IOC Report
17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv8305.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x98bd6f1b, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\glwdcdfurqkkskz
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe
"C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe"
malicious
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\glwdcdfurqkkskz"
malicious
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\injodopvfycxvqnxqc"
malicious
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe
C:\Users\user\Desktop\17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\siogdgapbgucfwkbamoda"
malicious

URLs

Name
IP
Malicious
dumboi.duckdns.org
malicious
http://www.imvu.comr
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
http://www.imvu.comta
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
http://geoplugin.net/json.gp5
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
https://www.google.com
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://www.office.com/
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dumboi.duckdns.org
185.236.203.101
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
185.236.203.101
dumboi.duckdns.org
Romania
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-8AXK3L
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-8AXK3L
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-8AXK3L
time

Memdumps

Base Address
Regiontype
Protect
Malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
229F000
stack
page read and write
malicious
459000
unkown
page readonly
malicious
501000
heap
page read and write
malicious
4BE000
heap
page read and write
malicious
459000
unkown
page readonly
malicious
501000
heap
page read and write
malicious
459000
unkown
page readonly
malicious
501000
heap
page read and write
malicious
2799000
heap
page read and write
20EF000
heap
page read and write
20E9000
heap
page read and write
2260000
heap
page read and write
19C000
stack
page read and write
20E2000
heap
page read and write
23DC000
stack
page read and write
63E000
heap
page read and write
2101000
heap
page read and write
478000
unkown
page readonly
4FA000
heap
page read and write
3849000
heap
page read and write
279A000
heap
page read and write
614000
heap
page read and write
2190000
heap
page read and write
614000
heap
page read and write
20F1000
heap
page read and write
644000
heap
page read and write
20E8000
heap
page read and write
627000
heap
page read and write
2799000
heap
page read and write
2795000
heap
page read and write
2B92000
heap
page read and write
474000
unkown
page read and write
614000
heap
page read and write
2798000
heap
page read and write
400000
unkown
page readonly
20F1000
heap
page read and write
53E000
stack
page read and write
540000
heap
page read and write
4F2000
heap
page read and write
5EE000
stack
page read and write
644000
heap
page read and write
20EA000
heap
page read and write
53E000
heap
page read and write
5F0000
heap
page read and write
211E000
stack
page read and write
20F6000
heap
page read and write
215F000
heap
page read and write
20E8000
heap
page read and write
478000
unkown
page readonly
20F4000
heap
page read and write
645000
heap
page read and write
533000
heap
page read and write
39DC000
unclassified section
page execute and read and write
63D000
heap
page read and write
523000
heap
page read and write
20F1000
heap
page read and write
401000
unkown
page execute read
644000
heap
page read and write
3753000
heap
page read and write
640000
heap
page read and write
53E000
heap
page read and write
471000
unkown
page write copy
644000
heap
page read and write
620000
heap
page read and write
27BE000
heap
page read and write
210A000
heap
page read and write
8FF000
stack
page read and write
9C000
stack
page read and write
2B18000
heap
page read and write
10016000
direct allocation
page execute and read and write
61E000
stack
page read and write
2791000
heap
page read and write
20DC000
heap
page read and write
20E1000
heap
page read and write
3959000
unclassified section
page execute and read and write
20EF000
heap
page read and write
401000
unkown
page execute read
478000
unkown
page readonly
645000
heap
page read and write
279A000
heap
page read and write
614000
heap
page read and write
2591000
heap
page read and write
1F0000
heap
page read and write
3849000
heap
page read and write
193000
stack
page read and write
265E000
stack
page read and write
20F8000
heap
page read and write
2691000
heap
page read and write
2B92000
heap
page read and write
8FF000
stack
