IOC Report
z25RFQ945894-PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
z25RFQ945894-PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autA113.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\quinquenniad
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z25RFQ945894-PDF.exe
"C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
malicious

URLs

Name
IP
Malicious
http://mail.zqamcx.com
unknown
malicious
http://zqamcx.com
unknown
malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82
malicious
mail.zqamcx.com
unknown
malicious
15.164.165.52.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
32DE000
trusted library allocation
page read and write
malicious
3308000
trusted library allocation
page read and write
malicious
1160000
direct allocation
page read and write
malicious
3291000
trusted library allocation
page read and write
malicious
3C70000
direct allocation
page read and write
3BF3000
direct allocation
page read and write
3D99000
direct allocation
page read and write
11F9000
heap
page read and write
18EC000
stack
page read and write
5D50000
trusted library allocation
page read and write
123C000
heap
page execute and read and write
221000
unkown
page execute read
3D9D000
direct allocation
page read and write
5D4C000
trusted library allocation
page read and write
13E5000
heap
page read and write
1355000
heap
page read and write
11E2000
heap
page read and write
1370000
heap
page read and write
135F000
heap
page read and write
3694000
heap
page read and write
1406000
heap
page read and write
123D000
heap
page read and write
FFC000
stack
page read and write
13AC000
heap
page read and write
6795000
heap
page read and write
3D9D000
direct allocation
page read and write
2D4000
unkown
page readonly
1214000
heap
page read and write
3C70000
direct allocation
page read and write
1308000
heap
page read and write
FCF000
stack
page read and write
5D60000
trusted library allocation
page read and write
57D0000
heap
page read and write
141F000
heap
page read and write
12C2000
heap
page read and write
145E000
heap
page read and write
1454000
heap
page read and write
3310000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
1214000
heap
page read and write
3D99000
direct allocation
page read and write
1722000
trusted library allocation
page read and write
400000
system
page execute and read and write
145F000
heap
page read and write
1DBE000
stack
page read and write
9DE000
stack
page read and write
2E7000
unkown
page readonly
13BD000
heap
page read and write
1340000
heap
page read and write
16C0000
heap
page read and write
57AC000
stack
page read and write
3304000
trusted library allocation
page read and write
1497000
heap
page read and write
1219000
heap
page read and write
31E0000
trusted library allocation
page read and write
3BF3000
direct allocation
page read and write
5D66000
trusted library allocation
page read and write
123D000
heap
page read and write
1426000
heap
page read and write
1214000
heap
page read and write
13F9000
heap
page read and write
642F000
stack
page read and write
3AD0000
direct allocation
page read and write
3D99000
direct allocation
page read and write
3BF3000
direct allocation
page read and write
3240000
heap
page read and write
1487000
heap
page read and write
6720000
trusted library allocation
page read and write
3E0E000
direct allocation
page read and write
1406000
heap
page read and write
6670000
trusted library allocation
page execute and read and write
1454000
heap
page read and write
1394000
heap
page read and write
5B4E000
stack
page read and write
13D4000
heap
page read and write
1242000
heap
page read and write
3221000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
14D7000
heap
page read and write
134F000
heap
page read and write
542D000
stack
page read and write
3D9D000
direct allocation
page read and write
14C0000
heap
page read and write
1430000
heap
page read and write
16F0000
trusted library allocation
page read and write
1840000
trusted library allocation
page read and write
3280000
heap
page read and write
12F9000
stack
page read and write
2DE000
unkown
page write copy
322D000
trusted library allocation
page read and write
147F000
heap
page read and write
137B000
heap
page read and write
18AE000
stack
page read and write
1703000
trusted library allocation
page execute and read and write
1845000
trusted library allocation
page execute and read and write
7FDE0000
trusted library allocation
page execute and read and write
1383000
heap
page read and write
11C8000
heap
page read and write
670F000
stack
page read and write
5D18000
trusted library allocation
page read and write
3AD0000
direct allocation
page read and write
11F1000
heap
page read and write
184B000
trusted library allocation
page execute and read and write
6717000
trusted library allocation
page read and write
13D4000
heap
page read and write
133C000
heap
page read and write
1301000
heap
page read and write
3BF3000
direct allocation
page read and write
1262000
heap
page read and write
4291000
trusted library allocation
page read and write
31F0000
heap
page execute and read and write
1441000
heap
page read and write
221000
unkown
page execute read
3200000
trusted library allocation
page read and write
3D9D000
direct allocation
page read and write
990000
heap
page read and write
1430000
heap
page read and write
139D000
heap
page read and write
