IOC Report
ZZ.exe

loading gif

Files

File Path
Type
Category
Malicious
ZZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ZZ.exe
"C:\Users\user\Desktop\ZZ.exe"
malicious

URLs

Name
IP
Malicious
sungito2.ddns.net
malicious
http://geoplugin.net/json.gp
unknown
http://geoplugin.net/json.gp/C
unknown

Domains

Name
IP
Malicious
sungito2.ddns.net
154.216.19.222
malicious

IPs

IP
Domain
Country
Malicious
154.216.19.222
sungito2.ddns.net
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-EIENFE
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-EIENFE
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-EIENFE
time

Memdumps

Base Address
Regiontype
Protect
Malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
224F000
stack
page read and write
malicious
6BE000
heap
page read and write
malicious
478000
unkown
page readonly
2AA0000
heap
page read and write
24CF000
stack
page read and write
474000
unkown
page read and write
238F000
stack
page read and write
6B0000
heap
page read and write
670000
heap
page read and write
19C000
stack
page read and write
BAF000
stack
page read and write
560000
heap
page read and write
471000
unkown
page write copy
23CC000
stack
page read and write
5BE000
stack
page read and write
5FE000
stack
page read and write
400000
unkown
page readonly
64E000
stack
page read and write
8AF000
stack
page read and write
471000
unkown
page read and write
6BA000
heap
page read and write
401000
unkown
page execute read
650000
heap
page read and write
9C000
stack
page read and write
2A90000
heap
page read and write
570000
heap
page read and write
401000
unkown
page execute read
260F000
stack
page read and write
1F0000
heap
page read and write
250E000
stack
page read and write
228C000
stack
page read and write
400000
unkown
page readonly
478000
unkown
page readonly
565000
heap
page read and write
There are 26 hidden memdumps, click here to show them.