IOC Report
Products Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Products Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Products Order.exe.log
CSV text
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Products Order.exe
"C:\Users\user\Desktop\Products Order.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
45.90.57.51/big/five/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://45.90.57.51/big/five/fre.php
45.90.57.51
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://www.ibsensoftware.com/
unknown

IPs

IP
Domain
Country
Malicious
45.90.57.51
unknown
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2A2D000
trusted library allocation
page read and write
malicious
12AA6000
trusted library allocation
page read and write
malicious
4B6000
unkown
page readonly
malicious
778000
heap
page read and write
malicious
2D82000
trusted library allocation
page read and write
1C000
unkown
page readonly
2E7B000
trusted library allocation
page read and write
2BF8000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
29E2000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
D90000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
10000
unkown
page readonly
2E46000
trusted library allocation
page read and write
580000
heap
page read and write
1A910000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
28DE000
stack
page read and write
2D6B000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
A50000
trusted library section
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF4893F0000
trusted library allocation
page execute and read and write
2D7E000
trusted library allocation
page read and write
F9E000
stack
page read and write
2DA0000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
2A1B000
trusted library allocation
page read and write
2A0D000
trusted library allocation
page read and write
4B1000
unkown
page readonly
2E6A000
trusted library allocation
page read and write
12989000
trusted library allocation
page read and write
1035000
heap
page read and write
4C0000
heap
page read and write
128E8000
trusted library allocation
page read and write
1030000
heap
page read and write
2DA4000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2A19000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
29E6000
trusted library allocation
page read and write
12AC0000
trusted library allocation
page read and write
12940000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
1B380000
heap
page read and write
2BDA000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
29E4000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
ACF000
heap
page read and write
2D6D000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
B0C000
heap
page read and write
AA6000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1B58E000
stack
page read and write
2D8D000
trusted library allocation
page read and write
AE2000
heap
page read and write
AA0000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
2BD2000
trusted library allocation
page read and write
AD2000
heap
page read and write
1B78F000
stack
page read and write
2A17000
trusted library allocation
page read and write
8F2000
stack
page read and write
128E1000
trusted library allocation
page read and write
5C0000
heap
page read and write
2220000
heap
page read and write
2E5F000
trusted library allocation
page read and write
276F000
stack
page read and write
129D1000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
4D9000
unkown
page readonly
2BD4000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
2E4C000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
590000
heap
page read and write
5D0000
heap
page read and write
1B68F000
stack
page read and write
1AE6D000
stack
page read and write
430000
unkown
page readonly
2BC1000
trusted library allocation
page read and write
21AE000
stack
page read and write
128E3000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
A20000
heap
page execute and read and write
29E8000
trusted library allocation
page read and write
B0E000
heap
page read and write
750000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
5A0000
heap
page read and write
12A19000
trusted library allocation
page read and write
29F3000
trusted library allocation
page read and write
1B48E000
stack
page read and write
2BFC000
trusted library allocation
page read and write
AD4000
heap
page read and write
2DAD000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
D95000
heap
page read and write
2E57000
trusted library allocation
page read and write
266F000
stack
page read and write
2E4A000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
4C9000
unkown
page readonly
2D6F000
trusted library allocation
page read and write
C9E000
stack
page read and write
2BF6000
trusted library allocation
page read and write
12A61000
trusted library allocation
page read and write
AAC000
heap
page read and write
2A04000
trusted library allocation
page read and write
215E000
stack
page read and write
5B0000
heap
page read and write
48E000
unkown
page readonly
2BD8000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
1AC000
stack
page read and write
E9E000
stack
page read and write
430000
unkown
page readonly
B6E000
heap
page read and write
1AC68000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2E7F000
trusted library allocation
page read and write
AC000
stack
page read and write
2A1D000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
5B0000
heap
page read and write
28E1000
trusted library allocation
page read and write
ADF000
heap
page read and write
1B1B0000
heap
page read and write
2D80000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
2E5B000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
12000
unkown
page readonly
432000
unkown
page readonly
2D9E000
trusted library allocation
page read and write
2E71000
trusted library allocation
page read and write
4D2000
unkown
page readonly
2D7C000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
5B5000
heap
page read and write
12AE3000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
ACA000
heap
page read and write
2A06000
trusted library allocation
page read and write
770000
heap
page read and write
2D67000
trusted library allocation
page read and write
A90000
heap
page read and write
4A0000
remote allocation
page execute and read and write
There are 157 hidden memdumps, click here to show them.