page read and write
2990000
trusted library allocation
page read and write
3A0B000
unclassified section
page execute and read and write
20E6000
heap
page read and write
614000
heap
page read and write
459000
system
page execute and read and write
644000
heap
page read and write
279A000
heap
page read and write
614000
heap
page read and write
20E1000
heap
page read and write
3859000
heap
page read and write
20EA000
heap
page read and write
4B0000
heap
page read and write
400000
unkown
page readonly
45C000
system
page execute and read and write
400000
unkown
page readonly
27AD000
heap
page read and write
20D0000
heap
page read and write
2AA0000
heap
page read and write
4BE000
stack
page read and write
3661000
heap
page read and write
614000
heap
page read and write
2791000
heap
page read and write
3752000
heap
page read and write
2799000
heap
page read and write
644000
heap
page read and write
20E7000
heap
page read and write
17C000
stack
page read and write
3849000
heap
page read and write
9A3000
heap
page read and write
401000
unkown
page execute read
644000
heap
page read and write
20F5000
heap
page read and write
644000
heap
page read and write
20F1000
heap
page read and write
20E6000
heap
page read and write
20E8000
heap
page read and write
4BA000
heap
page read and write
20F1000
heap
page read and write
53E000
heap
page read and write
2B18000
heap
page read and write
401000
unkown
page execute read
3660000
heap
page read and write
81F000
stack
page read and write
27A3000
heap
page read and write
2990000
trusted library allocation
page read and write
644000
heap
page read and write
41B000
system
page execute and read and write
3847000
heap
page read and write
644000
heap
page read and write
18F000
stack
page read and write
37CB000
heap
page read and write
10001000
direct allocation
page execute and read and write
63E000
heap
page read and write
9AD000
heap
page read and write
AEC000
heap
page read and write
614000
heap
page read and write
645000
heap
page read and write
1F0000
heap
page read and write
644000
heap
page read and write
20F6000
heap
page read and write
2B1A000
heap
page read and write
2795000
heap
page read and write
AEC000
heap
page read and write
19C000
stack
page read and write
395D000
unclassified section
page execute and read and write
2690000
heap
page read and write
20F2000
heap
page read and write
279A000
heap
page read and write
279A000
heap
page read and write
20F6000
heap
page read and write
45D000
system
page execute and read and write
20F0000
heap
page read and write
269F000
heap
page read and write
2AA1000
heap
page read and write
610000
heap
page read and write
9C000
stack
page read and write
614000
heap
page read and write
20E6000
heap
page read and write
279C000
heap
page read and write
2591000
heap
page read and write
20F2000
heap
page read and write
20E1000
heap
page read and write
27AB000
heap
page read and write
4E8000
heap
page read and write
3847000
heap
page read and write
630000
heap
page read and write
3868000
heap
page read and write
521000
heap
page read and write
385D000
heap
page read and write
3753000
heap
page read and write
312E000
stack
page read and write
645000
heap
page read and write
279A000
heap
page read and write
19A000
stack
page read and write
7A8000
heap
page read and write
644000
heap
page read and write
700000
heap
page read and write
71F000
stack
page read and write
2691000
heap
page read and write
20E6000
heap
page read and write
20E8000
heap
page read and write
20F5000
heap
page read and write
53E000
heap
page read and write
614000
heap
page read and write
471000
unkown
page write copy
AE0000
heap
page read and write
2691000
heap
page read and write
20C0000
heap
page read and write
614000
heap
page read and write
523000
heap
page read and write
20F8000
heap
page read and write
2795000
heap
page read and write
2797000
heap
page read and write
508000
heap
page read and write
614000
heap
page read and write
4AE000
stack
page read and write
478000
unkown
page readonly
10000000
direct allocation
page read and write
37FB000
heap
page read and write
9A0000
heap
page read and write
21C0000
heap
page read and write
36DA000
heap
page read and write
20F5000
heap
page read and write
523000
heap
page read and write
4FE000
stack
page read and write
AE3000
heap
page read and write
91F000
stack
page read and write
279A000
heap
page read and write
20EA000
heap
page read and write
279D000
heap
page read and write
501000
heap
page read and write
401000
unkown
page execute read
AB0000
heap
page read and write
5CE000
stack
page read and write
