IOC Report
42.exe

loading gif

Files

File Path
Type
Category
Malicious
42.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\acceptancy
ASCII text, with very long lines (28756), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrorrheuma
data
dropped
C:\Users\user\AppData\Local\Temp\aut2C63.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut2CC2.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\42.exe
"C:\Users\user\Desktop\42.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\42.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
http://funworld.co.id
unknown
https://account.dyn.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://mail.funworld.co.id
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
funworld.co.id
180.235.148.163
malicious
mail.funworld.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
180.235.148.163
funworld.co.id
Indonesia
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
28E9000
trusted library allocation
page read and write
malicious
2871000
trusted library allocation
page read and write
malicious
28BE000
trusted library allocation
page read and write
malicious
1DB0000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2720000
heap
page execute and read and write
38DC000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
3CE0000
direct allocation
page read and write
3E0D000
direct allocation
page read and write
117F000
heap
page read and write
4D11000
trusted library allocation
page read and write
D26000
heap
page read and write
6470000
heap
page read and write
3B40000
direct allocation
page read and write
4D30000
heap
page read and write
DDB000
stack
page read and write
282E000
stack
page read and write
DA0000
trusted library allocation
page read and write
4FBC000
stack
page read and write
53E0000
trusted library allocation
page read and write
606F000
stack
page read and write
DFC000
stack
page read and write
128F000
heap
page read and write
59A000
stack
page read and write
DBF000
stack
page read and write
53F7000
trusted library allocation
page read and write
3CE0000
direct allocation
page read and write
C40000
heap
page read and write
A55000
heap
page read and write
E80000
heap
page read and write
115B000
heap
page read and write
5460000
trusted library allocation
page read and write
FD5000
unkown
page readonly
8F9000
stack
page read and write
3B40000
direct allocation
page read and write
4EA0000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
CB6000
heap
page read and write
12A0000
heap
page read and write
E00000
heap
page read and write
BA0000
heap
page read and write
61EE000
stack
page read and write
FDF000
unkown
page read and write
642E000
stack
page read and write
BF4000
trusted library allocation
page read and write
37F4000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
1DA0000
direct allocation
page execute and read and write
11AD000
heap
page read and write
D90000
trusted library allocation
page execute and read and write
5FED000
stack
page read and write
3E09000
direct allocation
page read and write
11CD000
heap
page read and write
4D22000
trusted library allocation
page read and write
12CE000
heap
page read and write
3E0D000
direct allocation
page read and write
602E000
stack
page read and write
11AD000
heap
page read and write
4EB4000
heap
page read and write
5D00000
trusted library allocation
page read and write
3E0D000
direct allocation
page read and write
3C63000
direct allocation
page read and write
12D1000
heap
page read and write
28E5000
trusted library allocation
page read and write
D0B000
heap
page read and write
5410000
trusted library allocation
page execute and read and write
5EAD000
stack
page read and write
4CFE000
trusted library allocation
page read and write
5CAE000
stack
page read and write
2830000
trusted library allocation
page read and write
3C63000
direct allocation
page read and write
4D0E000
trusted library allocation
page read and write
3E7E000
direct allocation
page read and write
4E6C000
stack
page read and write
1234000
heap
page read and write
4EA8000
trusted library allocation
page read and write
C78000
heap
page read and write
4D16000
trusted library allocation
page read and write
DC0000
heap
page read and write
2710000
trusted library allocation
page read and write
4CFB000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
117F000
heap
page read and write
3E0D000
direct allocation
page read and write
BF0000
trusted library allocation
page read and write
BC0000
heap
page read and write
FD5000
unkown
page readonly
1153000
heap
page read and write
3CE0000
direct allocation
page read and write
C1A000
trusted library allocation
page execute and read and write
62EE000
stack
page read and write
5400000
trusted library allocation
page read and write
CC3000
heap
page read and write
4EB0000
heap
page read and write
C25000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
632E000
stack
page read and write
6450000
heap
page read and write
C10000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
4E70000
heap
