IOC Report
17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhvEF99.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x20de263f, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\gkdtsmmqxjok
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe
"C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe"
malicious
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\gkdtsmmqxjok"
malicious
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\reiltfxslrgpfxs"
malicious
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe
C:\Users\user\Desktop\17288990442d9287b54e998847fd080b08b8b80367cf03b841168c7aefaacbc7ff3e22ca17806.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\byowtximhzybhdoels"
malicious

URLs

Name
IP
Malicious
idabo.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.google.com
unknown
https://www.office.com/
unknown
http://geoplugin.net/json.gpC
unknown
http://www.imvu.comr
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
idabo.duckdns.org
135.148.195.248
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
135.148.195.248
idabo.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-I89M3S
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-I89M3S
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-I89M3S
time

Memdumps

Base Address
Regiontype
Protect
Malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
221F000
stack
page read and write
malicious
6D2000
heap
page read and write
malicious
68E000
heap
page read and write
malicious
8CF000
stack
page read and write
2222000
heap
page read and write
545000
heap
page read and write
2269000
heap
page read and write
717000
heap
page read and write
1F0000
heap
page read and write
2233000
heap
page read and write
6D2000
heap
page read and write
2232000
heap
page read and write
680000
heap
page read and write
478000
unkown
page readonly
221E000
heap
page read and write
6C7000
heap
page read and write
2225000
heap
page read and write
2220000
heap
page read and write
2636000
heap
page read and write
400000
system
page execute and read and write
2232000
heap
page read and write
2219000
heap
page read and write
99C000
heap
page read and write
2818000
heap
page read and write
401000
unkown
page execute read
3819000
heap
page read and write
2230000
heap
page read and write
71D000
heap
page read and write
560000
heap
page read and write
220C000
heap
page read and write
2C72000
heap
page read and write
1D4000
heap
page read and write
2883000
heap
page read and write
6E4000
heap
page read and write
2C48000
heap
page read and write
2250000
heap
page read and write
2230000
heap
page read and write
2231000
heap
page read and write
71D000
heap
page read and write
193000
stack
page read and write
590000
trusted library allocation
page read and write
530000
heap
page read and write
2211000
heap
page read and write
930000
heap
page read and write
2220000
heap
page read and write
37A0000
heap
page read and write
97F000
stack
page read and write
2221000
heap
page read and write
2232000
heap
page read and write
544000
heap
page read and write
2C48000
heap
page read and write
6F4000
heap
page read and write
2232000
heap
page read and write
545000
heap
page read and write
480000
heap
page read and write
226D000
heap
page read and write
2220000
heap
page read and write
2233000
heap
page read and write
2230000
heap
page read and write
390C000
heap
page read and write
71D000
heap
page read and write
278E000
stack
page read and write
2220000
heap
page read and write
2211000
heap
page read and write
4AE000
stack
page read and write
2231000
heap
page read and write
3A31000
heap
page read and write
6F4000
heap
page read and write
2275000
heap
page read and write
545000
heap
page read and write
2C49000
heap
page read and write
221F000
heap
page read and write
3F06000
unclassified section
page execute and read and write
37A1000
heap
page read and write
71D000
heap
page read and write
2218000
heap
page read and write
2211000
heap
page read and write
544000
heap
page read and write
2711000
heap
page read and write
221C000
heap
page read and write
2A10000
trusted library allocation
page read and write
2257000
heap
page read and write
2BD0000
heap
page read and write
19C000
stack
page read and write
2231000
heap
page read and write
2230000
heap
page read and write
758000
heap
page read and write
2242000
heap
page read and write
717000
heap
page read and write
2710000
heap
page read and write
478000
unkown
page readonly
544000
heap
page read and write
2222000
heap
page read and write
717000
heap
page read and write
735000
heap
page read and write
6F4000
heap
page read and write
64E000
stack
page read and write
580000
heap
page read and write
545000
heap
page read and write
2BD1000
heap
page read and write
544000
heap
page read and write
400000
system
page execute and read and write
2218000
heap
page read and write
544000
heap
page read and write
717000
heap
page read and write
3A30000
heap
page read and write
2214000
heap
page read and write
471000
unkown
page write copy
590000
heap
page read and write
3F3B000
unclassified section
page execute and read and write
6F4000
heap
page read and write
21E0000
heap
page read and write
263C000
heap
page read and write
5AE000
stack
page read and write
2211000
heap
page read and write
400000
unkown
page readonly
3A31000
heap
page read and write
2200000
heap
page read and write
2819000
heap
page read and write
2C53000
heap
page read and write
1D4000
heap
page read and write
545000
heap
page read and write
735000
