IOC Report
1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv153A.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xd579f4ce, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\dxjvlgierdcqthqe
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe
"C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe"
malicious
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\dxjvlgierdcqthqe"
malicious
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\gzpolysyeludwneioqn"
malicious
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe
C:\Users\user\Desktop\1730208009cbbc5185357f6c127206378a947c7560ccc5f5234da3819452d576d86ecf0fd2268.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\qtcgmqdzstmiybbmfbayqv"
malicious

URLs

Name
IP
Malicious
akwaeze234.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.google.com
unknown
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
akwaeze234.duckdns.org
178.215.224.176
malicious
198.187.3.20.in-addr.arpa
unknown
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
178.215.224.176
akwaeze234.duckdns.org
Germany
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-VG9RMM
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-VG9RMM
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-VG9RMM
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
459000
unkown
page readonly
malicious
763000
heap
page read and write
malicious
459000
unkown
page readonly
malicious
73E000
heap
page read and write
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
459000
unkown
page readonly
malicious
2309000
heap
page read and write
232D000
heap
page read and write
218F000
stack
page read and write
22F0000
heap
page read and write
2317000
heap
page read and write
22CE000
heap
page read and write
22D1000
heap
page read and write
637000
heap
page read and write
2861000
heap
page read and write
478000
unkown
page readonly
77F000
heap
page read and write
22EC000
heap
page read and write
22F1000
heap
page read and write
9C000
stack
page read and write
177000
stack
page read and write
22E0000
heap
page read and write
22D1000
heap
page read and write
36D9000
unclassified section
page execute and read and write
830000
heap
page read and write
7B7000
heap
page read and write
22F3000
heap
page read and write
400000
unkown
page readonly
470000
heap
page read and write
534000
heap
page read and write
4F4000
heap
page read and write
2D12000
heap
page read and write
400000
system
page execute and read and write
28D8000
heap
page read and write
500000
heap
page read and write
3573000
heap
page read and write
22FA000
heap
page read and write
535000
heap
page read and write
4F4000
heap
page read and write
648000
heap
page read and write
22F1000
heap
page read and write
22CC000
heap
page read and write
2353000
heap
page read and write
2C13000
heap
page read and write
A00000
heap
page read and write
473000
system
page execute and read and write
364F000
heap
page read and write
22FA000
heap
page read and write
22F0000
heap
page read and write
2302000
heap
page read and write
4F4000
heap
page read and write
73A000
heap
page read and write
27D3000
heap
page read and write
2C08000
heap
page read and write
3700000
unclassified section
page execute and read and write
2952000
heap
page read and write
22F0000
heap
page read and write
34F9000
heap
page read and write
22F0000
heap
page read and write
83F000
stack
page read and write
2E56000
heap
page read and write
7B7000
heap
page read and write
4F4000
heap
page read and write
535000
heap
page read and write
535000
heap
page read and write
4F4000
heap
page read and write
22DC000
heap
page read and write
22F0000
heap
page read and write
22B0000
heap
page read and write
10016000
direct allocation
page execute and read and write
22D1000
heap
page read and write
4F0000
heap
page read and write
401000
unkown
page execute read
28DA000
heap
page read and write
22CF000
stack
page read and write
231B000
heap
page read and write
22E5000
heap
page read and write
2302000
heap
page read and write
22F5000
heap
page read and write
B0E000
heap
page read and write
2311000
heap
page read and write
8E3000
heap
page read and write
B0D000
heap
page read and write
22EC000
heap
page read and write
22F5000
heap
page read and write
36DD000
unclassified section
page execute and read and write
4F4000
heap
page read and write
2353000
heap
page read and write
27D0000
heap
page read and write
22FE000
heap
page read and write
771000
heap
page read and write
2317000
heap
page read and write
41B000
system
page execute and read and write
8EC000
heap
page read and write
2310000
heap
page read and write
230A000
heap
page read and write
3680000
unclassified section
page execute and read and write
35D6000
heap
page read and write
535000
heap
page read and write
22E1000
heap
page read and write
2610000
heap
page read and write
22E8000
heap
page read and write
22DC000
heap
page read and write
400000
system
page execute and read and write
7A0000
heap
