IOC Report
FedEx_776282383902.exe

loading gif

Files

File Path
Type
Category
Malicious
FedEx_776282383902.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FedEx_776282383902.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\eb42b1a5c308fc11edf1ddbdd25c8486_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FedEx_776282383902.exe
"C:\Users\user\Desktop\FedEx_776282383902.exe"
malicious
C:\Users\user\Desktop\FedEx_776282383902.exe
"C:\Users\user\Desktop\FedEx_776282383902.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://45.61.137.215/index.php/t?id=090
45.61.137.215
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://45.61.137.215/index.php/feed/
unknown
https://gmpg.org/xfn/11
unknown
http://45.61.137.215/index.php/comments/feed/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.ibsensoftware.com/
unknown

IPs

IP
Domain
Country
Malicious
45.61.137.215
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
423E000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
30D1000
trusted library allocation
page read and write
malicious
42BA000
trusted library allocation
page read and write
malicious
D18000
heap
page read and write
malicious
131B000
heap
page read and write
1450000
trusted library allocation
page read and write
5800000
heap
page read and write
1850000
trusted library allocation
page read and write
C30000
unkown
page readonly
4069000
trusted library allocation
page read and write
1190000
heap
page read and write
54A4000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
7EE000
stack
page read and write
5510000
trusted library allocation
page read and write
12DE000
heap
page read and write
3061000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
1273000
trusted library allocation
page read and write
10F7000
stack
page read and write
1282000
trusted library allocation
page read and write
16BF000
stack
page read and write
4153000
trusted library allocation
page read and write
60FE000
stack
page read and write
2A8E000
stack
page read and write
2FDC000
stack
page read and write
2BCE000
stack
page read and write
BD0000
heap
page read and write
1184000
trusted library allocation
page read and write
14B0000
heap
page read and write
5770000
trusted library allocation
page execute and read and write
1286000
trusted library allocation
page execute and read and write
30B6000
trusted library allocation
page read and write
57FE000
stack
page read and write
5512000
trusted library allocation
page read and write
7C8E000
stack
page read and write
1280000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
2700000
heap
page read and write
61D0000
heap
page read and write
D49000
stack
page read and write
551B000
trusted library allocation
page read and write
7F0C0000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
15BE000
stack
page read and write
128A000
trusted library allocation
page execute and read and write
1888000
heap
page read and write
54CD000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
63F0000
heap
page read and write
1297000
trusted library allocation
page execute and read and write
5A00000
heap
page read and write
2FF0000
heap
page execute and read and write
2CCF000
stack
page read and write
62DF000
stack
page read and write
42D4000
trusted library allocation
page read and write
1880000
heap
page read and write
75E0000
trusted library section
page read and write
6190000
trusted library allocation
page execute and read and write
6EE5F000
unkown
page readonly
5561000
trusted library allocation
page read and write
5500000
heap
page read and write
57BE000
stack
page read and write
144E000
stack
page read and write
13CE000
heap
page read and write
54A0000
trusted library allocation
page read and write
1454000
trusted library allocation
page read and write
13C9000
heap
page read and write
574C000
stack
page read and write
12B0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
7F0000
heap
page read and write
5750000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
7D8E000
stack
page read and write
74E0000
heap
page read and write
1290000
trusted library allocation
page read and write
1456000
trusted library allocation
page read and write
7A0000
heap
page read and write
63DF000
stack
page read and write
5520000
heap
page read and write
63E0000
heap
page read and write
6EE40000
unkown
page readonly
1183000
trusted library allocation
page execute and read and write
C32000
unkown
page readonly
12F0000
heap
page read and write
1313000
heap
page read and write
3030000
heap
page read and write
7657000
trusted library allocation
page read and write
7DC1000
heap
page read and write
12D0000
heap
page read and write
CDF000
stack
page read and write
1870000
trusted library allocation
page read and write
5A40000
trusted library section
page read and write
40B7000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
4105000
trusted library allocation
page read and write
DB0000
heap
page read and write
74C000
stack
page read and write
1307000
heap
page read and write
4A0000
remote allocation
page execute and read and write
5530000
trusted library allocation
page execute and read and write
61D5000
heap
page read and write
118D000
trusted library allocation
page execute and read and write
3050000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
78EE000
stack
page read and write
DFE000
stack
page read and write
2F9E000
stack
page read and write
1490000
trusted library allocation
page execute and read and write
59BD000
stack
page read and write
12D8000
heap
page read and write
6EE41000
unkown
page execute read
6EE5D000
unkown
page read and write
113D000
stack
page read and write
AFC000
stack
page read and write
12C0000
trusted library allocation
page execute and read and write
1364000
heap
page read and write
1315000
heap
page read and write
54BE000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
129B000
trusted library allocation
page execute and read and write
7D90000
trusted library section
page read and write
7638000
trusted library section
page read and write
2B8F000
stack
page read and write
7DB0000
heap
page read and write
5540000
trusted library allocation
page read and write
6EE56000
unkown
page readonly
54C1000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
792E000
stack
page read and write
5760000
trusted library section
page readonly
54C6000
trusted library allocation
page read and write
7A2E000
stack
page read and write
1860000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
4061000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
515B000
stack
page read and write
140E000
stack
page read and write
59FE000
stack
page read and write
5810000
heap
page execute and read and write
DA0000
heap
page read and write
4354000
trusted library allocation
page read and write
D10000
heap
page read and write
6180000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
3033000
heap
page read and write
There are 139 hidden memdumps, click here to show them.