IOC Report
SC_TR126089907.exe

loading gif

Files

File Path
Type
Category
Malicious
SC_TR126089907.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SC_TR126089907.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SC_TR126089907.exe
"C:\Users\user\Desktop\SC_TR126089907.exe"
malicious
C:\Users\user\Desktop\SC_TR126089907.exe
"C:\Users\user\Desktop\SC_TR126089907.exe"
malicious
C:\Users\user\Desktop\SC_TR126089907.exe
"C:\Users\user\Desktop\SC_TR126089907.exe"
malicious

URLs

Name
IP
Malicious
yayabeloo.duckdns.org
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.particle.io/v1/devices/13300350003473433373737385/digitalread?access_token=Q235ad2c91cac
unknown
http://geoplugin.net/son.gp
unknown
http://www.fontbureau.com/designers
unknown
http://geoplugin.net/json.gpQQJ
unknown
http://www.goodfont.co.kr
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.carterandcone.coml
unknown
http://geoplugin.net/json.gp=
unknown
http://www.sajatypeworks.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://geoplugin.net/json.gpzb
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
yayabeloo.duckdns.org
135.148.195.248
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
135.148.195.248
yayabeloo.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-VPA6N9
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-VPA6N9
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-VPA6N9
time

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
469D000
trusted library allocation
page read and write
malicious
3B92000
trusted library allocation
page read and write
malicious
28DF000
stack
page read and write
malicious
BF7000
heap
page read and write
malicious
3B59000
trusted library allocation
page read and write
malicious
5660000
trusted library section
page read and write
malicious
2BA9000
trusted library allocation
page read and write
malicious
C36000
heap
page read and write
malicious
7730000
trusted library section
page read and write
7E2E000
heap
page read and write
E46000
heap
page read and write
5030000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
297B000
trusted library allocation
page execute and read and write
7BCE000
stack
page read and write
7E72000
heap
page read and write
1330000
trusted library allocation
page read and write
E0E000
stack
page read and write
1324000
trusted library allocation
page read and write
506D000
trusted library allocation
page read and write
2A1B000
stack
page read and write
12E0000
heap
page read and write
AFC000
stack
page read and write
E1A000
heap
page read and write
50D0000
trusted library allocation
page read and write
93A000
stack
page read and write
9A0000
heap
page read and write
274E000
stack
page read and write
5170000
heap
page read and write
5E27000
heap
page read and write
E50000
heap
page read and write
5120000
heap
page read and write
7C0000
heap
page read and write
565E000
stack
page read and write
5090000
trusted library allocation
page read and write
9B0000
heap
page read and write
29DF000
stack
page read and write
5710000
trusted library allocation
page read and write
361E000
stack
page read and write
50A5000
trusted library allocation
page read and write
CF0000
heap
page read and write
2B51000
trusted library allocation
page read and write
27CC000
stack
page read and write
4B58000
trusted library allocation
page read and write
371F000
stack
page read and write
BD0000
heap
page read and write
BF0000
heap
page read and write
7B8E000
stack
page read and write
5440000
trusted library section
page readonly
278C000
stack
page read and write
1323000
trusted library allocation
page execute and read and write
5720000
trusted library allocation
page execute and read and write
2977000
trusted library allocation
page execute and read and write
114E000
stack
page read and write
5072000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
133D000
trusted library allocation
page execute and read and write
1310000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
E2E000
stack
page read and write
5070000
trusted library allocation
page read and write
92EE000
stack
page read and write
6F62000
trusted library allocation
page read and write
C6C000
heap
page read and write
E1E000
heap
page read and write
53A0000
heap
page execute and read and write
6F20000
trusted library allocation
page execute and read and write
B950000
heap
page read and write
5600000
heap
page read and write
9E0000
heap
page read and write
5610000
heap
page read and write
2ADF000
stack
page read and write
5DFE000
heap
page read and write
5410000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
9B5000
heap
page read and write
27D0000
heap
page read and write
55F0000
trusted library allocation
page execute and read and write
2B4E000
stack
page read and write
53FB000
stack
page read and write
C55000
heap
page read and write
7E24000
heap
page read and write
7E28000
heap
page read and write
E10000
heap
page read and write
74C000
stack
page read and write
E53000
heap
page read and write
D00000
heap
page read and write
29DE000
stack
page read and write
2C1F000
stack
page read and write
2970000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
2972000
trusted library allocation
page read and write
7E5000
heap
page read and write
100E000
stack
page read and write
2A30000
heap
page execute and read and write
7B0000
heap
page read and write
2A20000
trusted library allocation
page execute and read and write
7B4E000
stack
page read and write
5140000
trusted library allocation
page read and write
296A000
trusted library allocation
page execute and read and write
1320000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
1340000
heap
page read and write
7C0E000
stack
page read and write
CF7000
stack
page read and write
5066000
trusted library allocation
page read and write
4CEC000
stack
page read and write
5130000
trusted library allocation
page execute and read and write
792000
unkown
page readonly
5390000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
5110000
heap
page read and write
5044000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
7E52000
heap
page read and write
5061000
trusted library allocation
page read and write
9C0000
heap
page read and write
2B96000
trusted library allocation
page read and write
7F100000
trusted library allocation
page execute and read and write
55ED000
stack
page read and write
2D5F000
stack
page read and write
C63000
heap
page read and write
50A0000
trusted library allocation
page read and write
7E66000
heap
page read and write
7340000
heap
page read and write
5DE0000
heap
page read and write
8A2000
unkown
page readonly
505E000
trusted library allocation
page read and write
5DF0000
heap
page read and write
BC4F000
stack
page read and write
2966000
trusted library allocation
page execute and read and write
134A000
heap
page read and write
7E18000
heap
page read and write
7E10000
heap
page read and write
790000
unkown
page readonly
5615000
heap
page read and write
2962000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
473000
remote allocation
page execute and read and write
5430000
heap
page read and write
2C5E000
stack
page read and write
5420000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
2A40000
heap
page read and write
5700000
trusted library allocation
page read and write
5142000
trusted library allocation
page read and write
104E000
stack
page read and write
1333000
trusted library allocation
page read and write
2B1D000
stack
page read and write
E38000
heap
page read and write
476000
remote allocation
page execute and read and write
BD4E000
stack
page read and write
5173000
heap
page read and write
F2F000
stack
page read and write
504B000
trusted library allocation
page read and write
7E0000
heap
page read and write
5DDE000
stack
page read and write
BB4E000
stack
page read and write
There are 151 hidden memdumps, click here to show them.