IOC Report
Payroll List_pdf.bat

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
Payroll List_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\Remcos\remcos.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\ProgramData\Remcos\remcos.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\nsl358B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsu65C8.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\dyppekogerens.ini
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\nsa3329.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsd5FF6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsi6365.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsjAF4E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\nsl8168.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\Attakerede.pro
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\Hvirvelbevgelsernes.Fly
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\Pavonazzetto.mis
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\Smreolien33.dec
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\Synthesizes33.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\alcantara.Snd
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\bugloss.rai
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\censorkorpsenes.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\coralliferous.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\stivnedes.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\sulfamyl.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\tmh.ini
Generic INItialization configuration [STRAIGHTFORWARDER GENOPFRES]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\tralatitiously.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\trundle.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\fibbed\Klassiske\tumleplads.ini
ASCII text, with CRLF line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payroll List_pdf.exe
"C:\Users\user\Desktop\Payroll List_pdf.exe"
malicious
C:\Users\user\Desktop\Payroll List_pdf.exe
"C:\Users\user\Desktop\Payroll List_pdf.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious
C:\ProgramData\Remcos\remcos.exe
"C:\ProgramData\Remcos\remcos.exe"
malicious

URLs

Name
IP
Malicious
https://www.google.com
unknown
https://drive.google.com/p)
unknown
https://drive.usercontent.google.com/
unknown
https://drive.usercontent.google.com/.cn
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://drive.usercontent.google.com/~
unknown
https://drive.google.com/A.-
unknown
https://drive.google.com/
unknown
https://drive.usercontent.google.com/$
unknown

Domains

Name
IP
Malicious
drive.google.com
142.251.40.206
drive.usercontent.google.com
142.250.64.65

