imdcsc.exe

Remote Service Application

Microsoft Corp.

The executable imdcsc.exe has been detected as malware by 40 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Make STEAM ID in CS 1.6’.
Publisher:
Microsoft Corp.

Product:
Remote Service Application

Version:
1, 0, 0, 1

MD5:
a3d6d38ba1c6ab6b00e8f882574a9018

SHA-1:
7811dbcc060e6a1c665b7077ebe54d5537a3b36b

SHA-256:
4fa30b031fc220f150bb60ba4af81ac998f678ad21c2b2b4d13786590ce423aa

Scanner detections:
40 / 68

Status:
Malware

Analysis date:
4/24/2024 11:03:43 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Backdoor.Fynloski.C
1017

Agnitum Outpost
Backdoor.DarkKomet
7.1.1

AhnLab V3 Security
Backdoor/Win32.Graybird
14.04.24

Avira AntiVirus
BDS/DarkKomet.GR
7.11.138.204

avast!
Win32:Agent-ASXK [Trj]
2014.9-140424

AVG
BackDoor.Delf
2015.0.3495

Baidu Antivirus
Backdoor.Win32.DarkKomet
4.0.3.14424

Bitdefender
Backdoor.Fynloski.C
1.0.20.570

Bkav FE
W32.OnGamesLTKVPOK.Trojan
1.3.0.4959

Clam AntiVirus
WIN.Trojan.DarkKomet
0.98/18355

Comodo Security
Backdoor.Win32.Agent.XAB
17990

Dr.Web
BackDoor.Comet.884
9.0.1.0114

Emsisoft Anti-Malware
Backdoor.Fynloski
8.14.04.24.06

ESET NOD32
Win32/Fynloski.AA
8.9591

Fortinet FortiGate
W32/DarkKomet.ID!tr.bdr
4/24/2014

F-Prot
W32/Downloader.C.gen
v6.4.7.1.166

F-Secure
Backdoor.Fynloski.C
11.2014-24-04_5

G Data
Backdoor.Fynloski
14.4.24

IKARUS anti.virus
Trojan.Win32.CDur
t3scan.2.2.29

K7 AntiVirus
Backdoor
13.176.11554

Kaspersky
Backdoor.Win32.DarkKomet
14.0.0.3969

Malwarebytes
Backdoor.Agent.DCRSAGen
v2014.04.24.06

McAfee
Generic BackDoor.xa
5600.7151

Microsoft Security Essentials
Backdoor:Win32/Fynloski.A
1.10401

MicroWorld eScan
Backdoor.Fynloski.C
15.0.0.342

NANO AntiVirus
Trojan.Win32.DarkKomet.cssoim
0.28.0.58720

Norman
Downloader.HJVR
11.20140424

nProtect
Trojan/W32.Agent.674304.BC
14.03.25.01

Panda Antivirus
Trj/Packed.B
14.04.24.06

Qihoo 360 Security
Win32/Backdoor.f83
1.0.0.1015

Quick Heal
Backdoor.Fynloski.A9
4.14.12.00

Rising Antivirus
PE:Backdoor.Pontoeb!1.6637
23.00.65.14422

Sophos
Troj/Backdr-ID
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Fynloski
10646

Total Defense
Win32/Fynloski.A!generic
37.0.10838

Trend Micro House Call
TROJ_AGENT_058807.TOMB
7.2.114

Trend Micro
TROJ_AGENT_058807.TOMB
10.465.24

Vba32 AntiVirus
Backdoor.DarkKomet.xyk
3.12.24.3

VIPRE Antivirus
Backdoor.Win32.Fynloski.A
27732

ViRobot
Backdoor.Win32.Agent.674304.A
2011.4.7.4223

File size:
658.5 KB (674,304 bytes)

Product version:
4, 0, 0, 0

Copyright:
Copyright (C) 1999

Original file name:
MSRSAAP.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\imdcsc.exe

File PE Metadata
Compilation timestamp:
6/7/2012 3:59:53 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hf:+Z1xuVVjfFoynPaVBUR8f+kN10EBp

Entry address:
0x8F888

Entry point:
55, 8B, EC, B9, 30, 00, 00, 00, 6A, 00, 6A, 00, 49, 75, F9, 51, 53, 56, 57, B8, E0, E3, 48, 00, E8, 2F, 7E, F7, FF, 33, C0, 55, 68, 56, 06, 49, 00, 64, FF, 30, 64, 89, 20, 6A, 00, E8, 2A, 07, F8, FF, A1, B0, 48, 49, 00, C6, 00, 01, E8, 21, B7, FF, FF, B2, 01, A1, 80, DE, 48, 00, E8, 19, E6, FF, FF, A3, E8, C3, 49, 00, 33, D2, 55, 68, 09, FA, 48, 00, 64, FF, 32, 64, 89, 22, 8D, 4D, EC, BA, 70, 06, 49, 00, A1, E8, C3, 49, 00, E8, 68, E6, FF, FF, 8B, 55, EC, A1, 38, 4B, 49, 00, E8, 7F, 5C, F7, FF, 8D, 55, E0...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
573 KB (586,752 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Make STEAM ID in CS 1.6

Command:
C:\users\{user}\appdata\local\temp\{random}.tmp\imdcsc.exe


Remove imdcsc.exe - Powered by Reason Core Security