page execute and read and write
3C63000
direct allocation
page read and write
C5E000
heap
page read and write
12D1000
heap
page read and write
FE3000
unkown
page write copy
A1E000
stack
page read and write
1143000
heap
page read and write
5CEE000
stack
page read and write
12AE000
heap
page read and write
3E7E000
direct allocation
page read and write
DCF000
stack
page read and write
1D1F000
stack
page read and write
CD1000
heap
page read and write
7F080000
trusted library allocation
page execute and read and write
3E7E000
direct allocation
page read and write
D8E000
stack
page read and write
1152000
heap
page read and write
53F0000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
1128000
heap
page read and write
4D1D000
trusted library allocation
page read and write
118F000
heap
page read and write
28D7000
trusted library allocation
page read and write
115A000
heap
page read and write
C75000
heap
page read and write
4D02000
trusted library allocation
page read and write
400000
system
page execute and read and write
C12000
trusted library allocation
page read and write
129F000
heap
page read and write
11AD000
heap
page read and write
28FC000
trusted library allocation
page read and write
BF3000
trusted library allocation
page execute and read and write
28F1000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
1E60000
heap
page read and write
F20000
unkown
page readonly
12D1000
heap
page read and write
BE0000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page execute and read and write
124A000
heap
page read and write
ECE000
stack
page read and write
C00000
trusted library allocation
page read and write
5B94000
heap
page read and write
5B75000
heap
page read and write
2860000
heap
page read and write
11AD000
heap
page read and write
118F000
heap
page read and write
3C63000
direct allocation
page read and write
2678000
trusted library allocation
page read and write
37F0000
heap
page read and write
C6A000
heap
page read and write
11AD000
heap
page read and write
1160000
heap
page read and write
28FE000
trusted library allocation
page read and write
900000
heap
page read and write
12BC000
heap
page read and write
3871000
trusted library allocation
page read and write
FAF000
unkown
page readonly
11AD000
heap
page read and write
1120000
heap
page read and write
3B40000
direct allocation
page read and write
191E000
stack
page read and write
3C63000
direct allocation
page read and write
C48000
heap
page read and write
2900000
trusted library allocation
page read and write
FDF000
unkown
page write copy
79A000
stack
page read and write
11AD000
heap
page read and write
1160000
heap
page read and write
3E0D000
direct allocation
page read and write
3E09000
direct allocation
page read and write
1282000
heap
page read and write
5EEE000
stack
page read and write
3E0D000
direct allocation
page read and write
3CE0000
direct allocation
page read and write
3C63000
direct allocation
page read and write
5D0B000
trusted library allocation
page read and write
545D000
stack
page read and write
1160000
heap
page read and write
F10000
heap
page read and write
129F000
heap
page read and write
12D1000
heap
page read and write
128F000
heap
page read and write
FE8000
unkown
page readonly
3E7E000
direct allocation
page read and write
C2B000
trusted library allocation
page execute and read and write
28BC000
trusted library allocation
page read and write
3E7E000
direct allocation
page read and write
11AD000
heap
page read and write
D40000
trusted library allocation
page read and write
1185000
heap
page read and write
DB0000
trusted library allocation
page read and write
F21000
unkown
page execute read
C27000
trusted library allocation
page execute and read and write
12D1000
heap
page read and write
FE8000
unkown
page readonly
BFD000
trusted library allocation
page execute and read and write
B5E000
stack
page read and write
F21000
unkown
page execute read
3B40000
direct allocation
page read and write
11AE000
heap
page read and write
3E7E000
direct allocation
page read and write
3E09000
direct allocation
page read and write
5B20000
heap
page read and write
3E09000
direct allocation
page read and write
E4E000
stack
page read and write
A20000
heap
page read and write
C16000
trusted library allocation
page execute and read and write
A50000
heap
page read and write
F20000
unkown
page readonly
49AD000
stack
page read and write
3CE0000
direct allocation
page read and write
48AC000
stack
page read and write
1152000
heap
page read and write
D22000
heap
page read and write
12B0000
heap
page read and write
66D0000
heap
page read and write
3CE0000
direct allocation
page read and write
6460000
trusted library allocation
page read and write
FAF000
unkown
page readonly
D3B000
heap
page read and write
3E09000
direct allocation
page read and write
5406000
trusted library allocation
page read and write
C7E000
heap
page read and write
53EC000
trusted library allocation
page read and write
3E09000
direct allocation
page read and write
There are 217 hidden memdumps, click here to show them.