IOC Report
BANK LETTER INDICATION.exe

loading gif

Files

File Path
Type
Category
Malicious
BANK LETTER INDICATION.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BANK LETTER INDICATION.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BANK LETTER INDICATION.exe
"C:\Users\user\Desktop\BANK LETTER INDICATION.exe"
malicious
C:\Users\user\Desktop\BANK LETTER INDICATION.exe
"C:\Users\user\Desktop\BANK LETTER INDICATION.exe"
malicious
C:\Program Files (x86)\Internet Explorer\iexplore.exe
"c:\program files (x86)\internet explorer\iexplore.exe"
malicious

URLs

Name
IP
Malicious
192.3.64.149
malicious
http://geoplugin.net/json.gp
unknown
http://geoplugin.net/json.gp/C
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7Q1GRN
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7Q1GRN
Inj
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3EF9000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3154000
heap
page read and write
ED0000
heap
page read and write
2CD0000
trusted library allocation
page read and write
2CBE000
trusted library allocation
page read and write
59FE000
stack
page read and write
2E96000
trusted library allocation
page read and write
31D0000
heap
page read and write
2CF0000
trusted library allocation
page execute and read and write
1130000
trusted library allocation
page read and write
1090000
heap
page read and write
2C5E000
stack
page read and write
1100000
trusted library allocation
page read and write
4FEB000
stack
page read and write
2D70000
heap
page read and write
2ED5000
trusted library allocation
page read and write
5380000
heap
page execute and read and write
5580000
heap
page read and write
EF7000
stack
page read and write
553E000
stack
page read and write
4C2E000
stack
page read and write
2BF7000
trusted library allocation
page execute and read and write
2E70000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
2DF0000
heap
page read and write
1231000
heap
page read and write
2F3C000
heap
page read and write
6EDF1000
unkown
page execute read
53B0000
trusted library allocation
page read and write
1132000
trusted library allocation
page read and write
7B40000
trusted library section
page read and write
2F45000
heap
page read and write
28BA000
stack
page read and write
7260000
heap
page read and write
2F28000
heap
page read and write
BD9000
stack
page read and write
2C10000
trusted library allocation
page read and write
4B2E000
stack
page read and write
6EDF0000
unkown
page readonly
10B7000
heap
page read and write
6160000
heap
page read and write
2BF2000
trusted library allocation
page read and write
1181000
heap
page read and write
2F41000
heap
page read and write
2FD0000
unclassified section
page execute and read and write
2A4F000
stack
page read and write
2C02000
system
page execute and read and write
2EE0000
heap
page execute and read and write
2F4A000
heap
page read and write
2F62000
heap
page read and write
5560000
heap
page read and write
7FDE000
stack
page read and write
133F000
stack
page read and write
5350000
trusted library allocation
page read and write
B44000
unkown
page readonly
1123000
trusted library allocation
page read and write
41F7000
trusted library allocation
page read and write
577E000
stack
page read and write
D5C000
stack
page read and write
78F0000
trusted library allocation
page execute and read and write
2CD8000
trusted library allocation
page read and write
5570000
heap
page read and write
54F0000
heap
page read and write
F40000
heap
page read and write
33D0000
heap
page read and write
4AEF000
stack
page read and write
7C9E000
stack
page read and write
33D5000
heap
page read and write
2D24000
system
page execute and read and write
1110000
trusted library allocation
page read and write
F10000
heap
page read and write
6170000
heap
page read and write
1136000
trusted library allocation
page execute and read and write
2E60000
trusted library allocation
page read and write
3160000
heap
page read and write
2E9D000
trusted library allocation
page read and write
793B000
heap
page read and write
2CC0000
trusted library allocation
page read and write
47E3000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
33BE000
stack
page read and write
2F45000
heap
page read and write
9E7E000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
1176000
heap
page read and write
2F20000
heap
page read and write
53C0000
trusted library allocation
page execute and read and write
587E000
stack
page read and write
1020000
heap
page read and write
113A000
trusted library allocation
page execute and read and write
2F6A000
trusted library allocation
page read and write
7B3E000
stack
page read and write
2D00000
heap
page read and write
114E000
heap
page read and write
2E50000
trusted library allocation
page execute and read and write
3150000
heap
page read and write
4795000
trusted library allocation
page read and write
54F3000
heap
page read and write
A20000
unkown
page readonly
7DDE000
stack
page read and write
107E000
stack
page read and write
A1A0000
trusted library section
page read and write
2C00000
system
page execute and read and write
1113000
trusted library allocation
page execute and read and write
53B2000
trusted library allocation
page read and write
4747000
trusted library allocation
page read and write
7FD10000
trusted library allocation
page execute and read and write
2F56000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
10E0000
heap
page read and write
10B0000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2F62000
heap
page read and write
2F49000
heap
page read and write
1184000
heap
page read and write
2F52000
trusted library allocation
page read and write
2F43000
heap
page read and write
7CA0000
trusted library section
page read and write
111D000
trusted library allocation
page execute and read and write
7B9E000
stack
page read and write
2BFB000
trusted library allocation
page execute and read and write
ECE000
stack
page read and write
5540000
trusted library section
page readonly
54DB000
stack
page read and write
31E0000
heap
page read and write
59BE000
stack
page read and write
30F2000
unclassified section
page execute and read and write
1030000
heap
page read and write
144E000
stack
page read and write
2A50000
heap
page read and write
1168000
heap
page read and write
1120000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
120C000
heap
page read and write
2EC0000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
615E000
stack
page read and write
2C70000
trusted library allocation
page read and write
1204000
heap
page read and write
5330000
trusted library allocation
page read and write
2F45000
heap
page read and write
2C60000
trusted library section
page read and write
3140000
heap
page read and write
2F46000
heap
page read and write
5A90000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
5575000
heap
page read and write
2E4B000
stack
page read and write
105E000
stack
page read and write
1340000
heap
page read and write
11E7000
heap
page read and write
2E0E000
stack
page read and write
10BE000
stack
page read and write
2D60000
heap
page readonly
6EE0D000
unkown
page read and write
C5C000
stack
page read and write
1148000
heap
page read and write
474000
remote allocation
page execute and read and write
6EE0F000
unkown
page readonly
1140000
heap
page read and write
5550000
heap
page read and write
112D000
trusted library allocation
page execute and read and write
58BE000
stack
page read and write
6EE06000
unkown
page readonly
7900000
heap
page read and write
2CB0000
trusted library allocation
page read and write
A22000
unkown
page readonly
2F42000
heap
page read and write
101F000
stack
page read and write
54E0000
trusted library allocation
page execute and read and write
29B9000
stack
page read and write
10E8000
heap
page read and write
DB0000
heap
page read and write
53B6000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2D50000
heap
page read and write
7A3E000
stack
page read and write
2EF1000
trusted library allocation
page read and write
53A0000
heap
page read and write
There are 172 hidden memdumps, click here to show them.