.+..+.(....+...0..........~....+.+.*.+.(....+..0..........~....+.+.*.+.(....+.2(-....(....*....0.. .......~.........-.+...
                                                          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.bat
                                                          Process:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):232
                                                          Entropy (8bit):4.970244067530965
                                                          Encrypted:false
                                                          SSDEEP:6:SyRK2v/y61EoJOtTZLHvZQRW9m1N723fqkKzEiLVoviKwvM:llx/CoRW9saqLD0
                                                          MD5:5E2757CA2F45970923D85C9A23313CFF
                                                          SHA1:CE78DA8A12BC22BCBD22C70C45562AC9D0BEE043
                                                          SHA-256:A167B7C2F31333D22788B66B9CC754E4A82AC8BB3CD6A92A8609A36BD1054682
                                                          SHA-512:8DB694BB806D6E1C1A1CC88ADCC1BB47FC333CEF41CF230AF8544918F77C371788E730959E46F579043653D7A62E866DBB8FFE3A24F4DA9D19A0752A01312197
                                                          Malicious:true
                                                          Preview: :_Start..timeout /t 600..tasklist /nh /fi "imagename eq taskhost.exe" | find /i "taskhost.exe" >nul && (..Goto _Start..) || (.. Start /W "" "C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe"..Goto _Start..)
                                                          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk
                                                          Process:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon May 24 22:02:58 2021, mtime=Mon May 24 22:03:00 2021, atime=Mon May 24 22:02:25 2021, length=18539216, window=showminimized
                                                          Category:dropped
                                                          Size (bytes):1159
                                                          Entropy (8bit):5.105409595300578
                                                          Encrypted:false
                                                          SSDEEP:24:8XA1zt589cURggKsfHpm4RFCbQAbXaqnt3OyO77aB6m:8XA1zt582URrfHpmuCbnbKqnNOyOiB6
                                                          MD5:A8B2E21D856B027D6B7051DA3F5B32B1
                                                          SHA1:174CB2EB9454C480DAC1710D9213B6673F246D41
                                                          SHA-256:807F97BFBA2F8E7A61FC0D5880AF27A5ECB5E5DF958AEEC83C8182D83E821764
                                                          SHA-512:872E29E7293F5891426D7E03495F91CCF3E831524B55D6B74A9F424265DF5FB74B7467A8B30DEBF4EBE7C5A707FAE6D4CE7F1459031D8E797D6FCF480549F692
                                                          Malicious:true
                                                          Preview: L..................F.... ........P...Z..P..zI...P..........................<.:..DG..Yr?.D..U..k0.&...&........d.!-....&>...-....P......t...CFSF..1......N....AppData...t.Y^...H.g.3..(.....gVA.G..k...@.......N...RG......Y.....................t..A.p.p.D.a.t.a...B.P.1.....>Q.z..Local.<.......N...RH......Y.....................V..L.o.c.a.l.....N.1......RR...Temp..:.......N...RR......Y.....................8..T.e.m.p.....f.1......R\...PROFIL~1..N......R\..R\......R.......................P.r.o.f.i.l.e. .R.e.m.c.o.s.....z.2......RM. .UPDATE~1.EXE..^......R`..Ra.....%V....................../.U.p.d.a.t.e._.L.o.c.k._.R.e.m.c.o.s...e.x.e.......y...............-.......x.............-J.....C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe......\.U.p.d.a.t.e._.L.o.c.k._.R.e.m.c.o.s...e.x.e.........|....I.J.H..K..:...`.......X.......377142...........!a..%.H.VZAj...T...1........-$..!a..%.H.VZAj...T...1........-$.............1SPS.XF.L8C....&.m.q............/...S.-.1.
                                                          C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Preview: [ZoneTransfer]....ZoneId=0
                                                          C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
                                                          Process:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):18294272
                                                          Entropy (8bit):7.984362832957851
                                                          Encrypted:false
                                                          SSDEEP:393216:rvSQtrigd//gMj7J/kwu6GY2JTzAval46wIF19u:DtXOUxkwu6G5fStS1
                                                          MD5:C3C21FA4C2186DEB641455482AB0D3AA
                                                          SHA1:2F4B49E8383E073CCB965943CE970DE403412567
                                                          SHA-256:4EA203509D0FDFF3E31F976413C546CA3D36133BC708E9A1301860961CC3A8D9
                                                          SHA-512:31DB2963F1BD49F7B4A6EE38E54940D20120D6C05EF7BF34EC97EB93051BEE6D5428E9E1271E4AE8F5544B824188AC7278315E2E2C27BE302A312EEBBF8C3FB7
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: Metadefender, Detection: 8%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 31%
                                                          Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L...Cc3\.................&3..6........T......@3...@...........................Y..................@....................P......ZP.......T..f...................................................6S.l....................Pk.....tNT......................text...0.2......................... ..`.itext..p%....3..................... ..`.data.......@3.....................@....bss..........3..........................idata...:....5.....................@....didata.......5.....................@....edata........5.....................@..@.tls....T.....6..........................rdata..].....6.....................@..@.viotto00.... 6.....................`..`.viotto1......A.....................`..`.rsrc....f....T..h..................@..@.............................................................................................................`..............@..@................
                                                          C:\Users\user\AppData\Local\Temp\taskhost.exe
