IOC Report
wcNDx6MT9O.exe

loading gif

Files

File Path
Type
Category
Malicious
wcNDx6MT9O.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wcNDx6MT9O.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3326.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\udDHoOiYEFTRf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1csiev3j.rox.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3fhiftfq.e0t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d5qkygiv.1ql.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n3y45qmj.24o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nh4wtppz.5m4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pppm342z.1vy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtqffylr.zrk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spo1y5fs.kzr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aavmzypeykbx
Unicode text, UTF-16, little-endian text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\bhv1B39.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9f59b020, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\tmp496D.tmp
XML 1.0 document, ASCII text
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wcNDx6MT9O.exe
"C:\Users\user\Desktop\wcNDx6MT9O.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\wcNDx6MT9O.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\udDHoOiYEFTRf" /XML "C:\Users\user\AppData\Local\Temp\tmp3326.tmp"
malicious
C:\Users\user\Desktop\wcNDx6MT9O.exe
"C:\Users\user\Desktop\wcNDx6MT9O.exe"
malicious
C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe
C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe
malicious
C:\Users\user\Desktop\wcNDx6MT9O.exe
C:\Users\user\Desktop\wcNDx6MT9O.exe /stext "C:\Users\user\AppData\Local\Temp\aavmzypeykbx"
malicious
C:\Users\user\Desktop\wcNDx6MT9O.exe
C:\Users\user\Desktop\wcNDx6MT9O.exe /stext "C:\Users\user\AppData\Local\Temp\kciwarigmttcboj"
malicious
C:\Users\user\Desktop\wcNDx6MT9O.exe
C:\Users\user\Desktop\wcNDx6MT9O.exe /stext "C:\Users\user\AppData\Local\Temp\uwopajtzablhlufojfu"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\udDHoOiYEFTRf" /XML "C:\Users\user\AppData\Local\Temp\tmp496D.tmp"
malicious
C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe
"C:\Users\user\AppData\Roaming\udDHoOiYEFTRf.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
107.173.4.16
malicious
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.imvu.com
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net
unknown
http://www.nirsoft.net/
unknown
http://geoplugin.net/json.gpONTD~1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
107.173.4.16
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-KDW6BI
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-KDW6BI
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-KDW6BI
time

Memdumps

Base Address
Regiontype
Protect
Malicious
29BE000
stack
page read and write
malicious
D07000
heap
page read and write
malicious
D43000
heap
page read and write
malicious
424D000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4C0A000
trusted library allocation
page read and write
malicious
DDA000
heap
page read and write
malicious
400000
system
page execute and read and write
137B000
heap
page read and write
8C04000
heap
page read and write
1927000
heap
page read and write
B120000
heap
page read and write
14D4000
heap
page read and write
11A0D000
trusted library allocation
page read and write
AB04000
trusted library allocation
page read and write
B50000
heap
page read and write
1276000
trusted library allocation
page execute and read and write
31E0000
heap
page read and write
55B0000
heap
page read and write
9BE000
stack
page read and write
7140000
heap
page read and write
B2FE000
stack
page read and write
6EDDD000
unkown
page read and write
8FBD000
stack
page read and write
36DF000
stack
page read and write
112E000
stack
page read and write
2BEF000
stack
page read and write
59F0000
heap
page execute and read and write
121E000
stack
page read and write
59E0000
trusted library allocation
page read and write
4206000
trusted library allocation
page read and write
7430000
trusted library section
page read and write
2FE0000
heap
page execute and read and write
169E000
stack
page read and write
149E000
stack
page read and write
74FE000
stack
page read and write
471000
remote allocation
page execute and read and write
14E6000
heap
page read and write
8DC0000
heap
page read and write
14E4000
heap
page read and write
2FFB000
trusted library allocation
page read and write
1385000
heap
page read and write
16A0000
trusted library allocation
page read and write
15FF000
heap
page read and write
2AB0000
heap
page read and write
4072000
heap
page read and write
791E000
stack
page read and write
E69E000
stack
page read and write
31CF000
stack
page read and write
5D37000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
B4AE000
stack
page read and write
E10000
heap
page read and write
5540000
heap
page read and write
5770000
heap
page read and write
8AF000
unkown
page read and write
BB0000
heap
page read and write
5B20000
heap
page read and write
56B1000
trusted library allocation
page read and write
2E5F000
stack
page read and write