heap
page read and write
545000
heap
page read and write
250E000
stack
page read and write
24CF000
stack
page read and write
478000
unkown
page readonly
2C67000
heap
page read and write
71D000
heap
page read and write
2B48000
heap
page read and write
222C000
heap
page read and write
221E000
heap
page read and write
3F20000
unclassified section
page execute and read and write
717000
heap
page read and write
6C3000
heap
page read and write
8BF000
stack
page read and write
18F000
stack
page read and write
531000
heap
page read and write
6C3000
heap
page read and write
37A1000
heap
page read and write
1D4000
heap
page read and write
2B53000
heap
page read and write
2230000
heap
page read and write
6D2000
heap
page read and write
221C000
heap
page read and write
2211000
heap
page read and write
531000
heap
page read and write
2225000
heap
page read and write
2231000
heap
page read and write
2715000
heap
page read and write
2BD1000
heap
page read and write
400000
unkown
page readonly
6E4000
heap
page read and write
220E000
heap
page read and write
2521000
heap
page read and write
474000
unkown
page read and write
2220000
heap
page read and write
221C000
heap
page read and write
6C7000
heap
page read and write
222B000
heap
page read and write
2230000
heap
page read and write
6E4000
heap
page read and write
508000
heap
page read and write
2240000
heap
page read and write
71D000
heap
page read and write
6D2000
heap
page read and write
221F000
heap
page read and write
430000
heap
page read and write
393A000
heap
page read and write
990000
heap
page read and write
238F000
stack
page read and write
6CC000
heap
page read and write
2222000
heap
page read and write
2219000
heap
page read and write
2230000
heap
page read and write
2219000
heap
page read and write
2233000
heap
page read and write
221C000
heap
page read and write
224B000
heap
page read and write
221E000
heap
page read and write
2882000
heap
page read and write
3893000
heap
page read and write
2811000
heap
page read and write
920000
heap
page read and write
401000
unkown
page execute read
1D0000
heap
page read and write
717000
heap
page read and write
544000
heap
page read and write
5F0000
heap
page read and write
2819000
heap
page read and write
2883000
heap
page read and write
478000
unkown
page readonly
473000
system
page execute and read and write
2225000
heap
page read and write
2228000
heap
page read and write
717000
heap
page read and write
2220000
heap
page read and write
221F000
heap
page read and write
7CF000
stack
page read and write
71D000
heap
page read and write
58E000
heap
page read and write
6D2000
heap
page read and write
6C7000
heap
page read and write
1D4000
heap
page read and write
4FE000
stack
page read and write
2220000
heap
page read and write
2250000
heap
page read and write
2257000
heap
page read and write
1D4000
heap
page read and write
6E4000
heap
page read and write
228C000
stack
page read and write
544000
heap
page read and write
9C000
stack
page read and write
221E000
heap
page read and write
58E000
heap
page read and write
545000
heap
page read and write
2211000
heap
page read and write
2293000
heap
page read and write
6E4000
heap
page read and write
6D2000
heap
page read and write
2257000
heap
page read and write
532000
heap
page read and write
222C000
heap
page read and write
2242000
heap
page read and write
67E000
heap
page read and write
2222000
heap
page read and write
9C000
stack
page read and write
3EB0000
unclassified section
page execute and read and write
2235000
heap
page read and write
6E4000
heap
page read and write
220D000
heap
page read and write
1F0000
heap
page read and write
544000
heap
page read and write
2211000
heap
page read and write
221F000
heap
page read and write
227C000
heap
page read and write
6E4000
heap
page read and write
220C000
heap
page read and write
2711000
heap
page read and write
2249000
heap
page read and write
2520000
heap
page read and write
650000
heap
page read and write
75D000
heap
page read and write
744000
heap
page read and write
62E000
stack
page read and write
85F000
stack
page read and write
2250000
heap
page read and write
1D4000
heap
page read and write
2250000
heap
page read and write
221C000
heap
page read and write
6D2000
heap
page read and write
2A10000
trusted library allocation
page read and write
6F4000
heap
page read and write
5F8000
heap
page read and write
2B5E000
heap
page read and write
221F000
heap
page read and write
2230000
heap
page read and write
2225000
heap
page read and write
544000
heap
page read and write
221E000
heap
page read and write
2211000
heap
page read and write
2220000
heap
page read and write
20E8000
heap
page read and write
3E89000
unclassified section
page execute and read and write
224F000
heap
page read and write
544000
heap
page read and write
2249000
heap
page read and write
2220000
heap
page read and write
2882000
heap
page read and write
478000
unkown
page readonly
726000
heap
page read and write
6D2000
heap
page read and write
3E30000
unclassified section
page execute and read and write
47E000
stack
page read and write
2B40000
heap
page read and write
75A000
heap
page read and write
222C000
heap
page read and write
2232000
heap
page read and write
2230000
heap
page read and write
993000
heap
page read and write
717000
heap
page read and write
2230000
heap
page read and write
2235000
heap
page read and write
6F4000
heap
page read and write
2711000
heap
page read and write
1D4000
heap
page read and write
471000
unkown
page write copy