                                                          Process:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):261728
                                                          Entropy (8bit):6.1750840449797675
                                                          Encrypted:false
                                                          SSDEEP:3072:Mao0QHGUQWWimj9q/NLpj/WWqvAw2XpFU4rwOe4ubZSif02RFi/x2uv9FeP:boZTTWxxqVpqWVRXfr802biprVu
                                                          MD5:D621FD77BD585874F9686D3A76462EF1
                                                          SHA1:ABCAE05EE61EE6292003AABD8C80583FA49EDDA2
                                                          SHA-256:2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
                                                          SHA-512:2D85A81D708ECC8AF9A1273143C94DA84E632F1E595E22F54B867225105A1D0A44F918F0FAE6F1EB15ECF69D75B6F4616699776A16A2AA8B5282100FD15CA74C
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: shipping documents.exe, Detection: malicious, Browse
                                                          • Filename: e98ba3ccd39858a7416e4769ae962ce5.exe, Detection: malicious, Browse
                                                          • Filename: CN-Invoice-XXXXX9808-190111432879905.exe, Detection: malicious, Browse
                                                          • Filename: CN-Invoice-XXXXX9808-190111432871000.pdf.exe, Detection: malicious, Browse
                                                          • Filename: PURCHASE ORDER_RFQ1923639152134 URGENT.exe, Detection: malicious, Browse
                                                          • Filename: PO#42038-3524.exe, Detection: malicious, Browse
                                                          • Filename: A-SPP_Piping_BOM_BOQ_Rev.0_20210430_Expansion Joint.exe, Detection: malicious, Browse
                                                          • Filename: Shipping Documents Original BL, Invoice & Pa.exe, Detection: malicious, Browse
                                                          • Filename: Shipping Documents Original BL, Invoice & Pa.exe, Detection: malicious, Browse
                                                          • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                          • Filename: SN-346.exe, Detection: malicious, Browse
                                                          • Filename: insurance certificate , BL.exe, Detection: malicious, Browse
                                                          • Filename: E5ew8dBzdN.exe, Detection: malicious, Browse
                                                          • Filename: kHisp6Vo3M.exe, Detection: malicious, Browse
                                                          • Filename: aVzenPkPSm.exe, Detection: malicious, Browse
                                                          • Filename: GT42536.scr.exe, Detection: malicious, Browse
                                                          • Filename: NEWPO-243769001.exe, Detection: malicious, Browse
                                                          • Filename: Purchase Order-877.exe, Detection: malicious, Browse
                                                          • Filename: W29wJd8rZ5.exe, Detection: malicious, Browse
                                                          • Filename: INV#6534524.exe, Detection: malicious, Browse
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z.........."...0..|...B......n.... ........@.. ....................................`.....................................O........>..............`>.......................................................... ............... ..H............text....z... ...|.................. ..`.rsrc....>.......@...~..............@..@.reloc..............................@..B................P.......H.......8)...................|.........................................*.{.......*v.(=....r...p({...-..+..}....*....0..%........(....-..*....(z.....&..}.........*.*....................0..5........(....-..*.-.r+..ps>...z.....i(z.....&..}.........*.*............%......>....(?...(....*N..(@....oA...(....*:...(B...(....*:...(C...(....**....(....*....0..G........(....,..*..(....-...}.....*.r...p(x...&.(v.....}......&..}.........*.*..........7.......0..f........-.r7..ps>...z .....
                                                          \Device\ConDrv
                                                          Process:C:\Windows\SysWOW64\netsh.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):313
                                                          Entropy (8bit):4.971939296804078
                                                          Encrypted:false
                                                          SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                          MD5:689E2126A85BF55121488295EE068FA1
                                                          SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                          SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                          SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                          Malicious:false
                                                          Preview: ..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.9879261117410865
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:Remcos Professional Cracked By Alcatraz3222.exe
                                                          File size:18539216
                                                          MD5:efc159c7cf75545997f8c6af52d3e802
                                                          SHA1:b85bd368c91a13db1c5de2326deb25ad666c24c1
                                                          SHA256:898ac001d0f6c52c1001c640d9860287fdf30a648d580e9f5dd15e2ef84ab18e
                                                          SHA512:d06a432233dceb731defd53238971699fef201d0f9144ee50e5dd7d6620dfdd6c298d52618bf2c9feb0519574f4565fb0177b00fd8292768fbd8b85dd11e650d
                                                          SSDEEP:393216:GYuGvp8EHb+in8f4Zg41+Q4AXf5ZZcyfHDMxVpSc+q+eOFxdx:3mqSi8fN4sAXfrZcyfo7p0eYHx
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^..].....................d....... ... ...@....@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:70ccb87171f0cc70

