Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
shipping documents.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nonplacental
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\shipping documents.exe
|
"C:\Users\user\Desktop\shipping documents.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\shipping documents.exe"
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://mail.naveentour.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.naveentour.com
|
162.214.80.31
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.214.80.31
|
mail.naveentour.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
boqXv
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
30E2000
|
trusted library allocation
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2FE0000
|
direct allocation
|
page read and write
|
||
30EA000
|
trusted library allocation
|
page read and write
|
||
3F36000
|
heap
|
page read and write
|
||
6CD0000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
43CC000
|
heap
|
page read and write
|
||
3F6F000
|
heap
|
page read and write
|
||
3ED0000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
3EC6000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
53EF000
|
stack
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
65D7000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
146D000
|
trusted library allocation
|
page execute and read and write
|
||
143F000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
1330000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
3E86000
|
heap
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
trusted library allocation
|
page execute and read and write
|
||
10E7000
|
trusted library allocation
|
page execute and read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
unkown
|
page execute and read and write
|
||
3F40000
|
heap
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
656C000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
12D4000
|
trusted library allocation
|
page read and write
|
||
2FEC000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
5546000
|
trusted library allocation
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute and read and write
|
||
53E0000
|
trusted library allocation
|
page execute and read and write
|
||
1098000
|
heap
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
1030000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
3E82000
|
heap
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
3F4C000
|
heap
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
1330000
|
trusted library allocation
|
page execute and read and write
|
||
6547000
|
trusted library allocation
|
page read and write
|
||
3F38000
|
heap
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
4F6C000
|
stack
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
2BC0000
|
heap
|
page execute and read and write
|
||
51CE000
|
stack
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
65CD000
|
stack
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
D99000
|
stack
|
page read and write
|
||
55B0000
|
heap
|
page execute and read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
6560000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
heap
|
page read and write
|
||
104E000
|
heap
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page execute and read and write
|
||
11E8000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
666F000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
10EB000
|
trusted library allocation
|
page execute and read and write
|
||
55AE000
|
stack
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page execute and read and write
|
||
518E000
|
stack
|
page read and write
|
||
3F6C000
|
heap
|
page read and write
|
||
3DDC000
|
heap
|
page read and write
|
||
477000
|
unkown
|
page execute and write copy
|
||
3BEF000
|
stack
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
2E42000
|
trusted library allocation
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
3E38000
|
heap
|
page read and write
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
3EB7000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
5526000
|
trusted library allocation
|
page read and write
|
||
4BA000
|
unkown
|
page read and write
|
||
3DE6000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
571F000
|
stack
|
page read and write
|
||
DC9000
|
stack
|
page read and write
|
||
3F6D000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
50CC000
|
stack
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
1486000
|
trusted library allocation
|
page execute and read and write
|
||
94E000
|
stack
|
page read and write
|
||
2E47000
|
trusted library allocation
|
page execute and read and write
|
||
1453000
|
trusted library allocation
|
page execute and read and write
|
||
D00000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
3F6F000
|
heap
|
page read and write
|
||
552E000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
3EC7000
|
heap
|
page execute and read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
55FC000
|
stack
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
D96000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
trusted library allocation
|
page execute and read and write
|
||
4DCD000
|
stack
|
page read and write
|
||
3F66000
|
heap
|
page read and write
|
||
148A000
|
trusted library allocation
|
page execute and read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
3F6F000
|
heap
|
page read and write
|
||
42FB000
|
heap
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
66AE000
|
stack
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
3C8D000
|
heap
|
page read and write
|
||
3E85000
|
heap
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page execute and read and write
|
||
1065000
|
heap
|
page read and write
|
||
145D000
|
trusted library allocation
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
12CC000
|
stack
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
2E45000
|
trusted library allocation
|
page execute and read and write
|
||
2FE8000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
40B9000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
128C000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
97E000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
8D0000
|
unkown
|
page readonly
|
||
110000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
3EF0000
|
heap
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
4B8000
|
unkown
|
page execute and write copy
|
||
EC5000
|
heap
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
6CF0000
|
heap
|
page read and write
|
||
3BF1000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
153F000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
96C000
|
stack
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
55EE000
|
stack
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
1482000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
1454000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
heap
|
page read and write
|
||
3ED0000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
8DA000
|
unkown
|
page readonly
|
||
2EE0000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
6570000
|
trusted library allocation
|
page execute and read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page execute and read and write
|
||
3E71000
|
heap
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
5653000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
stack
|
page read and write
|
||
585C000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
3FE5000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
3F31000
|
trusted library allocation
|
page read and write
|
||
12CD000
|
trusted library allocation
|
page execute and read and write
|
||
C9C000
|
stack
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
3E76000
|
heap
|
page read and write
|
||
3FE4000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
30A4000
|
heap
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
3E81000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page execute and read and write
|
||
5650000
|
heap
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page execute and read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
trusted library allocation
|
page execute and read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
3ECB000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4BA000
|
unkown
|
page write copy
|
||
54AE000
|
stack
|
page read and write
|
||
1053000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page execute and read and write
|
||
1320000
|
trusted library allocation
|
page execute and read and write
|
||
12C4000
|
trusted library allocation
|
page read and write
|
||
3F5E000
|
heap
|
page read and write
|
||
3DEA000
|
heap
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
3C6E000
|
heap
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
5610000
|
heap
|
page execute and read and write
|
||
1038000
|
heap
|
page read and write
|
||
40FB000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
5ADD000
|
stack
|
page read and write
|
There are 339 hidden memdumps, click here to show them.