IOC Report
Purchase Inquiry_#466789.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Inquiry_#466789.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Inquiry_#466789.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Inquiry_#466789.exe
"C:\Users\user\Desktop\Purchase Inquiry_#466789.exe"
malicious
C:\Users\user\Desktop\Purchase Inquiry_#466789.exe
"C:\Users\user\Desktop\Purchase Inquiry_#466789.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://45.61.137.215/index.php/t?id=090
45.61.137.215
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://45.61.137.215/index.php/feed/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibsensoftware.com/
unknown
https://api.w.org/
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://gmpg.org/xfn/11
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://45.61.137.215/index.php/wp-json/
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://45.61.137.215/index.php/comments/feed/
unknown
http://www.sakkal.com
unknown
There are 27 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.61.137.215
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
11B8000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2D79000
trusted library allocation
page read and write
malicious
3F7A000
trusted library allocation
page read and write
malicious
3EFE000
trusted library allocation
page read and write
malicious
5172000
trusted library allocation
page read and write
A08E000
stack
page read and write
2C7D000
trusted library allocation
page read and write
49F000
remote allocation
page execute and read and write
3084000
trusted library allocation
page read and write
127E000
stack
page read and write
771E000
stack
page read and write
2CF0000
heap
page execute and read and write
FCE000
stack
page read and write
12C0000
heap
page read and write
775E000
stack
page read and write
5690000
heap
page read and write
3E13000
trusted library allocation
page read and write
EA3000
trusted library allocation
page execute and read and write
2B60000
heap
page read and write
2C50000
trusted library allocation
page read and write
3D77000
trusted library allocation
page read and write
5560000
trusted library section
page read and write
1140000
heap
page read and write
F83000
heap
page read and write
5460000
trusted library allocation
page execute and read and write
79AF000
heap
page read and write
E5E000
stack
page read and write
EF0000
heap
page read and write
FD0000
heap
page read and write
7547000
trusted library allocation
page read and write
3DC5000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
2FCE000
stack
page read and write
EF8000
heap
page read and write
2CC0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
56A0000
heap
page read and write
30CF000
stack
page read and write
2BED000
stack
page read and write
2B4E000
stack
page read and write
5340000
heap
page read and write
E90000
trusted library allocation
page read and write
5790000
heap
page read and write
1170000
heap
page read and write
5190000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
F26000
heap
page read and write
1430000
heap
page read and write
51FB000
stack
page read and write
2C76000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
9C0000
heap
page read and write
2C5B000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
10D0000
heap
page read and write
5491000
trusted library allocation
page read and write
113E000
stack
page read and write
555E000
stack
page read and write
FF0000
heap
page read and write
CF7000
stack
page read and write
3D29000
trusted library allocation
page read and write
54A0000
heap
page read and write
1160000
trusted library allocation
page execute and read and write
77A0000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
799E000
stack
page read and write
2C71000
trusted library allocation
page read and write
6EE2000
trusted library allocation
page read and write
FD0000
heap
page read and write
2D10000
heap
page execute and read and write
F87000
heap
page read and write
97A000
stack
page read and write
EFE000
heap
page read and write
2C82000
trusted library allocation
page read and write
FF5000
heap
page read and write
12B0000
heap
page read and write
52A0000
trusted library section
page readonly
568E000
stack
page read and write
A28E000
stack
page read and write
3D21000
trusted library allocation
page read and write
E1E000
stack
page read and write
5353000
heap
page read and write
EC2000
trusted library allocation
page read and write
4E1C000
stack
page read and write
58F0000
trusted library allocation
page read and write
DD0000
heap
page read and write
3F94000
trusted library allocation
page read and write
F80000
heap
page read and write
2D5F000
trusted library allocation
page read and write
A18E000
stack
page read and write
EC0000
trusted library allocation
page read and write
E3C000
stack
page read and write
8B9E000
stack
page read and write
2C90000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
EDB000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
1420000
trusted library allocation
page read and write
56CE000
heap
page read and write
1437000
heap
page read and write
860000
unkown
page readonly
FAE000
heap
page read and write
862000
unkown
page readonly
5900000
trusted library allocation
page execute and read and write
5180000
trusted library allocation
page execute and read and write
5330000
heap
page read and write
ED2000
trusted library allocation
page read and write
F3B000
stack
page read and write
79A0000
heap
page read and write
5160000
heap
page read and write
9C5000
heap
page read and write
5170000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
EBD000
trusted library allocation
page execute and read and write
5585000
heap
page read and write
F33000
heap
page read and write
7FDA0000
trusted library allocation
page execute and read and write
5350000
heap
page read and write
5580000
heap
page read and write
10EF000
stack
page read and write
2F8F000
stack
page read and write
ED7000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
1130000
heap
page read and write
ECA000
trusted library allocation
page execute and read and write
2C6E000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
EAD000
trusted library allocation
page execute and read and write
2BAE000
stack
page read and write
11B0000
heap
page read and write
320F000
stack
page read and write
79C5000
heap
page read and write
58A0000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
56A9000
heap
page read and write
EC6000
trusted library allocation
page execute and read and write
74D0000
trusted library section
page read and write
2C4B000
stack
page read and write
EA0000
trusted library allocation
page read and write
F31000
heap
page read and write
2D9A000
trusted library allocation
page read and write
EB3000
trusted library allocation
page read and write
56E0000
heap
page read and write
7528000
trusted library section
page read and write
5890000
trusted library section
page read and write
310E000
stack
page read and write
There are 141 hidden memdumps, click here to show them.