                                                          General

                                                          Entrypoint:0x15620e6
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x5DBBF75E [Fri Nov 1 09:14:06 2019 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x116209c0x4a.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x11640000x461da.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x11ac0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x11600ec0x1160200unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x11640000x461da0x46200False0.0958423852496data2.98313483639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x11ac0000xc0x200False0.044921875data0.122275881259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0x11640840x468GLS_BINARY_LSB_FIRST
                                                          RT_ICON0x11645100x10a8data
                                                          RT_ICON0x11655dc0x25a8data
                                                          RT_ICON0x1167ba80x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0
                                                          RT_GROUP_ICON0x11a9c1e0x3edata
                                                          RT_VERSION0x11a9c980x31cdata
                                                          RT_MANIFEST0x11a9ff00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          DescriptionData
                                                          LegalCopyrightBreakingSecurity.net
                                                          FileVersion2.2.0.0
                                                          CompanyNameBreaking-Security.net
                                                          LegalTrademarksBreakingSecurity.net
                                                          ProductNameREMCOS Remote Control & Surveillance Software
                                                          ProductVersion2.2.0
                                                          FileDescriptionREMCOS Remote Control & Surveillance
                                                          Translation0x0409 0x04e4

                                                          Network Behavior

                                                          Download Network PCAP: filteredfull

                                                          Network Port Distribution

                                                          • Total Packets: 132
                                                          • 3202 undefined
                                                          • 53 (DNS)
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 24, 2021 16:03:23.074137926 CEST497233202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:23.152892113 CEST32024972384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:23.753273964 CEST497233202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:23.832232952 CEST32024972384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:24.440859079 CEST497233202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:24.518795967 CEST32024972384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:26.623768091 CEST497253202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:26.704052925 CEST32024972584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:27.347301960 CEST497253202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:27.425695896 CEST32024972584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:27.941098928 CEST497253202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:28.019416094 CEST32024972584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:30.113775969 CEST497323202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:30.192531109 CEST32024973284.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:30.707145929 CEST497323202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:30.787774086 CEST32024973284.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:31.303771019 CEST497323202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:31.382246971 CEST32024973284.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:33.618834019 CEST497373202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:33.697312117 CEST32024973784.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:34.222883940 CEST497373202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:34.301685095 CEST32024973784.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:34.926410913 CEST497373202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:35.005084038 CEST32024973784.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:37.088747025 CEST497383202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:37.168802977 CEST32024973884.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:37.754512072 CEST497383202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:37.835390091 CEST32024973884.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:38.363831997 CEST497383202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:38.443274021 CEST32024973884.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:40.569490910 CEST497433202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:40.648309946 CEST32024974384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:41.239106894 CEST497433202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:41.320913076 CEST32024974384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:41.927747011 CEST497433202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:42.008456945 CEST32024974384.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:44.260922909 CEST497443202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:44.339313030 CEST32024974484.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:44.848977089 CEST497443202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:44.927963018 CEST32024974484.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:45.442653894 CEST497443202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:45.521043062 CEST32024974484.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:47.605745077 CEST497453202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:47.684746981 CEST32024974584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:48.192850113 CEST497453202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:48.273237944 CEST32024974584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:48.786701918 CEST497453202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:48.865354061 CEST32024974584.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:50.944272041 CEST497463202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:51.023458004 CEST32024974684.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:51.536849976 CEST497463202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:51.615412951 CEST32024974684.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:52.115593910 CEST497463202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:52.193907022 CEST32024974684.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:54.789161921 CEST497503202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:54.867603064 CEST32024975084.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:55.380960941 CEST497503202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:55.461220980 CEST32024975084.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:55.974692106 CEST497503202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:56.053483009 CEST32024975084.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:58.138701916 CEST497513202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:58.219340086 CEST32024975184.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:58.725023031 CEST497513202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:58.805669069 CEST32024975184.220.8.178192.168.2.6