IPs

IP
Domain
Country
Malicious
196.251.86.105
unknown
Seychelles
malicious
142.250.64.65
drive.usercontent.google.com
United States
142.251.40.206
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Rmc-MJDICZ
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CLR\Start
CLR Start
HKEY_CURRENT_USER\Extramolecular\Bedmaker\Desintegrationerne
instanter
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\Hedegaard\Uninstall\devitalized\Cassock
refractile
HKEY_CURRENT_USER\walkman\Protococcaceous235\reposting
arvebeholdningens
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Rmc-MJDICZ
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
HKEY_CURRENT_USER\SOFTWARE\Service
System_Check
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
32D7000
direct allocation
page execute and read and write
malicious
1887000
remote allocation
page execute and read and write
malicious
2F39000
heap
page read and write
malicious
1887000
remote allocation
page execute and read and write
malicious
33F7000
direct allocation
page execute and read and write
malicious
2F37000
heap
page read and write
malicious
628000
heap
page read and write
3321E000
stack
page read and write
49DE000
stack
page read and write
408000
unkown
page readonly
46D7000
direct allocation
page execute and read and write
28F4000
heap
page read and write
4A30000
heap
page read and write
58B000
heap
page read and write
3324F000
stack
page read and write
20C0000
heap
page read and write
21D5000
heap
page read and write
4A0000
heap
page read and write
40E000
unkown
page read and write
10005000
unkown
page readonly
27AF000
stack
page read and write
40A000
unkown
page write copy
4920000
direct allocation
page read and write
3302F000
stack
page read and write
7F8000
heap
page read and write
2100000
heap
page read and write
467000
unkown
page readonly
4B70000
direct allocation
page read and write
463000
unkown
page read and write
4960000
direct allocation
page read and write
400000
unkown
page readonly
4970000
direct allocation
page read and write
275F000
stack
page read and write
4C30000
heap
page read and write
90F000
stack
page read and write
8EF000
stack
page read and write
333B0000
heap
page read and write
4830000
direct allocation
page read and write
40E000
unkown
page read and write
754000
heap
page read and write
2140000
heap
page read and write
418000
unkown
page read and write
3270000
direct allocation
page execute and read and write
2EA0000
heap
page read and write
645000
heap
page read and write
5C0000
heap
page read and write
2190000
heap
page read and write
26BF000
stack
page read and write
2E5E000
heap
page read and write
620000
heap
page read and write
2FCE000
stack
page read and write
205E000
stack
page read and write
401000
unkown
page execute read
467000
unkown
page readonly
40E000
unkown
page read and write
6F0000
heap
page read and write
2D7E000
heap
page read and write
32C3F000
stack
page read and write
7C0000
heap
page read and write
1700000
remote allocation
page execute and read and write
435000
unkown
page read and write
4A60000
direct allocation
page read and write
2FFE000
stack
page read and write
518000
heap
page read and write
32D7E000
stack
page read and write
400000
unkown
page readonly
21AE000
stack
page read and write
2234000
heap
page read and write
2F29000
heap
page read and write
303E000
stack
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
401000
unkown
page execute read
408000
unkown
page readonly
32F2E000
stack
page read and write
2260000
heap
page read and write
4A40000
direct allocation
page read and write
467000
unkown
page readonly
96000
stack
page read and write
4BFF000
stack
page read and write
2AF5000
heap
page read and write
47F7000
direct allocation
page execute and read and write
7CF000
stack
page read and write
95F000
stack
page read and write
2F39000
heap
page read and write
260F000
stack
page read and write
687000
heap
page read and write
1D5000
heap
page read and write
331E0000
remote allocation
page read and write
96000
stack
page read and write
4B10000
direct allocation
page read and write
650000
heap
page read and write
685000
heap
page read and write
19A000
stack
page read and write
2F7A000
heap
page read and write
42D000
unkown
page read and write
40A000
unkown
page read and write
467000
unkown
page readonly
2997000
heap
page read and write
400000
unkown
page readonly
4B40000
direct allocation
page read and write
4E6000
heap
page read and write
2F10000
direct allocation
page read and write
4930000
direct allocation
page read and write
19A000
stack
page read and write
467000
unkown
page readonly
32D7E000
stack
page read and write
2D8C000
stack
page read and write
427000
unkown
page read and write
2EC0000
heap
page read and write
525000
heap
page read and write
401000
unkown
page execute read
29D9000
heap
page read and write
4AF0000
direct allocation
page read and write
3040000
direct allocation
page read and write
332AC000
stack
page read and write
549000
heap
page read and write
2A52000
heap
page read and write
3070000
heap
page read and write
1700000
remote allocation
page execute and read and write
2250000
heap
page read and write
42D000
unkown