19C000
stack
page read and write
5B7000
heap
page read and write
260F000
stack
page read and write
39A1000
heap
page read and write
10000000
direct allocation
page read and write
2CA2000
heap
page read and write
400000
unkown
page readonly
4BE000
stack
page read and write
221C000
heap
page read and write
71D000
heap
page read and write
2221000
heap
page read and write
2230000
heap
page read and write
2C48000
heap
page read and write
220C000
heap
page read and write
400000
system
page execute and read and write
544000
heap
page read and write
1D4000
heap
page read and write
2230000
heap
page read and write
45C000
system
page execute and read and write
257F000
stack
page read and write
401000
unkown
page execute read
471000
unkown
page read and write
1D4000
heap
page read and write
2230000
heap
page read and write
544000
heap
page read and write
2220000
heap
page read and write
220C000
heap
page read and write
544000
heap
page read and write
2211000
heap
page read and write
717000
heap
page read and write
3EA3000
unclassified section
page execute and read and write
2A10000
trusted library allocation
page read and write
668000
heap
page read and write
2521000
heap
page read and write
71D000
heap
page read and write
2C71000
heap
page read and write
459000
system
page execute and read and write
2211000
heap
page read and write
2C72000
heap
page read and write
10001000
direct allocation
page execute and read and write
2225000
heap
page read and write
6F4000
heap
page read and write
726000
heap
page read and write
2D7F000
heap
page read and write
73B000
heap
page read and write
2221000
heap
page read and write
10016000
direct allocation
page execute and read and write
6E4000
heap
page read and write
71D000
heap
page read and write
221E000
heap
page read and write
2248000
heap
page read and write
660000
heap
page read and write
3E8D000
unclassified section
page execute and read and write
17C000
stack
page read and write
744000
heap
page read and write
1D4000
heap
page read and write
717000
heap
page read and write
2233000
heap
page read and write
93D000
heap
page read and write
2253000
heap
page read and write
1D4000
heap
page read and write
6F4000
heap
page read and write
23CC000
stack
page read and write
545000
heap
page read and write
37A1000
heap
page read and write
5B0000
heap
page read and write
2A10000
trusted library allocation
page read and write
68A000
heap
page read and write
6F4000
heap
page read and write
93D000
heap
page read and write
177000
stack
page read and write
2211000
heap
page read and write
2230000
heap
page read and write
2C71000
heap
page read and write
2221000
heap
page read and write
9BE000
stack
page read and write
288F000
stack
page read and write
2A10000
trusted library allocation
page read and write
396A000
heap
page read and write
1D4000
heap
page read and write
1F0000
heap
page read and write
223A000
heap
page read and write
1D4000
heap
page read and write
222C000
heap
page read and write
590000
trusted library allocation
page read and write
6F4000
heap
page read and write
471000
unkown
page write copy
45D000
system
page execute and read and write
9C000
stack
page read and write
1D4000
heap
page read and write
223E000
heap
page read and write
336F000
stack
page read and write
326E000
stack
page read and write
780000
heap
page read and write
223A000
heap
page read and write
390C000
heap
page read and write
2A15000
heap
page read and write
58D000
heap
page read and write
471000
unkown
page write copy
5D0000
heap
page read and write
75E000
heap
page read and write
2211000
heap
page read and write
19A000
stack
page read and write
41B000
system
page execute and read and write
2233000
heap
page read and write
51F000
heap
page read and write
401000
unkown
page execute read
221F000
heap
page read and write
21F0000
heap
page read and write
6C3000
heap
page read and write
6E4000
heap
page read and write
223A000
heap
page read and write
2220000
heap
page read and write
1D4000
heap
page read and write
1D4000
heap
page read and write
2A10000
trusted library allocation
page read and write
544000
heap
page read and write
4B0000
heap
page read and write
400000
unkown
page readonly
2230000
heap
page read and write
221F000
heap
page read and write
500000
heap
page read and write
263A000
heap
page read and write
2D6C000
heap
page read and write
6D2000
heap
page read and write
2211000
heap
page read and write
2A1C000
heap
page read and write
2230000
heap
page read and write
2220000
heap
page read and write
222C000
heap
page read and write
4DE000
stack
page read and write
717000
heap
page read and write
500000
heap
page read and write
2230000
heap
page read and write
6C3000
heap
page read and write
540000
heap
page read and write
2293000
heap
page read and write
2810000
heap
page read and write
99C000
heap
page read and write
2230000
heap
page read and write
2230000
heap
page read and write
2293000
heap
page read and write
544000
heap
page read and write
456000
system
page execute and read and write
544000
heap
page read and write
224A000
heap
page read and write
933000
heap
page read and write
71D000
heap
page read and write
400000
unkown
page readonly
3F0C000
unclassified section
page execute and read and write
586000
heap
page read and write
1D4000
heap
page read and write
6E4000
heap
page read and write
9C000
stack
page read and write
6F4000
heap
page read and write
401000
unkown
page execute read
6E4000
heap
page read and write
There are 439 hidden memdumps, click here to show them.