D70000
heap
page read and write
B3F000
stack
page read and write
15E8000
heap
page read and write
30C4000
trusted library allocation
page read and write
5820000
heap
page execute and read and write
9FC000
stack
page read and write
1920000
heap
page read and write
17D3000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
4077000
heap
page read and write
1560000
heap
page read and write
1250000
trusted library allocation
page read and write
11D0000
heap
page read and write
2D14000
heap
page read and write
17CE000
stack
page read and write
56D0000
trusted library allocation
page read and write
3525000
trusted library allocation
page read and write
41B000
system
page execute and read and write
352D000
trusted library allocation
page read and write
DC7000
heap
page read and write
5BA000
stack
page read and write
2CEF000
heap
page read and write
33A6000
trusted library allocation
page read and write
1518000
heap
page read and write
2CEC000
heap
page read and write
16B0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
EE0000
unkown
page readonly
3F99000
heap
page read and write
17F7000
trusted library allocation
page execute and read and write
2D5E000
stack
page read and write
122ED000
stack
page read and write
524C000
stack
page read and write
BD0000
heap
page read and write
5B15000
heap
page read and write
31F0000
trusted library allocation
page read and write
58A000
stack
page read and write
D6F000
heap
page read and write
185E000
stack
page read and write
33B1000
trusted library allocation
page read and write
6EDC1000
unkown
page execute read
10EC000
heap
page read and write
17F0000
trusted library allocation
page read and write
1580000
trusted library allocation
page execute and read and write
396F000
stack
page read and write
125D000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
14CF000
stack
page read and write
57C3000
heap
page read and write
11D0000
heap
page read and write
12F0000
heap
page read and write
300E000
trusted library allocation
page read and write
954B000
stack
page read and write
150E000
stack
page read and write
968E000
stack
page read and write
134D000
stack
page read and write
DF0000
unkown
page readonly
153E000
stack
page read and write
E65F000
stack
page read and write
55A0000
trusted library section
page readonly
134F000
stack
page read and write
157E000
trusted library allocation
page read and write
1150000
heap
page read and write
2D00000
heap
page read and write
F10000
heap
page read and write
57C0000
heap
page read and write
8D0000
heap
page read and write
10F7000
stack
page read and write
1030000
heap
page read and write
12F7000
stack
page read and write
BE8000
heap
page read and write
5780000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
313E000
stack
page read and write
11DE000
stack
page read and write
8B0000
heap
page read and write
75DD000
stack
page read and write
DC0000
heap
page read and write
2FB6000
trusted library allocation
page read and write
91BE000
stack
page read and write
5B10000
heap
page read and write
7440000
trusted library allocation
page read and write
E8E0000
trusted library section
page read and write
57A0000
trusted library allocation
page read and write
28B0000
heap
page read and write
35DF000
stack
page read and write
3313000
trusted library allocation
page read and write
12D8000
heap
page read and write
CFD000
stack
page read and write
CF0000
heap
page read and write
B5C000
stack
page read and write
16B4000
trusted library allocation
page read and write
EF3000
stack
page read and write
970000
heap
page read and write
950000
heap
page read and write
2C2E000
stack
page read and write
9A0000
heap
page read and write
33AD000
trusted library allocation
page read and write
83C000
stack
page read and write
C05000
heap
page read and write
33DF000
stack
page read and write
97CE000
stack
page read and write
16C0000
heap
page read and write
DBD000
stack
page read and write
11C0000
heap
page read and write
8BB0000
heap
page read and write
534C000
stack
page read and write
124EE000
stack
page read and write
8E0E000
stack
page read and write
15A0000
trusted library allocation
page read and write
1254000
trusted library allocation
page read and write
F8A000
stack
page read and write
5817000
trusted library allocation
page read and write
13A1000
heap
page read and write
2CA0000
heap
page read and write
16BE000
stack
page read and write
4F6F000
trusted library allocation
page read and write
6EDDD000
unkown
page read and write
17FB000
trusted library allocation
page execute and read and write
285B000
stack
page read and write
D17F000
stack
page read and write
289C000
stack
page read and write
108E000
stack
page read and write
17DD000
trusted library allocation
page execute and read and write
54A0000
trusted library allocation
page read and write
17E0000
trusted library allocation
page read and write
1300000
heap
page read and write
569B000
trusted library allocation
page read and write
DF2000
unkown
page readonly
102E000
stack
page read and write
10001000
direct allocation
page execute and read and write
56F0000
trusted library allocation
page read and write
7340000
trusted library allocation
page execute and read and write
