Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
shipping documents.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\boqXv.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Hezron
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\shipping documents.exe
|
"C:\Users\user\Desktop\shipping documents.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\shipping documents.exe"
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
|
||
C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
|
"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://mail.naveentour.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.naveentour.com
|
162.214.80.31
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.214.80.31
|
mail.naveentour.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
boqXv
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
32C1000
|
trusted library allocation
|
page read and write
|
||
3312000
|
trusted library allocation
|
page read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
18D0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
4512000
|
heap
|
page read and write
|
||
AF4000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4596000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page execute and read and write
|
||
65A6000
|
heap
|
page read and write
|
||
4476000
|
heap
|
page read and write
|
||
67B7000
|
trusted library allocation
|
page read and write
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
7FD50000
|
trusted library allocation
|
page execute and read and write
|
||
4476000
|
heap
|
page read and write
|
||
594C000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
1378000
|
stack
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
1487000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
4472000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
447C000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
450D000
|
heap
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
A44000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
4503000
|
heap
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
4511000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4479000
|
heap
|
page read and write
|
||
451B000
|
heap
|
page read and write
|
||
4473000
|
heap
|
page read and write
|
||
451E000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute and read and write
|
||
271C000
|
stack
|
page read and write
|
||
18F6000
|
trusted library allocation
|
page execute and read and write
|
||
691E000
|
stack
|
page read and write
|
||
B7B000
|
trusted library allocation
|
page execute and read and write
|
||
A6E000
|
heap
|
page read and write
|
||
4473000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
23B1000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
4504000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
18ED000
|
trusted library allocation
|
page execute and read and write
|
||
3F92000
|
heap
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
AF3000
|
trusted library allocation
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page execute and read and write
|
||
65B0000
|
heap
|
page read and write
|
||
3BBF000
|
heap
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
4473000
|
heap
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4472000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
67DC000
|
trusted library allocation
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
447C000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
447D000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
1902000
|
trusted library allocation
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
4478000
|
heap
|
page read and write
|
||
450C000
|
heap
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
447C000
|
heap
|
page read and write
|
||
1907000
|
trusted library allocation
|
page execute and read and write
|
||
447B000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
5803000
|
heap
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
4479000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
45A6000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
6930000
|
trusted library allocation
|
page read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
4519000
|
heap
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
451E000
|
heap
|
page read and write
|
||
4475000
|
heap
|
page read and write
|
||
4514000
|
heap
|
page read and write
|
||
450B000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
447C000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
450D000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
heap
|
page read and write
|
||
18FA000
|
trusted library allocation
|
page execute and read and write
|
||
451E000
|
heap
|
page read and write
|
||
214B000
|
trusted library allocation
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
43EC000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F68000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
45A4000
|
heap
|
page read and write
|
||
127A000
|
stack
|
page read and write
|
||
190B000
|
trusted library allocation
|
page execute and read and write
|
||
447E000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4514000
|
heap
|
page read and write
|
||
21B0000
|
trusted library allocation
|
page execute and read and write
|
||
1425000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
42E9000
|
trusted library allocation
|
page read and write
|
||
B77000
|
trusted library allocation
|
page execute and read and write
|
||
1610000
|
heap
|
page read and write
|
||
4513000
|
heap
|
page read and write
|
||
4506000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4512000
|
heap
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
1930000
|
trusted library allocation
|
page execute and read and write
|
||
4510000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
92000
|
unkown
|
page readonly
|
||
3F82000
|
heap
|
page read and write
|
||
3CAB000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
477000
|
unkown
|
page execute and write copy
|
||
3F82000
|
heap
|
page read and write
|
||
1940000
|
trusted library allocation
|
page read and write
|
||
45A8000
|
heap
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
14C9000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page execute and read and write
|
||
1670000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
447D000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
4511000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
1905000
|
trusted library allocation
|
page execute and read and write
|
||
4519000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
4476000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
317C000
|
stack
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
4BA000
|
unkown
|
page write copy
|
||
4474000
|
heap
|
page read and write
|
||
4476000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page execute and read and write
|
||
8F9000
|
stack
|
page read and write
|
||
2147000
|
trusted library allocation
|
page execute and read and write
|
||
59B0000
|
heap
|
page execute and read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
14C1000
|
heap
|
page read and write
|
||
4475000
|
heap
|
page read and write
|
||
657A000
|
heap
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
451A000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
45AD000
|
heap
|
page read and write
|
||
4517000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
18D4000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
67C0000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page execute and read and write
|
||
13B5000
|
heap
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
750000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
18F2000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
trusted library allocation
|
page execute and read and write
|
||
67E0000
|
trusted library allocation
|
page execute and read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
447F000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
B04000
|
trusted library allocation
|
page read and write
|
||
4474000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
45A5000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
45A6000
|
heap
|
page read and write
|
||
4476000
|
heap
|
page read and write
|
||
45AD000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
A4D000
|
trusted library allocation
|
page execute and read and write
|
||
3F82000
|
heap
|
page read and write
|
||
451D000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
18DD000
|
trusted library allocation
|
page execute and read and write
|
||
4511000
|
heap
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
A85000
|
heap
|
page read and write
|
||
4474000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
4519000
|
heap
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
451D000
|
heap
|
page read and write
|
||
447E000
|
heap
|
page read and write
|
||
44ED000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page execute and read and write
|
||
6E00000
|
heap
|
page read and write
|
||
4516000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
6847000
|
trusted library allocation
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
5ABC000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
18D3000
|
trusted library allocation
|
page execute and read and write
|
||
646E000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4512000
|
heap
|
page read and write
|
||
45AE000
|
heap
|
page read and write
|
||
451E000
|
heap
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
A43000
|
trusted library allocation
|
page execute and read and write
|
||
3F82000
|
heap
|
page read and write
|
||
451F000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4507000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
447D000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
45AF000
|
heap
|
page read and write
|
||
447B000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
4474000
|
heap
|
page read and write
|
||
4478000
|
heap
|
page read and write
|
||
2140000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
trusted library allocation
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
4478000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
3F82000
|
heap
|
page read and write
|
||
451D000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
9A000
|
unkown
|
page readonly
|
||
4507000
|
heap
|
page read and write
|
||
450E000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
B0D000
|
trusted library allocation
|
page execute and read and write
|
||
4000000
|
heap
|
page read and write
|
||
4503000
|
heap
|
page read and write
|
||
4508000
|
heap
|
page read and write
|
||
4514000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4475000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
4001000
|
heap
|
page read and write
|
||
447D000
|
heap
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page execute and read and write
|
||
615000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
146A000
|
heap
|
page read and write
|
||
4327000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
B54000
|
trusted library allocation
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
51C000
|
stack
|
page read and write
|
||
4000000
|
heap
|
page read and write
|
||
6576000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4515000
|
heap
|
page read and write
|
||
4471000
|
heap
|
page read and write
|
There are 408 hidden memdumps, click here to show them.