IOC Report
Shipping Document #100020486.exe

loading gif

Files

File Path
Type
Category
Malicious
Shipping Document #100020486.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tabulator
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Shipping Document #100020486.exe
"C:\Users\user\Desktop\Shipping Document #100020486.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Shipping Document #100020486.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r11.i.lencr.org/0
unknown
http://srv.masternic.net
unknown

Domains

Name
IP
Malicious
srv.masternic.net
174.141.234.138
malicious

IPs

IP
Domain
Country
Malicious
174.141.234.138
srv.masternic.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2908000
trusted library allocation
page read and write
malicious
3A80000
direct allocation
page read and write
malicious
742000
system
page execute and read and write
malicious
2891000
trusted library allocation
page read and write
malicious
28DE000
trusted library allocation
page read and write
malicious
CD7000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
93E000
stack
page read and write
3B47000
heap
page read and write
474E000
direct allocation
page read and write
921000
heap
page read and write
401000
unkown
page execute read
3BD0000
heap
page read and write
2670000
trusted library allocation
page read and write
46D9000
direct allocation
page read and write
933000
heap
page read and write
91B000
heap
page read and write
850000
heap
page read and write
3EE5000
heap
page read and write
C90000
trusted library allocation
page read and write
4CD0000
heap
page read and write
3E9F000
heap
page read and write
3A70000
heap
page read and write
2910000
trusted library allocation
page read and write
3EE5000
heap
page read and write
C30000
heap
page read and write
886000
heap
page read and write
28F7000
trusted library allocation
page read and write
3E9F000
heap
page read and write
3EE5000
heap
page read and write
46D9000
direct allocation
page read and write
A65000
heap
page read and write
482000
unkown
page readonly
3EE5000
heap
page read and write
286E000
stack
page read and write
5C9F000
stack
page read and write
3D2A000
heap
page read and write
45B0000
direct allocation
page read and write
2682000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
3E9F000
heap
page read and write
740000
system
page execute and read and write
46DD000
direct allocation
page read and write
3D3A000
heap
page read and write
3EE5000
heap
page read and write
46D9000
direct allocation
page read and write
3EE5000
heap
page read and write
3E9F000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
3E9F000
heap
page read and write
CC0000
trusted library allocation
page read and write
8FE000
stack
page read and write
CBD000
trusted library allocation
page execute and read and write
3D89000
heap
page read and write
3E9F000
heap
page read and write
6470000
trusted library allocation
page execute and read and write
5A90000
heap
page read and write
3E9F000
heap
page read and write
38B9000
trusted library allocation
page read and write
C1A000
heap
page read and write
3EE5000
heap
page read and write
C46000
heap
page read and write
3EE5000
heap
page read and write
3E9F000
heap
page read and write
3E9F000
heap
page read and write
C1E000
heap
page read and write
858000
heap
page read and write
3EE5000
heap
page read and write
3E9F000
heap
page read and write
282E000
stack
page read and write
3E9F000
heap
page read and write
87A000
heap
page read and write
4533000
direct allocation
page read and write
1E0000
heap
page read and write
3C79000
heap
page read and write
4DE3000
heap
page read and write
3C8B000
heap
page read and write
3D60000
heap
page read and write
A00000
heap
page read and write
8E1000
heap
page read and write
512E000
stack
page read and write
CD2000
trusted library allocation
page read and write
4DE0000
heap
page read and write
6420000
trusted library allocation
page read and write
4410000
direct allocation
page read and write
3E9F000
heap
page read and write
100000
heap
page read and write
2880000
heap
page execute and read and write
DA0000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
3E9F000
heap
page read and write
3AD0000
heap
page read and write
3EE5000
heap
page read and write
3E51000
heap
page read and write
3E9F000
heap
page read and write
3E9F000
heap
page read and write
3DA6000
heap
page read and write
2696000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
26A2000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
8AF000
stack
page read and write
4410000
direct allocation
page read and write
4410000
direct allocation
page read and write
45B0000
direct allocation
page read and write
45B0000
direct allocation
page read and write
61DE000
stack
page read and write
46D9000
direct allocation
page read and write
5CE0000
trusted library allocation
page read and write
474E000
direct allocation
page read and write
3EE5000
heap
page read and write
4533000
direct allocation
page read and write
4A7000
unkown
page read and write
C50000
heap
page read and write
9EE000
stack
page read and write
46D9000
direct allocation
page read and write
D3E000
stack
page read and write
4410000
direct allocation
page read and write
3E9F000
heap
page read and write
26F8000
trusted library allocation
page read and write
140E000
stack
page read and write
7F2B0000
trusted library allocation
page execute and read and write
86E000
heap
page read and write
3E9F000
heap
page read and write
63A000
stack
page read and write
46DD000
direct allocation
page read and write
46D9000
direct allocation
page read and write
3EE5000
heap
page read and write
2904000
trusted library allocation
page read and write
46DD000
direct allocation
page read and write
9A000
stack
page read and write
A04000
heap
page read and write
3CC6000
heap
page read and write
5BA0000
trusted library allocation
page read and write
7C5000
heap
page read and write
3EE5000
heap
page read and write
4533000
direct allocation
