IOC Report
1Md4DEEyQN.exe

loading gif

Files

File Path
Type
Category
Malicious
1Md4DEEyQN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1Md4DEEyQN.exe
"C:\Users\user\Desktop\1Md4DEEyQN.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\1Md4DEEyQN.exe" "1Md4DEEyQN.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
0.tcp.eu.ngrok.io
malicious
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
unknown

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
3.125.223.134
malicious

IPs

IP
Domain
Country
Malicious
3.125.223.134
0.tcp.eu.ngrok.io
United States
malicious
3.125.209.94
unknown
United States
malicious
3.124.142.205
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di

Memdumps

Base Address
Regiontype
Protect
Malicious
712000
unkown
page readonly
malicious
DF6000
heap
page read and write
D1B000
heap
page read and write
DE0000
heap
page read and write
11D0000
heap
page read and write
D47000
heap
page read and write
DF1000
heap
page read and write
100A000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
D85000
heap
page read and write
D80000
heap
page read and write
5297000
heap
page read and write
1017000
trusted library allocation
page execute and read and write
F3E000
unkown
page read and write
5296000
heap
page read and write
3CC1000
trusted library allocation
page read and write
4D9C000
stack
page read and write
EEE000
stack
page read and write
5063000
heap
page read and write
5286000
heap
page read and write
B4E000
stack
page read and write
5295000
heap
page read and write
5286000
heap
page read and write
D7B000
heap
page read and write
D8D000
heap
page read and write
D6D000
heap
page read and write
4F8C000
stack
page read and write
D46000
heap
page read and write
1002000
trusted library allocation
page execute and read and write
D5B000
heap
page read and write
D5C000
heap
page read and write
D80000
heap
page read and write
102A000
trusted library allocation
page execute and read and write
AF6000
stack
page read and write
5650000
heap
page read and write
DFE000
heap
page read and write
5160000
heap
page read and write
DD7000
heap
page read and write
D7E000
heap
page read and write
5295000
heap
page read and write
710000
unkown
page readonly
C6E000
heap
page read and write
DF4000
heap
page read and write
D8C000
heap
page read and write
104B000
trusted library allocation
page execute and read and write
500C000
stack
page read and write
11B0000
heap
page read and write
528A000
heap
page read and write
5048000
stack
page read and write
BD0000
heap
page read and write
C05000
heap
page read and write
5260000
heap
page read and write
5286000
heap
page read and write
4EC0000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
B20000
heap
page read and write
B30000
heap
page read and write
2D18000
trusted library allocation
page read and write
1150000
heap
page read and write
DB1000
heap
page read and write
D75000
heap
page read and write
D4B000
heap
page read and write
C60000
heap
page read and write
5299000
heap
page read and write
D4A000
heap
page read and write
D50000
heap
page read and write
D79000
heap
page read and write
D6D000
heap
page read and write
D50000
heap
page read and write
4B5E000
stack
page read and write
D6F000
heap
page read and write
DF2000
heap
page read and write
D74000
heap
page read and write
D52000
heap
page read and write
D56000
heap
page read and write
4C10000
heap
page read and write
DD7000
heap
page read and write
D38000
heap
page read and write
DD0000
heap
page read and write
5298000
heap
page read and write
D46000
heap
page read and write
D86000
heap
page read and write
DD6000
trusted library allocation
page read and write
D7F000
heap
page read and write
D80000
heap
page read and write
5281000
heap
page read and write
4CC8000
trusted library allocation
page read and write
101A000
trusted library allocation
page execute and read and write
5060000
heap
page read and write
FFA000
trusted library allocation
page execute and read and write
C9F000
heap
page read and write
5282000
heap
page read and write
D72000
heap
page read and write
54D0000
trusted library allocation
page execute and read and write
D73000
heap
page read and write
AF9000
stack
page read and write
1047000
trusted library allocation
page execute and read and write
D0C000
heap