                                                          May 24, 2021 16:03:59.318732023 CEST497513202192.168.2.684.220.8.178
                                                          May 24, 2021 16:03:59.397439957 CEST32024975184.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:01.483860016 CEST497523202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:01.562519073 CEST32024975284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:02.069200039 CEST497523202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:02.148128033 CEST32024975284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:02.662849903 CEST497523202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:02.741945028 CEST32024975284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:04.864890099 CEST497533202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:04.943691969 CEST32024975384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:05.444413900 CEST497533202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:05.524796963 CEST32024975384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:06.029947996 CEST497533202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:06.108968973 CEST32024975384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:08.199282885 CEST497553202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:08.277956009 CEST32024975584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:08.788409948 CEST497553202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:08.867136002 CEST32024975584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:09.379209995 CEST497553202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:09.457899094 CEST32024975584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:11.575144053 CEST497573202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:11.653953075 CEST32024975784.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:12.157099009 CEST497573202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:12.240303040 CEST32024975784.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:12.743577003 CEST497573202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:12.822180033 CEST32024975784.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:14.902693033 CEST497583202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:14.983944893 CEST32024975884.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:15.498625040 CEST497583202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:15.577882051 CEST32024975884.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:16.085472107 CEST497583202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:16.172478914 CEST32024975884.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:18.265439987 CEST497593202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:18.344494104 CEST32024975984.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:18.850832939 CEST497593202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:18.929974079 CEST32024975984.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:19.444556952 CEST497593202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:19.523386955 CEST32024975984.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:21.601593018 CEST497603202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:21.680800915 CEST32024976084.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:22.194905996 CEST497603202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:22.273658991 CEST32024976084.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:22.788609028 CEST497603202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:22.867338896 CEST32024976084.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:25.123464108 CEST497613202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:25.202537060 CEST32024976184.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:25.710834980 CEST497613202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:25.792687893 CEST32024976184.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:26.304510117 CEST497613202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:26.430068970 CEST32024976184.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:29.218250990 CEST497623202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:29.296924114 CEST32024976284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:29.804783106 CEST497623202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:29.883203030 CEST32024976284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:30.398641109 CEST497623202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:30.476869106 CEST32024976284.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:32.561530113 CEST497633202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:32.640470028 CEST32024976384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:33.148863077 CEST497633202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:33.230988026 CEST32024976384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:33.742662907 CEST497633202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:33.821598053 CEST32024976384.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:35.909727097 CEST497643202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:35.988442898 CEST32024976484.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:36.492897034 CEST497643202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:36.573563099 CEST32024976484.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:37.086708069 CEST497643202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:37.165811062 CEST32024976484.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:39.243803024 CEST497653202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:39.322177887 CEST32024976584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:39.836986065 CEST497653202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:39.917165041 CEST32024976584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:40.432095051 CEST497653202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:40.510570049 CEST32024976584.220.8.178192.168.2.6
                                                          May 24, 2021 16:04:42.581653118 CEST497663202192.168.2.684.220.8.178
                                                          May 24, 2021 16:04:42.660214901 CEST32024976684.220.8.178192.168.2.6
