IOC Report
VBEhHxyHpJ.exe

loading gif

Files

File Path
Type
Category
Malicious
VBEhHxyHpJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VBEhHxyHpJ.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kkhf3d3.2cw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iejrnzk4.p0x.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VBEhHxyHpJ.exe
"C:\Users\user\Desktop\VBEhHxyHpJ.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
103.212.81.159
malicious
http://geoplugin.net/json.gp
unknown
https://api.telegram.org/bot
unknown
http://geoplugin.net/json.gp/C
unknown

IPs

IP
Domain
Country
Malicious
103.212.81.159
unknown
Bangladesh
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-RLNEHU
time

Memdumps

Base Address
Regiontype
Protect
Malicious
3C19000
trusted library allocation
page read and write
malicious
2A31000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
F8A000
heap
page read and write
malicious
3CFB000
trusted library allocation
page read and write
malicious
2C9E000
stack
page read and write
malicious
4FD0000
trusted library allocation
page read and write
E8F000
heap
page read and write
642000
unkown
page readonly
10CE000
stack
page read and write
DDE000
heap
page read and write
F80000
heap
page read and write
E04000
heap
page read and write
DC0000
trusted library allocation
page read and write
2DDF000
stack
page read and write
D53000
trusted library allocation
page execute and read and write
D0E000
stack
page read and write
4F4E000
trusted library allocation
page read and write
DD8000
heap
page read and write
6F80000
heap
page read and write
C75000
heap
page read and write
4FA0000
heap
page read and write
4F80000
trusted library allocation
page read and write
DA2000
trusted library allocation
page read and write
2A0B000
stack
page read and write
2A20000
heap
page read and write
DAB000
trusted library allocation
page execute and read and write
DA5000
trusted library allocation
page execute and read and write
D54000
trusted library allocation
page read and write
7840000
trusted library allocation
page execute and read and write
4F34000
trusted library allocation
page read and write
2CDB000
stack
page read and write
6C6C000
heap
page read and write
5540000
trusted library allocation
page read and write
BD0000
heap
page read and write
D67000
heap
page read and write
472000
remote allocation
page execute and read and write
7DDE000
stack
page read and write
4FA3000
heap
page read and write
51F5000
heap
page read and write
1300000
heap
page read and write
A39000
stack
page read and write
4F95000
trusted library allocation
page read and write
5390000
heap
page read and write
5360000
heap
page read and write
829C000
stack
page read and write
FCE000
stack
page read and write
4F62000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
6C84000
heap
page read and write
6F60000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
5500000
heap
page read and write
4F3E000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
E0F000
heap
page read and write
640000
unkown
page readonly
7830000
trusted library allocation
page execute and read and write
2F5E000
stack
page read and write
B90000
heap
page read and write
4F56000
trusted library allocation
page read and write
29C0000
heap
page execute and read and write
3070000
heap
page read and write
6F70000
trusted library allocation
page execute and read and write
305F000
stack
page read and write
54F0000
heap
page read and write
7AFE000
stack
page read and write
799E000
stack
page read and write
D70000
trusted library allocation
page read and write
4A38000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
BC0000
heap
page read and write
5000000
heap
page read and write
D96000
trusted library allocation
page execute and read and write
4F8F000
trusted library allocation
page read and write
E7F000
heap
page read and write
7820000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
2F1F000
stack
page read and write
D92000
trusted library allocation
page read and write
7212000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
5020000
trusted library allocation
page read and write
EB5000
heap
page read and write
5370000
heap
page read and write
2E1C000
stack
page read and write
6C20000
heap
page read and write
D90000
trusted library allocation
page read and write
5030000
trusted library allocation
page execute and read and write
6E5E000
stack
page read and write
4F5D000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
51F0000
heap
page read and write
3A31000
trusted library allocation
page read and write
EFC000
stack
page read and write
6C10000
heap
page read and write
775E000
stack
page read and write
535D000
stack
page read and write
801F000
stack
page read and write
4F3B000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
79FE000
stack
page read and write
3060000
heap
page read and write
6F51000
trusted library allocation
page read and write
DF7000
heap
page read and write
D60000
heap
page read and write
295E000
stack
page read and write
5532000
trusted library allocation
page read and write
B5C000
stack
page read and write
70BE000
stack
page read and write
7D9E000
stack
page read and write
4BCC000
stack
page read and write
6B1E000
heap
page read and write
5010000
heap
page read and write
4F70000
trusted library allocation
page read and write
815E000
stack
page read and write
2A28000
heap
page read and write
BD5000
heap
page read and write
28AE000
stack
page read and write
7F1E000
stack
page read and write
C80000
heap
page read and write
2B9E000
stack
page read and write
F50000
heap
page read and write
B37000
stack
page read and write
D80000
heap
page read and write
819C000
stack
page read and write
4F90000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
789E000
stack
page read and write
DD0000
heap
page read and write
DA7000
trusted library allocation
page execute and read and write
2A5F000
stack
page read and write
6D5E000
stack
page read and write
7800000
trusted library allocation
page read and write
7C9D000
stack
page read and write
C70000
heap
page read and write
5200000
heap
page execute and read and write
786000
unkown
page readonly
E63000
heap
page read and write
29B0000
trusted library allocation
page execute and read and write
3A39000
trusted library allocation
page read and write
7EDE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
805E000
stack
page read and write
476000
remote allocation
page execute and read and write
D9A000
trusted library allocation
page execute and read and write
5460000
trusted library section
page readonly
4F10000
heap
page read and write
E11000
heap
page read and write
6B10000
heap
page read and write
29AE000
stack
page read and write
525B000
stack
page read and write
CCE000
stack
page read and write
D7D000
trusted library allocation
page execute and read and write
There are 148 hidden memdumps, click here to show them.