IOC Report
Mcx2Xk0fqn.exe

loading gif

Files

File Path
Type
Category
Malicious
Mcx2Xk0fqn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Mcx2Xk0fqn.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Mcx2Xk0fqn.exe
"C:\Users\user\Desktop\Mcx2Xk0fqn.exe"
malicious
C:\Users\user\Desktop\Mcx2Xk0fqn.exe
"C:\Users\user\Desktop\Mcx2Xk0fqn.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://89.34.237.212/annonymous/fre.php
89.34.237.212
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://89.34.237.212/annonymous/fre.phpzpf
unknown
http://www.ibsensoftware.com/
unknown

IPs

IP
Domain
Country
Malicious
89.34.237.212
unknown
Romania
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3AB1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1248000
heap
page read and write
malicious
3B9B000
trusted library allocation
page read and write
malicious
3B2C000
trusted library allocation
page read and write
malicious
2AB1000
trusted library allocation
page read and write
malicious
4D40000
trusted library section
page read and write
malicious
5FAD000
stack
page read and write
4B8E000
stack
page read and write
AA0000
trusted library allocation
page read and write
1190000
heap
page read and write
52C000
stack
page read and write
316C000
stack
page read and write
E1F000
stack
page read and write
EC0000
heap
page execute and read and write
60B0000
trusted library allocation
page execute and read and write
A0E000
stack
page read and write
103C000
stack
page read and write
A40000
heap
page read and write
A45000
heap
page read and write
E90000
heap
page read and write
D1F000
stack
page read and write
1150000
heap
page read and write
326E000
stack
page read and write
AE0000
heap
page read and write
150E000
stack
page read and write
EB0000
trusted library section
page read and write
442000
unkown
page readonly
E5E000
stack
page read and write
122E000
stack
page read and write
B7B000
heap
page read and write
AA2000
trusted library allocation
page execute and read and write
B2E000
heap
page read and write
E70000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
B8F000
heap
page read and write
4B3E000
stack
page read and write
11DE000
stack
page read and write
A75000
trusted library allocation
page execute and read and write
1155000
heap
page read and write
A80000
heap
page read and write
4C8F000
stack
page read and write
5EE000
stack
page read and write
4AEE000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
126E000
heap
page read and write
E60000
trusted library allocation
page read and write
160E000
stack
page read and write
2CF3000
trusted library allocation
page read and write
B9E000
heap
page read and write
ABB000
trusted library allocation
page execute and read and write
AB7000
trusted library allocation
page execute and read and write
328F000
heap
page read and write
60AF000
stack
page read and write
590000
heap
page read and write
400000
unkown
page readonly
8F6000
stack
page read and write
BA5000
heap
page read and write
AF0000
heap
page read and write
11E0000
heap
page read and write
B48000
heap
page read and write
5D90000
trusted library allocation
page read and write
2DB0000
heap
page read and write
4D76000
trusted library section
page read and write
12AC000
heap
page read and write
A9A000
trusted library allocation
page execute and read and write
49F000
remote allocation
page execute and read and write
A62000
trusted library allocation
page execute and read and write
A70000
trusted library allocation
page read and write
5A0000
heap
page read and write
3AD0000
trusted library allocation
page read and write
49C000
unkown
page readonly
A72000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
2DC0000
heap
page read and write
113B000
stack
page read and write
3BD4000
trusted library allocation
page read and write
B5E000
heap
page read and write
A97000
trusted library allocation
page execute and read and write
276F000
stack
page read and write
402000
unkown
page readonly
B28000
heap
page read and write
E80000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
There are 74 hidden memdumps, click here to show them.