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          May 24, 2021 16:02:17.151516914 CEST4928353192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:17.172956944 CEST5837753192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:17.205674887 CEST53492838.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:17.231004953 CEST53583778.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:19.326608896 CEST5507453192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:19.376055956 CEST53550748.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:20.497590065 CEST5451353192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:20.546967983 CEST53545138.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:20.594355106 CEST6204453192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:20.645220041 CEST53620448.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:23.771889925 CEST6379153192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:23.823111057 CEST53637918.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:26.213522911 CEST6426753192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:26.263124943 CEST53642678.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:29.919909954 CEST4944853192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:29.969357967 CEST53494488.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:30.957146883 CEST6034253192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:31.015283108 CEST53603428.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:31.782623053 CEST6134653192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:31.832349062 CEST53613468.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:32.926453114 CEST5177453192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:32.976792097 CEST53517748.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:33.729927063 CEST5602353192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:33.782748938 CEST53560238.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:34.959898949 CEST5838453192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:35.009141922 CEST53583848.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:36.907218933 CEST6026153192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:36.958914042 CEST53602618.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:38.075937033 CEST5606153192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:38.127998114 CEST53560618.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:40.174598932 CEST5833653192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:40.234230995 CEST53583368.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:41.585401058 CEST5378153192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:41.635159016 CEST53537818.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:47.370703936 CEST5406453192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:47.420078993 CEST53540648.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:48.470808029 CEST5281153192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:48.520596027 CEST53528118.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:49.287154913 CEST5529953192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:49.338342905 CEST53552998.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:50.679171085 CEST6374553192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:50.731694937 CEST53637458.8.8.8192.168.2.6
                                                          May 24, 2021 16:02:55.899727106 CEST5005553192.168.2.68.8.8.8
                                                          May 24, 2021 16:02:55.958126068 CEST53500558.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:12.603641987 CEST6137453192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:12.655983925 CEST53613748.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:22.839339972 CEST5033953192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:23.066112041 CEST53503398.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:25.923301935 CEST6330753192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:26.060270071 CEST53633078.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:26.564589024 CEST4969453192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:26.615242004 CEST5498253192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:26.622422934 CEST53496948.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:26.739140034 CEST53549828.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:27.169949055 CEST5001053192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:27.243705034 CEST53500108.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:27.345643044 CEST6371853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:27.535717010 CEST53637188.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:28.037003040 CEST6211653192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:28.142905951 CEST53621168.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:28.719522953 CEST6381653192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:28.777348995 CEST53638168.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:29.399892092 CEST5501453192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:29.450073957 CEST53550148.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:30.044786930 CEST6220853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:30.085213900 CEST5757453192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:30.109282970 CEST53622088.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:30.143663883 CEST53575748.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:31.045283079 CEST5181853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:31.102859020 CEST53518188.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:32.587172985 CEST5662853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:32.646359921 CEST53566288.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:33.402991056 CEST6077853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:33.420161009 CEST5379953192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:33.477905035 CEST53537998.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:33.617345095 CEST53607788.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:37.026566982 CEST5468353192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:37.087193966 CEST53546838.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:37.541363001 CEST5932953192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:37.605340958 CEST53593298.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:40.508305073 CEST6402153192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:40.565907001 CEST53640218.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:44.032521009 CEST5612953192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:44.258471966 CEST53561298.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:47.545639992 CEST5817753192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:47.603943110 CEST53581778.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:50.889874935 CEST5070053192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:50.941816092 CEST53507008.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:54.066451073 CEST5406953192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:54.131252050 CEST53540698.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:54.700680017 CEST6117853192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:54.761564970 CEST53611788.8.8.8192.168.2.6
                                                          May 24, 2021 16:03:58.077227116 CEST5701753192.168.2.68.8.8.8
