Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
VBEhHxyHpJ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VBEhHxyHpJ.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kkhf3d3.2cw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iejrnzk4.p0x.ps1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\VBEhHxyHpJ.exe
|
"C:\Users\user\Desktop\VBEhHxyHpJ.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
103.212.81.159
|
|||
http://geoplugin.net/json.gp
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.212.81.159
|
unknown
|
Bangladesh
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
|
time
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3C19000
|
trusted library allocation
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
F8A000
|
heap
|
page read and write
|
||
3CFB000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
642000
|
unkown
|
page readonly
|
||
10CE000
|
stack
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
D53000
|
trusted library allocation
|
page execute and read and write
|
||
D0E000
|
stack
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
6F80000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
DA2000
|
trusted library allocation
|
page read and write
|
||
2A0B000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
DA5000
|
trusted library allocation
|
page execute and read and write
|
||
D54000
|
trusted library allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page execute and read and write
|
||
4F34000
|
trusted library allocation
|
page read and write
|
||
2CDB000
|
stack
|
page read and write
|
||
6C6C000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
472000
|
remote allocation
|
page execute and read and write
|
||
7DDE000
|
stack
|
page read and write
|
||
4FA3000
|
heap
|
page read and write
|
||
51F5000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
A39000
|
stack
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
829C000
|
stack
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
6C84000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
7830000
|
trusted library allocation
|
page execute and read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page execute and read and write
|
||
3070000
|
heap
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
305F000
|
stack
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
4A38000
|
trusted library allocation
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
D96000
|
trusted library allocation
|
page execute and read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
D92000
|
trusted library allocation
|
page read and write
|
||
7212000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
2E1C000
|
stack
|
page read and write
|
||
6C20000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page execute and read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
heap
|
page read and write
|
||
3A31000
|
trusted library allocation
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
6C10000
|
heap
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
801F000
|
stack
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
6F51000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
70BE000
|
stack
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
4BCC000
|
stack
|
page read and write
|
||
6B1E000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
2A28000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
7F1E000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
B37000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
819C000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
3B5B000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
7C9D000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page execute and read and write
|
||
786000
|
unkown
|
page readonly
|
||
E63000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page execute and read and write
|
||
3A39000
|
trusted library allocation
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
805E000
|
stack
|
page read and write
|
||
476000
|
remote allocation
|
page execute and read and write
|
||
D9A000
|
trusted library allocation
|
page execute and read and write
|
||
5460000
|
trusted library section
|
page readonly
|
||
4F10000
|
heap
|
page read and write
|
||
E11000
|
heap
|
page read and write
|
||
6B10000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
525B000
|
stack
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
D7D000
|
trusted library allocation
|
page execute and read and write
|
There are 148 hidden memdumps, click here to show them.