page read and write
5E0000
heap
page read and write
2FBE000
heap
page read and write
2E8B000
stack
page read and write
4B00000
direct allocation
page read and write
4810000
direct allocation
page read and write
333B1000
heap
page read and write
7F0000
heap
page read and write
2F41000
heap
page read and write
2F32000
heap
page read and write
467000
unkown
page readonly
33630000
heap
page read and write
467000
unkown
page readonly
19A000
stack
page read and write
2FAC000
heap
page read and write
269F000
stack
page read and write
47A0000
direct allocation
page read and write
408000
unkown
page readonly
47F0000
direct allocation
page read and write
2255000
heap
page read and write
408000
unkown
page readonly
2B1B000
heap
page read and write
3180000
heap
page read and write
40A000
unkown
page write copy
3307E000
stack
page read and write
4B20000
direct allocation
page read and write
3060000
direct allocation
page read and write
414000
unkown
page read and write
2200000
heap
page read and write
231E000
stack
page read and write
408000
unkown
page readonly
2C87000
remote allocation
page execute and read and write
4A00000
direct allocation
page read and write
401000
unkown
page execute read
520000
heap
page read and write
401000
unkown
page execute read
3025000
heap
page read and write
2F28000
heap
page read and write
463000
unkown
page read and write
2160000
heap
page read and write
408000
unkown
page readonly
40A000
unkown
page read and write
279F000
stack
page read and write
400000
unkown
page readonly
2EDE000
stack
page read and write
40A000
unkown
page read and write
408000
unkown
page readonly
48D0000
direct allocation
page read and write
3170000
heap
page read and write
42D000
unkown
page read and write
10001000
unkown
page execute read
400000
unkown
page readonly
2EC8000
heap
page read and write
334F000
stack
page read and write
770000
heap
page read and write
467000
unkown
page readonly
676000
heap
page read and write
212E000
stack
page read and write
32C7F000
stack
page read and write
2204000
heap
page read and write
215E000
stack
page read and write
408000
unkown
page readonly
5B0000
heap
page read and write
73C000
heap
page read and write
29BD000
heap
page read and write
10005000
unkown
page readonly
32EBD000
stack
page read and write
3180000
heap
page read and write
3120000
heap
page read and write
10000000
unkown
page readonly
408000
unkown
page readonly
1D0000
heap
page read and write
427000
unkown
page read and write
3170000
heap
page read and write
435000
unkown
page read and write
400000
unkown
page readonly
1FFE000
stack
page read and write
5F0000
heap
page read and write
823000
heap
page read and write
2240000
heap
page read and write
427000
unkown
page read and write
435000
unkown
page read and write
4A70000
direct allocation
page read and write
42D000
unkown
page read and write
2220000
heap
page read and write
2287000
remote allocation
page execute and read and write
640000
heap
page read and write
680000
heap
page read and write
29D4000
heap
page read and write
3CD7000
direct allocation
page execute and read and write
10003000
unkown
page readonly
400000
unkown
page readonly
4B0000
heap
page read and write
408000
unkown
page readonly
3367C000
stack
page read and write
26AF000
stack
page read and write
2F39000
heap
page read and write
64E000
stack
page read and write
2F04000
heap
page read and write
80E000
stack
page read and write
331E0000
remote allocation
page read and write
4EE000
stack
page read and write
2F3E000
heap
page read and write
2E90000
heap
page read and write
3050000
direct allocation
page read and write
427000
unkown
page read and write
81F000
stack
page read and write
2230000
heap
page read and write
85F000
stack
page read and write
4A80000
direct allocation
page read and write
331E0000
remote allocation
page read and write
467000
unkown
page readonly
3320E000
stack
page read and write
4820000
direct allocation
page read and write
465000
unkown
page read and write
21B0000
heap
page read and write
414000
unkown
page read and write
4910000
direct allocation
page read and write
3377D000
stack
page read and write
3180000
heap
page read and write
4900000
direct allocation
page read and write
400000
unkown
page readonly
10000000
unkown
page readonly
4AF0000
heap
page read and write
3020000
heap
page read and write
401000
unkown
page execute read
3090000
heap
page read and write
435000
unkown
page read and write
4D4000
heap
page read and write
510000
heap
page read and write
47B0000
direct allocation
page read and write
265E000
stack
page read and write
47C0000
direct allocation
page read and write
2B32000
heap
page read and write
96000
stack
page read and write
49E0000
direct allocation
page read and write
2F32000
heap
page read and write
32C7E000
stack
page read and write
2F26000
heap
page read and write
40E000
unkown
page read and write
331AD000
stack
page read and write
2265000
heap
page read and write
31FF000
stack
page read and write
19A000
stack
page read and write
40A000
unkown
page write copy
4B60000
direct allocation
page read and write
2F00000
direct allocation
page read and write
467000
unkown
page readonly
2F7B000
heap
