IOC Report
BOQ Inquiry.exe

loading gif

Files

File Path
Type
Category
Malicious
BOQ Inquiry.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Graff
data
dropped
C:\Users\user\AppData\Local\Temp\Grinnellia
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autCEA3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCEF3.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BOQ Inquiry.exe
"C:\Users\user\Desktop\BOQ Inquiry.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\BOQ Inquiry.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E40000
direct allocation
page read and write
malicious
620000
system
page execute and read and write
malicious
690000
heap
page read and write
1418000
heap
page read and write
813000
heap
page read and write
3100000
direct allocation
page execute and read and write
813000
heap
page read and write
3DBD000
direct allocation
page read and write
128E000
stack
page read and write
A60000
heap
page read and write
156B000
heap
page read and write
3E2E000
direct allocation
page read and write
E5C000
unkown
page write copy
CF0000
direct allocation
page execute and read and write
C3E000
stack
page read and write
3C90000
direct allocation
page read and write
3C13000
direct allocation
page read and write
813000
heap
page read and write
E90000
direct allocation
page read and write
3029000
heap
page read and write
3AF0000
direct allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
BBD000
stack
page read and write
3AD000
stack
page read and write
3E2E000
direct allocation
page read and write
802000
heap
page read and write
3C90000
direct allocation
page read and write
3C90000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
7FA000
stack
page read and write
E64000
unkown
page readonly
D23000
heap
page read and write
E52000
unkown
page readonly
15C8000
heap
page read and write
153C000
heap
page read and write
3C13000
direct allocation
page read and write
3DB9000
direct allocation
page read and write
3E2E000
direct allocation
page read and write
329E000
direct allocation
page execute and read and write
1595000
heap
page read and write
3DBD000
direct allocation
page read and write
813000
heap
page read and write
CD0000
heap
page read and write
3C90000
direct allocation
page read and write
7A0000
heap
page read and write
E90000
direct allocation
page read and write
302D000
heap
page read and write
3229000
direct allocation
page execute and read and write
E90000
direct allocation
page read and write
813000
heap
page read and write
D30000
direct allocation
page read and write
129E000
stack
page read and write
15AB000
heap
page read and write
3E2E000
direct allocation
page read and write
1442000
heap
page read and write
14B8000
heap
page read and write
1530000
heap
page read and write
813000
heap
page read and write
E3F000
stack
page read and write
14B9000
heap
page read and write
E90000
direct allocation
page read and write
BD0000
heap
page read and write
3DB9000
direct allocation
page read and write
813000
heap
page read and write
15CC000
heap
page read and write
C00000
heap
page read and write
A00000
heap
page read and write
3DB9000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
3DB9000
direct allocation
page read and write
3DBD000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
A17000
heap
page read and write
813000
heap
page read and write
3C13000
direct allocation
page read and write
3DB9000
direct allocation
page read and write
15CC000
heap
page read and write
3DBD000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
A05000
heap
page read and write
813000
heap
page read and write
14D8000
heap
page read and write
2F00000
heap
page read and write
800000
heap
page read and write
813000
heap
page read and write
3601000
heap
page read and write
E90000
direct allocation
page read and write
15B9000
heap
page read and write
813000
heap
page read and write
A12000
heap
page read and write
3C90000
direct allocation
page read and write
7B0000
direct allocation
page read and write
C44000
heap
page read and write
813000
heap
page read and write
3DBD000
direct allocation
page read and write
813000
heap
page read and write
3AF0000
direct allocation
page read and write
3E2E000
direct allocation
page read and write
3C90000
direct allocation
page read and write
E2C000
unkown
page readonly
12BF000
stack
page read and write
813000
heap
page read and write
159B000
heap
page read and write
813000
heap
page read and write
12CF000
stack
page read and write
6C0000
heap
page read and write
15BB000
heap
page read and write
14A9000
heap
page read and write
D20000
heap
page read and write
15AA000
heap
page read and write
813000
heap
page read and write
E90000
direct allocation
page read and write
E60000
unkown
page write copy
813000
heap
page read and write
14B8000
heap
page read and write
1443000
heap
page read and write
3DBD000
direct allocation
page read and write
E2C000
unkown
page readonly
1C0F000
stack
page read and write
B7E000
stack
page read and write
309E000
heap
page read and write
3EC000
stack
page read and write
15AB000
heap
page read and write
813000
heap
page read and write
15BB000
heap
page read and write
200E000
stack
page read and write
C40000
heap
page read and write
813000
heap
page read and write
322D000
direct allocation
page execute and read and write
670000
heap
page read and write
158A000
heap
page read and write
3C13000
direct allocation
page read and write
A05000
heap
page read and write
1550000
heap
page read and write
33D1000
direct allocation
page execute and read and write
E64000
unkown
page readonly
3DBD000
direct allocation
page read and write
1410000
heap
page read and write
14B8000
heap
page read and write
158A000
heap
page read and write
158C000
heap
page read and write
813000
heap
page read and write
159D000
heap
page read and write
3442000
direct allocation
page execute and read and write
D3E000
stack
page read and write
813000
heap
page read and write
3E2E000
direct allocation
page read and write
3C13000
direct allocation
page read and write
D90000
unkown
page readonly
158D000
heap
page read and write
BC0000
heap
page read and write
D91000
unkown
page execute read
33CD000
direct allocation
page execute and read and write
813000
heap
page read and write
3C13000
direct allocation
page read and write
813000
heap
page read and write
3DB9000
direct allocation
page read and write
D90000
unkown
page readonly
3C90000
direct allocation
page read and write
1449000
heap
page read and write
D91000
unkown
page execute read
3DB9000
direct allocation
page read and write
1446000
heap
page read and write
7EE000
stack
page read and write
A17000
heap
page read and write
E5C000
unkown
page read and write
3E2E000
direct allocation
page read and write
1449000
heap
page read and write
813000
heap
page read and write
B01000
heap
page read and write
E52000
unkown
page readonly
813000
heap
page read and write
813000
heap
page read and write
3AF0000
direct allocation
page read and write
3C13000
direct allocation
page read and write
15C8000
heap
page read and write
12AB000
stack
page read and write
14B8000
heap
page read and write
There are 169 hidden memdumps, click here to show them.