page read and write
534000
heap
page read and write
22E2000
heap
page read and write
22DC000
heap
page read and write
A2F000
stack
page read and write
534000
heap
page read and write
534000
heap
page read and write
2952000
heap
page read and write
7AE000
heap
page read and write
34FA000
heap
page read and write
22E2000
heap
page read and write
7B7000
heap
page read and write
28D0000
heap
page read and write
77F000
heap
page read and write
2C09000
heap
page read and write
33EE000
heap
page read and write
22DF000
heap
page read and write
22C0000
heap
page read and write
22F1000
heap
page read and write
2943000
heap
page read and write
6FE000
heap
page read and write
28D8000
heap
page read and write
534000
heap
page read and write
2611000
heap
page read and write
2AD0000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
2C1D000
heap
page read and write
378B000
unclassified section
page execute and read and write
22EB000
heap
page read and write
640000
heap
page read and write
22F0000
heap
page read and write
375C000
unclassified section
page execute and read and write
22F0000
heap
page read and write
22D8000
heap
page read and write
19C000
stack
page read and write
7B7000
heap
page read and write
2C2E000
stack
page read and write
3480000
heap
page read and write
534000
heap
page read and write
22E0000
heap
page read and write
781000
heap
page read and write
534000
heap
page read and write
478000
unkown
page readonly
807000
heap
page read and write
534000
heap
page read and write
193000
stack
page read and write
22E4000
heap
page read and write
478000
unkown
page readonly
35D2000
heap
page read and write
22E0000
heap
page read and write
2860000
heap
page read and write
771000
heap
page read and write
7A0000
heap
page read and write
22D1000
heap
page read and write
534000
heap
page read and write
87F000
stack
page read and write
401000
unkown
page execute read
2D3B000
heap
page read and write
27D1000
heap
page read and write
534000
heap
page read and write
22E0000
heap
page read and write
28D9000
heap
page read and write
1F0000
heap
page read and write
4F4000
heap
page read and write
22F0000
heap
page read and write
4F4000
heap
page read and write
534000
heap
page read and write
364C000
heap
page read and write
2AD0000
trusted library allocation
page read and write
807000
heap
page read and write
45D000
system
page execute and read and write
A80000
trusted library allocation
page read and write
241F000
stack
page read and write
22D1000
heap
page read and write
9C000
stack
page read and write
230A000
heap
page read and write
22D1000
heap
page read and write
7AC000
heap
page read and write
22CC000
heap
page read and write
4F4000
heap
page read and write
2353000
heap
page read and write
471000
unkown
page write copy
3756000
unclassified section
page execute and read and write
23B9000
heap
page read and write
2ADD000
heap
page read and write
2331000
heap
page read and write
4F4000
heap
page read and write
8E0000
heap
page read and write
2942000
heap
page read and write
35D6000
heap
page read and write
22CC000
heap
page read and write
2311000
heap
page read and write
535000
heap
page read and write
730000
heap
page read and write
22C0000
heap
page read and write
A0D000
heap
page read and write
230B000
heap
page read and write
7A0000
heap
page read and write
2331000
heap
page read and write
401000
unkown
page execute read
474000
unkown
page read and write
67E000
stack
page read and write
28D8000
heap
page read and write
7AE000
heap
page read and write
22D1000
heap
page read and write
781000
heap
page read and write
471000
unkown
page read and write
22D4000
heap
page read and write
28D8000
heap
page read and write
22E5000
heap
page read and write
59E000
stack
page read and write
3573000
heap
page read and write
5B0000
heap
page read and write
6E0000
heap
page read and write
93F000
stack
page read and write
22F0000
heap
page read and write
772000
heap
page read and write
2942000
heap
page read and write
45C000
system
page execute and read and write
22E2000
heap
page read and write
22CC000
heap
page read and write
471000
unkown
page write copy
B0E000
heap
page read and write
1F0000
heap
page read and write
610000
heap
page read and write
1F0000
heap
page read and write
22E2000
heap
page read and write
400000
unkown
page readonly
35EB000
heap
page read and write
22E1000
heap
page read and write
35D6000
heap
page read and write
7AC000
heap
page read and write
69F000
stack
page read and write
10000000
direct allocation
page read and write
2331000
heap
page read and write
535000
heap
page read and write
9C000
stack
page read and write
22E5000
heap
page read and write
7AE000
heap
page read and write
5CE000
heap
page read and write
400000
system
page execute and read and write
27D1000
heap
page read and write
22E5000
heap
page read and write
22E0000
heap
page read and write
2309000
heap
page read and write
2AD0000
trusted library allocation
page read and write
5AE000
stack
page read and write