page read and write
401000
unkown
page execute read
507000
heap
page read and write
30A0000
heap
page read and write
467000
unkown
page readonly
40A000
unkown
page write copy
401000
unkown
page execute read
5D0000
heap
page read and write
2B37000
heap
page read and write
1D0000
heap
page read and write
4F0000
heap
page read and write
401000
unkown
page execute read
418000
unkown
page read and write
227F000
stack
page read and write
3302F000
stack
page read and write
333B8000
heap
page read and write
3DF7000
direct allocation
page execute and read and write
49F0000
direct allocation
page read and write
22DF000
stack
page read and write
2F1F000
heap
page read and write
400000
unkown
page readonly
40A000
unkown
page write copy
33040000
heap
page read and write
2F61000
heap
page read and write
6CE000
stack
page read and write
5E4000
heap
page read and write
4940000
direct allocation
page read and write
40A000
unkown
page write copy
910000
heap
page read and write
2287000
remote allocation
page execute and read and write
10001000
unkown
page execute read
4950000
direct allocation
page read and write
2000000
heap
page read and write
467000
unkown
page readonly
48E0000
direct allocation
page read and write
4850000
direct allocation
page read and write
2E21000
heap
page read and write
2175000
heap
page read and write
435000
unkown
page read and write
4EF000
heap
page read and write
42D000
unkown
page read and write
2EE0000
heap
page read and write
418000
unkown
page read and write
40A000
unkown
page write copy
21D0000
heap
page read and write
3180000
heap
page read and write
4A0000
heap
page read and write
5CE000
stack
page read and write
2C87000
remote allocation
page execute and read and write
3150000
direct allocation
page execute and read and write
40A000
unkown
page read and write
467000
unkown
page readonly
2230000
heap
page read and write
83F000
heap
page read and write
2F41000
heap
page read and write
660000
heap
page read and write
4CF000
heap
page read and write
4B30000
direct allocation
page read and write
4840000
direct allocation
page read and write
57D000
heap
page read and write
48C0000
direct allocation
page read and write
40A000
unkown
page write copy
32DBD000
stack
page read and write
3170000
heap
page read and write
414000
unkown
page read and write
400000
unkown
page readonly
465000
unkown
page read and write
40A000
unkown
page read and write
3170000
heap
page read and write
32F2E000
stack
page read and write
10003000
unkown
page readonly
7C5000
heap
page read and write
2344000
heap
page read and write
47D0000
direct allocation
page read and write
324F000
stack
page read and write
47E0000
direct allocation
page read and write
408000
unkown
page readonly
408000
unkown
page readonly
4B80000
heap
page read and write
250E000
stack
page read and write
4B87000
heap
page read and write
32DBD000
stack
page read and write
467000
unkown
page readonly
4A0000
heap
page read and write
4A20000
direct allocation
page read and write
857000
heap
page read and write
4F0000
heap
page read and write
3325F000
stack
page read and write
3090000
heap
page read and write
400000
unkown
page readonly
63E000
stack
page read and write
32EBE000
stack
page read and write
2150000
heap
page read and write
427000
unkown
page read and write
2D8C000
stack
page read and write
4800000
direct allocation
page read and write
333AB000
stack
page read and write
6AE000
stack
page read and write
463000
unkown
page read and write
278F000
stack
page read and write
2F2C000
heap
page read and write
2E8B000
stack
page read and write
40A000
unkown
page write copy
414000
unkown
page read and write
2060000
heap
page read and write
66A000
heap
page read and write
408000
unkown
page readonly
2340000
heap
page read and write
96000
stack
page read and write
4C1E000
stack
page read and write
2E63000
heap
page read and write
670000
heap
page read and write
2064000
heap
page read and write
2170000
heap
page read and write
19A000
stack
page read and write
2F20000
heap
page read and write
4A50000
direct allocation
page read and write
463000
unkown
page read and write
96000
stack
page read and write
4EE000
stack
page read and write
414000
unkown
page read and write
4B50000
direct allocation
page read and write
211E000
stack
page read and write
4A10000
direct allocation
page read and write
400000
unkown
page readonly
335D0000
heap
page read and write
2E90000
heap
page read and write
400000
unkown
page readonly
48F0000
direct allocation
page read and write
330AE000
stack
page read and write
40E000
unkown
page read and write
463000
unkown
page read and write
21DE000
stack
page read and write
408000
unkown
page readonly
4BDE000
stack
page read and write
401000
unkown
page execute read
2E47000
heap
page read and write
2EEE000
heap
page read and write
401000
unkown
page execute read
2250000
heap
page read and write
4ADE000
stack
page read and write
6F8000
heap
page read and write
218F000
stack
page read and write
400000
unkown
page readonly
4A0000
heap
page read and write
3317F000
stack
page read and write
401000
unkown
page execute read
4A8000
heap
page read and write
There are 407 hidden memdumps, click here to show them.