page read and write
BC0000
heap
page read and write
5296000
heap
page read and write
4EE0000
trusted library allocation
page read and write
D6D000
heap
page read and write
10A0000
heap
page read and write
D7D000
heap
page read and write
D73000
heap
page read and write
D86000
heap
page read and write
FF2000
trusted library allocation
page execute and read and write
5640000
heap
page read and write
D79000
heap
page read and write
D88000
heap
page read and write
4A10000
heap
page read and write
D77000
heap
page read and write
D11000
heap
page read and write
7EEB0000
trusted library allocation
page execute and read and write
4E9E000
stack
page read and write
D74000
heap
page read and write
D5C000
heap
page read and write
1040000
trusted library allocation
page read and write
5710000
heap
page read and write
D59000
heap
page read and write
1120000
heap
page read and write
50E0000
unclassified section
page read and write
7AA000
stack
page read and write
D73000
heap
page read and write
5280000
heap
page read and write
D74000
heap
page read and write
D8A000
heap
page read and write
10A6000
heap
page read and write
D6D000
heap
page read and write
DB1000
heap
page read and write
DF8000
heap
page read and write
4ED0000
trusted library allocation
page execute and read and write
E3E000
unkown
page read and write
C68000
heap
page read and write
D59000
heap
page read and write
1030000
heap
page execute and read and write
D7F000
heap
page read and write
D8A000
heap
page read and write
CD0000
heap
page read and write
71C000
unkown
page readonly
5283000
heap
page read and write
B5B000
stack
page read and write
D8F000
heap
page read and write
D7D000
heap
page read and write
D1F000
heap
page read and write
515F000
stack
page read and write
D53000
heap
page read and write
D87000
heap
page read and write
CFF000
heap
page read and write
5295000
heap
page read and write
D8A000
heap
page read and write
1156000
heap
page read and write
DFE000
heap
page read and write
D80000
heap
page read and write
D21000
heap
page read and write
D7F000
heap
page read and write
B53000
stack
page read and write
D84000
heap
page read and write
A5B000
stack
page read and write
DD0000
trusted library allocation
page read and write
DD0000
heap
page read and write
DF2000
heap
page read and write
D01000
heap
page read and write
1022000
trusted library allocation
page execute and read and write
DF0000
heap
page read and write
528D000
heap
page read and write
DFA000
heap
page read and write
D7F000
heap
page read and write
D56000
heap
page read and write
D47000
heap
page read and write
D59000
heap
page read and write
D58000
heap
page read and write
D49000
heap
page read and write
11AF000
stack
page read and write
DD3000
heap
page read and write
DB0000
heap
page read and write
5298000
heap
page read and write
4FCB000
stack
page read and write
108E000
stack
page read and write
F7D000
stack
page read and write
D48000
heap
page read and write
DB0000
heap
page read and write
D35000
heap
page read and write
D53000
heap
page read and write
B10000
heap
page read and write
D14000
heap
page read and write
D85000
heap
page read and write
107E000
stack
page read and write
5286000
heap
page read and write
B35000
heap
page read and write
DFE000
heap
page read and write
2CC1000
trusted library allocation
page read and write
D82000
heap
page read and write
D70000
heap
page read and write
C4E000
stack
page read and write
D21000
heap
page read and write
1000000
trusted library allocation
page read and write
B5E000
stack
page read and write
C00000
heap
page read and write
DF8000
heap
page read and write
D47000
heap
page read and write
5261000
heap
page read and write
5287000
heap
page read and write
D80000
heap
page read and write
D0B000
heap
page read and write
5287000
heap
page read and write
D5C000
heap
page read and write
DF4000
heap
page read and write
BE0000
heap
page read and write
D4A000
heap
page read and write
D47000
heap
page read and write
D8B000
heap
page read and write
1042000
trusted library allocation
page read and write
50D0000
trusted library allocation
page execute and read and write
D21000
heap
page read and write
D59000
heap
page read and write
5295000
heap
page read and write
DF0000
heap
page read and write
There are 208 hidden memdumps, click here to show them.