IOC Report
741094845300.exe

loading gif

Files

File Path
Type
Category
Malicious
741094845300.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\741094845300.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\741094845300.exe
"C:\Users\user\Desktop\741094845300.exe"
malicious
C:\Users\user\Desktop\741094845300.exe
C:\Users\user\Desktop\741094845300.exe
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7468 -s 12

URLs

Name
IP
Malicious
http://localhost/arkanoid_server/requests.php
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org/xml/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
13C38000
trusted library allocation
page read and write
malicious
3C31000
trusted library allocation
page read and write
8B2000
unkown
page readonly
7FFB1E3A0000
unkown
page readonly
1C730000
heap
page execute and read and write
8B0000
unkown
page readonly
7FFAAC402000
trusted library allocation
page read and write
1B30000
trusted library allocation
page read and write
1EAF0000
heap
page read and write
114B000
heap
page read and write
7FFAAC4B6000
trusted library allocation
page read and write
1B10000
heap
page read and write
1D16D000
stack
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
7FFAAC42D000
trusted library allocation
page execute and read and write
1204000
heap
page read and write
16AE000
stack
page read and write
1219000
heap
page read and write
1CD60000
heap
page read and write
1C6F0000
trusted library section
page read and write
7FC000
stack
page read and write
7FFAAC410000
trusted library allocation
page read and write
1CBCD000
stack
page read and write
7FFAAC5A9000
trusted library allocation
page read and write
7FFAAC42B000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
1C3AB000
stack
page read and write
36F9000
heap
page read and write
1AAE000
stack
page read and write
1E5F0000
trusted library section
page read and write
1220000
heap
page read and write
1D384000
heap
page read and write
7FF45C840000
trusted library allocation
page execute and read and write
7FFAAC412000
trusted library allocation
page read and write
1C7C0000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
1CD20000
heap
page read and write
1B40000
heap
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
7FFAAC41D000
trusted library allocation
page execute and read and write
1CD25000
heap
page read and write
1164000
heap
page read and write
1C7B0000
trusted library section
page readonly
1543A000
trusted library allocation
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
3CA5000
trusted library allocation
page read and write
1198000
heap
page read and write
3800000
heap
page read and write
3E04000
trusted library allocation
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
1151000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
7FFB1E3A1000
unkown
page execute read
7FFAAC5D2000
trusted library allocation
page read and write
120C000
heap
page read and write
1F63E000
stack
page read and write
1211000
heap
page read and write
7FFAAC4C0000
trusted library allocation
page execute and read and write
1161000
heap
page read and write
7FFAAC45C000
trusted library allocation
page execute and read and write
7FFAAC404000
trusted library allocation
page read and write
1D170000
heap
page read and write
4004000
trusted library allocation
page read and write
3820000
heap
page execute and read and write
7FFB1E3C5000
unkown
page readonly
118E000
heap
page read and write
118C000
heap
page read and write
10D0000
heap
page read and write
1D370000
heap
page read and write
1280000
trusted library allocation
page read and write
7FFAAC400000
trusted library allocation
page read and write
7FFAAC40D000
trusted library allocation
page execute and read and write
3C2F000
stack
page read and write
1F4F000
stack
page read and write
1E4F0000
heap
page read and write
13C31000
trusted library allocation
page read and write
1EA5E000
stack
page read and write
14524000
trusted library allocation
page read and write
7FFAAC403000
trusted library allocation
page execute and read and write
1B45000
heap
page read and write
1BC60000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
1C7C3000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
1AF0000
heap
page read and write
7FFB1E3C2000
unkown
page readonly
10F0000
heap
page read and write
7FFAAC4E6000
trusted library allocation
page execute and read and write
7FFAAC5D0000
trusted library allocation
page read and write
12A0000
heap
page read and write
1260000
trusted library allocation
page read and write
FF3000
stack
page read and write
1EBC8000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page execute and read and write
12A5000
heap
page read and write
1120000
heap
page read and write
1CCC0000
trusted library section
page read and write
7FFAAC4BC000
trusted library allocation
page execute and read and write
7FFAAC420000
trusted library allocation
page read and write
1F23F000
stack
page read and write
There are 90 hidden memdumps, click here to show them.