page read and write
50EE000
stack
page read and write
474E000
direct allocation
page read and write
6460000
heap
page read and write
3E50000
heap
page read and write
62DF000
stack
page read and write
3C68000
heap
page read and write
4256000
heap
page read and write
3EE5000
heap
page read and write
4533000
direct allocation
page read and write
CCA000
trusted library allocation
page execute and read and write
3AD1000
heap
page read and write
474E000
direct allocation
page read and write
3EE5000
heap
page read and write
5E9D000
stack
page read and write
430E000
heap
page read and write
5BA6000
trusted library allocation
page read and write
5AE0000
heap
page read and write
400000
unkown
page readonly
3E9F000
heap
page read and write
3EE5000
heap
page read and write
3EE5000
heap
page read and write
3E9F000
heap
page read and write
5BFD000
stack
page read and write
3E9F000
heap
page read and write
3EE5000
heap
page read and write
CA0000
trusted library allocation
page read and write
3E9F000
heap
page read and write
268A000
trusted library allocation
page read and write
3EE5000
heap
page read and write
27CC000
stack
page read and write
3EE5000
heap
page read and write
7B0000
heap
page read and write
401000
unkown
page execute read
46DD000
direct allocation
page read and write
3EE5000
heap
page read and write
3B66000
heap
page read and write
4FEE000
stack
page read and write
266E000
stack
page read and write
5CF0000
trusted library allocation
page read and write
3E9F000
heap
page read and write
267B000
trusted library allocation
page read and write
990000
heap
page read and write
474E000
direct allocation
page read and write
C10000
heap
page read and write
5C00000
trusted library allocation
page execute and read and write
490000
unkown
page write copy
4EEC000
stack
page read and write
3E9F000
heap
page read and write
3D8C000
heap
page read and write
4AB000
unkown
page readonly
3E9F000
heap
page read and write
267E000
trusted library allocation
page read and write
940000
heap
page read and write
4AB000
unkown
page readonly
3F1A000
heap
page read and write
C4F000
heap
page read and write
CA3000
trusted library allocation
page execute and read and write
46DD000
direct allocation
page read and write
3E9F000
heap
page read and write
3D44000
heap
page read and write
CB0000
trusted library allocation
page read and write
3EE5000
heap
page read and write
46DD000
direct allocation
page read and write
4DD8000
trusted library allocation
page read and write
3EE5000
heap
page read and write
DC0000
heap
page read and write
3E9F000
heap
page read and write
396A000
heap
page read and write
4410000
direct allocation
page read and write
89F000
stack
page read and write
970000
heap
page read and write
4DD0000
trusted library allocation
page read and write
3E9F000
heap
page read and write
D7C000
stack
page read and write
CF0000
trusted library allocation
page read and write
3D88000
heap
page execute and read and write
180F000
stack
page read and write
474E000
direct allocation
page read and write
3C3F000
heap
page read and write
3EE5000
heap
page read and write
498D000
stack
page read and write
3D89000
heap
page read and write
3EE5000
heap
page read and write
3E9F000
heap
page read and write
3EE5000
heap
page read and write
960000
heap
page read and write
3EE5000
heap
page read and write
45B0000
direct allocation
page read and write
CC6000
trusted library allocation
page execute and read and write
3D89000
heap
page read and write
26E0000
heap
page read and write
395F000
stack
page read and write
7C0000
heap
page read and write
38F9000
trusted library allocation
page read and write
3EE5000
heap
page read and write
DB0000
trusted library allocation
page read and write
4410000
direct allocation
page read and write
5B90000
trusted library allocation
page read and write
A60000
heap
page read and write
3EE5000
heap
page read and write
5BB0000
trusted library allocation
page execute and read and write
8B4000
stack
page read and write
400000
unkown
page readonly
269D000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
268E000
trusted library allocation
page read and write
3E9F000
heap
page read and write
D80000
trusted library allocation
page execute and read and write
889000
heap
page read and write
46DD000
direct allocation
page read and write
945000
heap
page read and write
539C000
trusted library allocation
page read and write
3DB6000
heap
page read and write
6450000
heap
page read and write
3EE5000
heap
page read and write
A4E000
stack
page read and write
490000
unkown
page read and write
4533000
direct allocation
page read and write
CDB000
trusted library allocation
page execute and read and write
3E9F000
heap
page read and write
474E000
direct allocation
page read and write
3E9F000
heap
page read and write
3E9F000
heap
page read and write
4533000
direct allocation
page read and write
CC2000
trusted library allocation
page read and write
4410000
direct allocation
page read and write
45B0000
direct allocation
page read and write
B20000
heap
page read and write
3EE5000
heap
page read and write
45B0000
direct allocation
page read and write
522E000
stack
page read and write
CD5000
trusted library allocation
page execute and read and write
46D9000
direct allocation
page read and write
26C0000
heap
page execute and read and write
5CDE000
stack
page read and write
5CE7000
trusted library allocation
page read and write
3EBD000
heap
page read and write
3EE5000
heap
page read and write
2691000
trusted library allocation
page read and write
3EE5000
heap
page read and write
CA4000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
2676000
trusted library allocation
page read and write
4533000
direct allocation
page read and write
738000
stack
page read and write
3E9F000
heap
page read and write
3E9F000
heap
page read and write
3E98000
heap
page read and write
3EE5000
heap
page read and write
355E000
stack
page read and write
There are 277 hidden memdumps, click here to show them.