3D80000
heap
page read and write
1870000
trusted library allocation
page read and write
10E0000
heap
page read and write
A5C000
stack
page read and write
1270000
trusted library allocation
page read and write
136E000
heap
page read and write
17E2000
trusted library allocation
page read and write
126D000
trusted library allocation
page execute and read and write
474000
remote allocation
page execute and read and write
1591000
heap
page read and write
54F2000
trusted library allocation
page read and write
7161000
heap
page read and write
2FD5000
trusted library allocation
page read and write
2FAF000
stack
page read and write
5790000
trusted library allocation
page execute and read and write
5782000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
459000
system
page execute and read and write
57D0000
heap
page read and write
FF0000
heap
page read and write
E79E000
stack
page read and write
3177000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
820000
heap
page read and write
2ABF000
stack
page read and write
5D50000
trusted library section
page read and write
14FA000
stack
page read and write
1860000
trusted library allocation
page read and write
281E000
stack
page read and write
3211000
trusted library allocation
page read and write
1373000
heap
page read and write
1380000
heap
page read and write
2BBF000
stack
page read and write
1240000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
13A3000
heap
page read and write
CF7E000
stack
page read and write
1287000
trusted library allocation
page execute and read and write
45D000
system
page execute and read and write
56B6000
trusted library allocation
page read and write
2CC0000
heap
page read and write
56E0000
trusted library allocation
page read and write
94F000
unkown
page read and write
15B0000
heap
page read and write
2FF0000
trusted library allocation
page read and write
964C000
stack
page read and write
14A0000
heap
page read and write
EEF000
stack
page read and write
8DBE000
stack
page read and write
4B20000
trusted library allocation
page read and write
1546000
heap
page read and write
59D0000
heap
page read and write
18AF000
stack
page read and write
17EA000
trusted library allocation
page execute and read and write
1558000
heap
page read and write
59C0000
heap
page read and write
1599000
trusted library allocation
page read and write
386E000
stack
page read and write
D7A000
heap
page read and write
2FF4000
trusted library allocation
page read and write
2BFD000
stack
page read and write
1523000
heap
page read and write
1890000
heap
page read and write
1306000
heap
page read and write
1282000
trusted library allocation
page read and write
59AB000
stack
page read and write
31D0000
heap
page execute and read and write
72BE000
stack
page read and write
513C000
stack
page read and write
1253000
trusted library allocation
page execute and read and write
10000000
direct allocation
page read and write
3041000
trusted library allocation
page read and write
DEE000
stack
page read and write
86E000
unkown
page read and write
10CE000
stack
page read and write
154A000
heap
page read and write
D00000
heap
page read and write
C00000
heap
page read and write
31E0000
trusted library allocation
page execute and read and write
2CB0000
heap
page read and write
3150000
heap
page read and write
188C000
stack
page read and write
1560000
trusted library allocation
page read and write
B3FE000
stack
page read and write
473000
system
page execute and read and write
5760000
heap
page read and write
8CCE000
stack
page read and write
8F0E000
stack
page read and write
1272000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
34A0000
heap
page read and write
9FF000
stack
page read and write
32C3000
trusted library allocation
page read and write
3200000
heap
page read and write
1263000
trusted library allocation
page read and write
54D000
stack
page read and write
3011000
trusted library allocation
page read and write
55B3000
heap
page read and write
5A30000
heap
page read and write
960000
heap
page read and write
1315000
heap
page read and write
12B0000
trusted library allocation
page execute and read and write
4065000
trusted library allocation
page read and write
AE0000
heap
page read and write
1900000
heap
page read and write
950E000
stack
page read and write
EDC000
stack
page read and write
BAC000
stack
page read and write
D86000
heap
page read and write
D2A000
stack
page read and write
1085000
heap
page read and write
4049000
trusted library allocation
page read and write
74BE000
stack
page read and write
18EE000
stack
page read and write
365B000
trusted library allocation
page read and write
E00000
heap
page read and write
90E000
unkown
page read and write
592E000
stack
page read and write
56F5000
trusted library allocation
page read and write
98CE000
stack
page read and write
1090000
heap
page read and write
115C000
stack
page read and write
E51E000
stack
page read and write
12A0000
trusted library allocation
page read and write
2CE0000
heap
page read and write
5F0000
heap
page read and write
7F060000
trusted library allocation
page execute and read and write
AEB000
heap
page read and write
93B000
stack
page read and write
D07E000
stack