                                                          May 24, 2021 16:03:58.136915922 CEST53570178.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:01.422844887 CEST5632753192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:01.480880976 CEST53563278.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:04.800041914 CEST5024353192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:04.862879992 CEST53502438.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:05.798531055 CEST6205553192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:05.861023903 CEST53620558.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:08.138134956 CEST6124953192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:08.167833090 CEST6525253192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:08.197113991 CEST53612498.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:08.238500118 CEST53652528.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:11.515229940 CEST6436753192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:11.573093891 CEST53643678.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:14.843127966 CEST5506653192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:14.901153088 CEST53550668.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:18.188637972 CEST6021153192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:18.238363028 CEST53602118.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:21.547678947 CEST5657053192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:21.599793911 CEST53565708.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:24.891273022 CEST5845453192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:25.121808052 CEST53584548.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:29.154047012 CEST5518053192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:29.217066050 CEST53551808.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:32.500790119 CEST5872153192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:32.559567928 CEST53587218.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:35.847538948 CEST5769153192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:35.908301115 CEST53576918.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:39.182169914 CEST5294353192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:39.241949081 CEST53529438.8.8.8192.168.2.6
                                                          May 24, 2021 16:04:42.526715994 CEST5948953192.168.2.68.8.8.8
                                                          May 24, 2021 16:04:42.579396963 CEST53594898.8.8.8192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          May 24, 2021 16:03:22.839339972 CEST192.168.2.68.8.8.80xc2feStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:26.564589024 CEST192.168.2.68.8.8.80xe85aStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:30.044786930 CEST192.168.2.68.8.8.80xe5acStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:33.402991056 CEST192.168.2.68.8.8.80xcc65Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:37.026566982 CEST192.168.2.68.8.8.80x4371Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:40.508305073 CEST192.168.2.68.8.8.80xad12Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:44.032521009 CEST192.168.2.68.8.8.80x2798Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:47.545639992 CEST192.168.2.68.8.8.80x7eStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:50.889874935 CEST192.168.2.68.8.8.80x74fdStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:54.700680017 CEST192.168.2.68.8.8.80xf269Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:58.077227116 CEST192.168.2.68.8.8.80x5599Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:01.422844887 CEST192.168.2.68.8.8.80xa49fStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:04.800041914 CEST192.168.2.68.8.8.80xce87Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:08.138134956 CEST192.168.2.68.8.8.80x6308Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:11.515229940 CEST192.168.2.68.8.8.80xfb0eStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:14.843127966 CEST192.168.2.68.8.8.80x6f4fStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:18.188637972 CEST192.168.2.68.8.8.80x6d2eStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:21.547678947 CEST192.168.2.68.8.8.80xeadeStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:24.891273022 CEST192.168.2.68.8.8.80x9c0eStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:29.154047012 CEST192.168.2.68.8.8.80x1b3dStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:32.500790119 CEST192.168.2.68.8.8.80x8bbaStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:35.847538948 CEST192.168.2.68.8.8.80xa24eStandard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:39.182169914 CEST192.168.2.68.8.8.80x7138Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:42.526715994 CEST192.168.2.68.8.8.80x1844Standard query (0)dllsys.duckdns.orgA (IP address)IN (0x0001)
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          May 24, 2021 16:03:23.066112041 CEST8.8.8.8192.168.2.60xc2feNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:26.622422934 CEST8.8.8.8192.168.2.60xe85aNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:30.109282970 CEST8.8.8.8192.168.2.60xe5acNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:33.617345095 CEST8.8.8.8192.168.2.60xcc65No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:37.087193966 CEST8.8.8.8192.168.2.60x4371No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:40.565907001 CEST8.8.8.8192.168.2.60xad12No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:44.258471966 CEST8.8.8.8192.168.2.60x2798No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:47.603943110 CEST8.8.8.8192.168.2.60x7eNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:50.941816092 CEST8.8.8.8192.168.2.60x74fdNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:54.761564970 CEST8.8.8.8192.168.2.60xf269No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:03:58.136915922 CEST8.8.8.8192.168.2.60x5599No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:01.480880976 CEST8.8.8.8192.168.2.60xa49fNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:04.862879992 CEST8.8.8.8192.168.2.60xce87No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:08.197113991 CEST8.8.8.8192.168.2.60x6308No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:11.573093891 CEST8.8.8.8192.168.2.60xfb0eNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:14.901153088 CEST8.8.8.8192.168.2.60x6f4fNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:18.238363028 CEST8.8.8.8192.168.2.60x6d2eNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:21.599793911 CEST8.8.8.8192.168.2.60xeadeNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:25.121808052 CEST8.8.8.8192.168.2.60x9c0eNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:29.217066050 CEST8.8.8.8192.168.2.60x1b3dNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:32.559567928 CEST8.8.8.8192.168.2.60x8bbaNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:35.908301115 CEST8.8.8.8192.168.2.60xa24eNo error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:39.241949081 CEST8.8.8.8192.168.2.60x7138No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)
                                                          May 24, 2021 16:04:42.579396963 CEST8.8.8.8192.168.2.60x1844No error (0)dllsys.duckdns.org84.220.8.178A (IP address)IN (0x0001)