456000
system
page execute and read and write
3847000
heap
page read and write
20E0000
heap
page read and write
39D6000
unclassified section
page execute and read and write
9C000
stack
page read and write
614000
heap
page read and write
3849000
heap
page read and write
20EC000
heap
page read and write
3980000
unclassified section
page execute and read and write
279D000
heap
page read and write
20F8000
heap
page read and write
3849000
heap
page read and write
37FC000
heap
page read and write
1F0000
heap
page read and write
535000
heap
page read and write
547000
heap
page read and write
21C0000
trusted library allocation
page read and write
950000
heap
page read and write
37CB000
heap
page read and write
645000
heap
page read and write
645000
heap
page read and write
2B18000
heap
page read and write
500000
heap
page read and write
20E1000
heap
page read and write
21D0000
trusted library allocation
page read and write
2795000
heap
page read and write
27AB000
heap
page read and write
490000
heap
page read and write
614000
heap
page read and write
473000
system
page execute and read and write
620000
heap
page read and write
2796000
heap
page read and write
279D000
heap
page read and write
1F0000
heap
page read and write
279A000
heap
page read and write
3973000
unclassified section
page execute and read and write
7A0000
heap
page read and write
3859000
heap
page read and write
523000
heap
page read and write
20EA000
heap
page read and write
27A3000
heap
page read and write
210E000
heap
page read and write
279D000
heap
page read and write
471000
unkown
page write copy
478000
unkown
page readonly
523000
heap
page read and write
2123000
heap
page read and write
614000
heap
page read and write
533000
heap
page read and write
177000
stack
page read and write
644000
heap
page read and write
261F000
stack
page read and write
4F2000
heap
page read and write
400000
system
page execute and read and write
2990000
trusted library allocation
page read and write
400000
unkown
page readonly
215C000
stack
page read and write
547000
heap
page read and write
471000
unkown
page read and write
4F2000
heap
page read and write
9AD000
heap
page read and write
644000
heap
page read and write
27DC000
heap
page read and write
4B0000
heap
page read and write
20E1000
heap
page read and write
644000
heap
page read and write
53E000
heap
page read and write
20F8000
heap
page read and write
3847000
heap
page read and write
27ED000
heap
page read and write
239F000
stack
page read and write
25BA000
heap
page read and write
2AA1000
heap
page read and write
20E4000
heap
page read and write
20EF000
heap
page read and write
2990000
trusted library allocation
page read and write
20E8000
heap
page read and write
3661000
heap
page read and write
2990000
trusted library allocation
page read and write
3847000
heap
page read and write
7FF000
stack
page read and write
20E8000
heap
page read and write
2158000
heap
page read and write
383B000
heap
page read and write
4E0000
heap
page read and write
278F000
stack
page read and write
20F5000
heap
page read and write
2794000
heap
page read and write
2590000
heap
page read and write
9C000
stack
page read and write
400000
unkown
page readonly
3847000
heap
page read and write
20E8000
heap
page read and write
471000
unkown
page write copy
20E6000
heap
page read and write
380B000
heap
page read and write
400000
system
page execute and read and write
20F5000
heap
page read and write
20F1000
heap
page read and write
3900000
unclassified section
page execute and read and write
251E000
stack
page read and write
614000
heap
page read and write
20EA000
heap
page read and write
4F2000
heap
page read and write
645000
heap
page read and write
39F0000
unclassified section
page execute and read and write
547000
heap
page read and write
20DC000
heap
page read and write
27DC000
heap
page read and write
20DC000
heap
page read and write
20F4000
heap
page read and write
24DF000
stack
page read and write
275F000
stack
page read and write
644000
heap
page read and write
4C0000
heap
page read and write
636000
heap
page read and write
614000
heap
page read and write
2990000
trusted library allocation
page read and write
2790000
heap
page read and write
2795000
heap
page read and write
322F000
stack
page read and write
645000
heap
page read and write
20EC000
heap
page read and write
3849000
heap
page read and write
523000
heap
page read and write
400000
system
page execute and read and write
27CE000
heap
page read and write
20DC000
heap
page read and write
There are 344 hidden memdumps, click here to show them.