page read and write
7180000
heap
page read and write
15AE000
stack
page read and write
4211000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
2CFF000
stack
page read and write
10EE000
heap
page read and write
57F0000
trusted library allocation
page read and write
FFF000
stack
page read and write
5700000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
456000
system
page execute and read and write
10DE000
stack
page read and write
6EDDF000
unkown
page readonly
3F20000
heap
page read and write
15E0000
heap
page read and write
128B000
trusted library allocation
page execute and read and write
761D000
stack
page read and write
8DCE000
stack
page read and write
72FE000
stack
page read and write
4219000
trusted library allocation
page read and write
12DE000
heap
page read and write
5B00000
trusted library allocation
page execute and read and write
2CFA000
heap
page read and write
B46B000
stack
page read and write
4F2C000
trusted library allocation
page read and write
2D01000
heap
page read and write
154E000
stack
page read and write
54F0000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
34DF000
stack
page read and write
34A2000
trusted library allocation
page read and write
AA0000
heap
page read and write
5940000
heap
page read and write
1080000
heap
page read and write
17E6000
trusted library allocation
page execute and read and write
30A4000
trusted library allocation
page read and write
E550000
trusted library allocation
page execute and read and write
6EDD6000
unkown
page readonly
1158000
heap
page read and write
15B0000
heap
page read and write
6EDC0000
unkown
page readonly
DA0000
heap
page read and write
4AD2000
trusted library allocation
page read and write
5D70000
trusted library section
page read and write
10016000
direct allocation
page execute and read and write
16B3000
trusted library allocation
page execute and read and write
54E0000
heap
page read and write
33AB000
trusted library allocation
page read and write
5AFE000
stack
page read and write
57D000
stack
page read and write
12D0000
heap
page read and write
3315000
trusted library allocation
page read and write
1568000
heap
page read and write
14AE000
heap
page read and write
56BD000
trusted library allocation
page read and write
16BD000
trusted library allocation
page execute and read and write
CE0000
heap
page read and write
4950000
trusted library allocation
page read and write
1560000
heap
page read and write
5720000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
ED7000
stack
page read and write
A00E000
stack
page read and write
5510000
trusted library allocation
page read and write
57E0000
heap
page read and write
940E000
stack
page read and write
92BE000
stack
page read and write
D6A000
heap
page read and write
759F000
stack
page read and write
5800000
trusted library allocation
page execute and read and write
5550000
heap
page read and write
DE0000
heap
page read and write
978E000
stack
page read and write
5B30000
heap
page read and write
B130000
heap
page read and write
D40000
heap
page read and write
123EC000
stack
page read and write
400000
system
page execute and read and write
45C000
system
page execute and read and write
18A0000
trusted library allocation
page execute and read and write
5810000
trusted library allocation
page read and write
1897000
heap
page read and write
1312000
heap
page read and write
93B000
heap
page read and write
A80000
heap
page read and write
5930000
heap
page read and write
BFE000
stack
page read and write
2FB4000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
127A000
trusted library allocation
page execute and read and write
474000
remote allocation
page execute and read and write
8FC1000
heap
page read and write
739E000
stack
page read and write
3030000
heap
page read and write
D8F000
heap
page read and write
7EEC0000
trusted library allocation
page execute and read and write
186E000
trusted library allocation
page read and write
59B0000
trusted library section
page readonly
8B90000
heap
page read and write
1060000
heap
page read and write
5480000
trusted library allocation
page read and write
91E000
stack
page read and write
348B000
trusted library allocation
page read and write
E7DE000
stack
page read and write
56C2000
trusted library allocation
page read and write
5500000
trusted library allocation
page execute and read and write
559B000
stack
page read and write
369F000
stack
page read and write
400000
system
page execute and read and write
7330000
heap
page read and write
749F000
stack
page read and write
33B3000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
727E000
stack
page read and write
2C6E000
stack
page read and write
B100000
heap
page read and write
D90000
heap
page read and write
8C2E000
heap
page read and write
2FB0000
trusted library allocation
page read and write
5545000
heap
page read and write
2FD0000
trusted library allocation
page read and write
E8DE000
stack
page read and write
3E72000
heap
page read and write
8FD1000
heap
page read and write
930000
heap
page read and write
33B5000
trusted library allocation
page read and write
17F2000
trusted library allocation
page read and write
There are 449 hidden memdumps, click here to show them.