                                                          Code Manipulations

                                                          Statistics

                                                          CPU Usage

                                                          Click to jump to process

                                                          Memory Usage

                                                          Click to jump to process

                                                          High Level Behavior Distribution

                                                          • File
                                                          • Registry
                                                          • Network

                                                          Click to dive into process behavior distribution

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          Start time:16:02:29
                                                          Start date:24/05/2021
                                                          Path:C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\Remcos Professional Cracked By Alcatraz3222.exe'
                                                          Imagebase:0xcc0000
                                                          File size:18539216 bytes
                                                          MD5 hash:EFC159C7CF75545997F8C6AF52D3E802
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                          • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.439467441.0000000004131000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Reputation:low
                                                          Start time:16:02:46
                                                          Start date:24/05/2021
                                                          Path:C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe'
                                                          Imagebase:0x400000
                                                          File size:18294272 bytes
                                                          MD5 hash:C3C21FA4C2186DEB641455482AB0D3AA
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:Borland Delphi
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 8%, Metadefender, Browse
                                                          • Detection: 31%, ReversingLabs
                                                          Reputation:low
                                                          Start time:16:02:58
                                                          Start date:24/05/2021
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\cmd.exe' /c copy 'C:/Users/user/Desktop/Remcos Professional Cracked By Alcatraz3222.exe' '%temp%\Profile Remcos\Update_Lock_Remcos.exe' /Y
                                                          Imagebase:0x2a0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Start time:16:03:00
                                                          Start date:24/05/2021
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\cmd.exe' /c reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d '%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f
                                                          Imagebase:0x2a0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Start time:16:03:02
                                                          Start date:24/05/2021
                                                          Path:C:\Windows\SysWOW64\reg.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:reg add 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows' /v Load /t REG_SZ /d 'C:\Users\user\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk' /f
                                                          Imagebase:0x1180000
                                                          File size:59392 bytes
                                                          MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Start time:16:03:07
                                                          Start date:24/05/2021
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\cmd.exe' /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
                                                          Imagebase:0x2a0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Start time:16:03:10
                                                          Start date:24/05/2021
                                                          Path:C:\Users\user\AppData\Local\Temp\taskhost.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\Temp\taskhost.exe
                                                          Imagebase:0x8e0000
                                                          File size:261728 bytes
                                                          MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000011.00000002.616492748.0000000002BB1000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: njrat1, Description: Identify njRat, Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, Author: Brian Wallace @botnet_hunter
                                                          • Rule: Njrat, Description: detect njRAT in memory, Source: 00000011.00000002.614874633.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Antivirus matches:
                                                          • Detection: 0%, Metadefender, Browse
                                                          • Detection: 0%, ReversingLabs
                                                          Reputation:moderate
                                                          Start time:16:03:18
                                                          Start date:24/05/2021
                                                          Path:C:\Windows\SysWOW64\netsh.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:netsh firewall add allowedprogram 'C:\Users\user\AppData\Local\Temp\taskhost.exe' 'taskhost.exe' ENABLE
                                                          Imagebase:0x9e0000
                                                          File size:82944 bytes
                                                          MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Disassembly

                                                          Code Analysis

                                                          Executed Functions

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.439234004.00000000026B0000.00000040.00000001.sdmp, Offset: 026B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_26b0000_Remcos Professional Cracked By Alcatraz3222.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f111aac453fe65540d5019a2e6728a76215edfeeb4cab4e974cc3765ea69e76e
                                                          • Instruction ID: 3e9e4ca1058b14f6d9d19244dd1814cc130ba51c014b19f882677afa15e2373f
                                                          • Opcode Fuzzy Hash: f111aac453fe65540d5019a2e6728a76215edfeeb4cab4e974cc3765ea69e76e
                                                          • Instruction Fuzzy Hash: 73D0955100E7D28FC7636BB84C209913FBA1C9322038E0ACBE090CF1E3E5484A18C723
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Non-executed Functions