4F4000
heap
page read and write
23BC000
heap
page read and write
1F0000
heap
page read and write
459000
system
page execute and read and write
400000
unkown
page readonly
7AE000
heap
page read and write
7A0000
heap
page read and write
807000
heap
page read and write
7DC000
heap
page read and write
780000
heap
page read and write
35A2000
heap
page read and write
22F1000
heap
page read and write
97F000
stack
page read and write
7A0000
heap
page read and write
17C000
stack
page read and write
4F4000
heap
page read and write
22F0000
heap
page read and write
478000
unkown
page readonly
4BE000
stack
page read and write
22F0000
heap
page read and write
4F4000
heap
page read and write
A0D000
heap
page read and write
46E000
stack
page read and write
27D1000
heap
page read and write
22EC000
heap
page read and write
534000
heap
page read and write
535000
heap
page read and write
22E2000
heap
page read and write
401000
unkown
page execute read
2AD0000
trusted library allocation
page read and write
22F0000
heap
page read and write
2335000
heap
page read and write
22D9000
heap
page read and write
361B000
heap
page read and write
22D8000
heap
page read and write
22D9000
heap
page read and write
7B7000
heap
page read and write
22F0000
heap
page read and write
B06000
heap
page read and write
22D1000
heap
page read and write
A80000
trusted library allocation
page read and write
400000
unkown
page readonly
550000
heap
page read and write
7A0000
heap
page read and write
22E2000
heap
page read and write
860000
heap
page read and write
2353000
heap
page read and write
6E8000
heap
page read and write
4F4000
heap
page read and write
19C000
stack
page read and write
81E000
stack
page read and write
534000
heap
page read and write
22F0000
heap
page read and write
28D9000
heap
page read and write
6BE000
stack
page read and write
2861000
heap
page read and write
2317000
heap
page read and write
35D2000
heap
page read and write
22DC000
heap
page read and write
22FA000
heap
page read and write
21B8000
heap
page read and write
560000
heap
page read and write
22E4000
heap
page read and write
22CD000
heap
page read and write
2AD0000
trusted library allocation
page read and write
22E1000
heap
page read and write
77F000
heap
page read and write
35EB000
heap
page read and write
2E23000
heap
page read and write
807000
heap
page read and write
22E0000
heap
page read and write
456000
system
page execute and read and write
4FE000
stack
page read and write
3770000
unclassified section
page execute and read and write
28D8000
heap
page read and write
534000
heap
page read and write
7C3000
heap
page read and write
2861000
heap
page read and write
4F4000
heap
page read and write
401000
unkown
page execute read
22F0000
heap
page read and write
530000
heap
page read and write
22D1000
heap
page read and write
2AD9000
heap
page read and write
22D1000
heap
page read and write
2943000
heap
page read and write
540000
heap
page read and write
2311000
heap
page read and write
2611000
heap
page read and write
2313000
heap
page read and write
36F3000
unclassified section
page execute and read and write
A7F000
stack
page read and write
19A000
stack
page read and write
22E2000
heap
page read and write
7D2000
heap
page read and write
22EC000
heap
page read and write
3481000
heap
page read and write
7AE000
heap
page read and write
471000
unkown
page write copy
22E8000
heap
page read and write
7B7000
heap
page read and write
35D6000
heap
page read and write
2331000
heap
page read and write
2480000
heap
page read and write
4F4000
heap
page read and write
807000
heap
page read and write
535000
heap
page read and write
5B8000
heap
page read and write
2311000
heap
page read and write
28D1000
heap
page read and write
22D9000
heap
page read and write
10001000
direct allocation
page execute and read and write
478000
unkown
page readonly
22E1000
heap
page read and write
22E4000
heap
page read and write
22F0000
heap
page read and write
4BE000
stack
page read and write
22F0000
heap
page read and write
A03000
heap
page read and write
22DC000
heap
page read and write
22F1000
heap
page read and write
B00000
heap
page read and write
22F0000
heap
page read and write
7B7000
heap
page read and write
2317000
heap
page read and write
18F000
stack
page read and write
2D2F000
stack
page read and write
35D2000
heap
page read and write
35EB000
heap
page read and write
22D1000
heap
page read and write
400000
unkown
page readonly
97E000
stack
page read and write
364F000
heap
page read and write
2335000
heap
page read and write
7C3000
heap
page read and write
775000
heap
page read and write
471000
unkown
page write copy
8EC000
heap
page read and write
7DC000
heap
page read and write
534000
heap
page read and write
600000
heap
page read and write
534000
heap
page read and write
23BD000
heap
page read and write
9C000
stack
page read and write
630000
heap
page read and write
4F4000
heap
page read and write
There are 388 hidden memdumps, click here to show them.