12D1000
heap
page read and write
1498000
heap
page read and write
59CC000
stack
page read and write
3E0E000
direct allocation
page read and write
1454000
heap
page read and write
134E000
heap
page read and write
FDB000
stack
page read and write
1476000
heap
page read and write
1343000
heap
page read and write
13B4000
heap
page read and write
170D000
trusted library allocation
page execute and read and write
18F0000
trusted library allocation
page execute and read and write
42B9000
trusted library allocation
page read and write
13DF000
heap
page read and write
31D0000
trusted library allocation
page read and write
3AD0000
direct allocation
page read and write
32F7000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
FBA000
stack
page read and write
13FB000
heap
page read and write
6710000
trusted library allocation
page read and write
1355000
heap
page read and write
320B000
trusted library allocation
page read and write
12BE000
heap
page read and write
1243000
heap
page read and write
1860000
trusted library allocation
page read and write
1428000
heap
page read and write
14AE000
heap
page read and write
1467000
heap
page read and write
3AD0000
direct allocation
page read and write
1394000
heap
page read and write
1150000
heap
page read and write
140E000
heap
page read and write
122C000
heap
page read and write
14C0000
heap
page read and write
7210000
heap
page read and write
6D6E000
stack
page read and write
1730000
heap
page read and write
122C000
heap
page read and write
148E000
heap
page read and write
2AF000
unkown
page readonly
11F1000
heap
page read and write
9E0000
heap
page read and write
2D4000
unkown
page readonly
1704000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
1330000
heap
page read and write
3E0E000
direct allocation
page read and write
666E000
stack
page read and write
12E1000
heap
page read and write
3C70000
direct allocation
page read and write
3690000
heap
page read and write
144A000
heap
page read and write
2AF000
unkown
page readonly
11C0000
heap
page read and write
147C000
heap
page read and write
1417000
heap
page read and write
5C8E000
stack
page read and write
5C4E000
stack
page read and write
144A000
heap
page read and write
1120000
heap
page read and write
3243000
heap
page read and write
3212000
trusted library allocation
page read and write
1407000
heap
page read and write
137A000
heap
page read and write
3BF3000
direct allocation
page read and write
2E7000
unkown
page readonly
320E000
trusted library allocation
page read and write
1320000
heap
page read and write
1242000
heap
page read and write
5A0E000
stack
page read and write
13F0000
heap
page read and write
1425000
heap
page read and write
3D9D000
direct allocation
page read and write
31B0000
trusted library allocation
page read and write
5B0F000
stack
page read and write
5D10000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
1370000
heap
page read and write
146E000
heap
page read and write
5D70000
trusted library allocation
page execute and read and write
1726000
trusted library allocation
page execute and read and write
3C70000
direct allocation
page read and write
1241000
heap
page read and write
3E0E000
direct allocation
page read and write
1847000
trusted library allocation
page execute and read and write
13AC000
heap
page read and write
1242000
heap
page read and write
19BE000
stack
page read and write
140E000
heap
page read and write
3D99000
direct allocation
page read and write
122C000
heap
page read and write
2E2000
unkown
page write copy
11F1000
heap
page read and write
5D40000
trusted library allocation
page read and write
6A6D000
stack
page read and write
148E000
heap
page read and write
1496000
heap
page read and write
141A000
heap
page read and write
121C000
heap
page read and write
3E0E000
direct allocation
page read and write
3D99000
direct allocation
page read and write
1496000
heap
page read and write
2DE000
unkown
page read and write
220000
unkown
page readonly
1345000
heap
page read and write
11F2000
heap
page read and write
14C2000
heap
page read and write
1439000
heap
page read and write
3D99000
direct allocation
page read and write
1311000
heap
page read and write
1710000
trusted library allocation
page read and write
3E0E000
direct allocation
page read and write
220000
unkown
page readonly
1366000
heap
page read and write
3AD0000
direct allocation
page read and write
6730000
heap
page read and write
1394000
heap
page read and write
3AD0000
direct allocation
page read and write
3D9D000
direct allocation
page read and write
321A000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
172A000
trusted library allocation
page execute and read and write
1406000
heap
page read and write
1476000
heap
page read and write
144A000
heap
page read and write
1430000
heap
page read and write
6FC0000
heap
page read and write
1842000
trusted library allocation
page read and write
123A000
heap
page read and write
6E6E000
stack
page read and write
12C2000
heap
page read and write
1700000
trusted library allocation
page read and write
1454000
heap
page read and write
1204000
heap
page read and write
11F9000
heap
page read and write
98E000
stack
page read and write
11FD000
heap
page read and write
940000
heap
page read and write
11FD000
heap
page read and write
138A000
heap
page read and write
686D000
stack
page read and write
FBF000
stack
page read and write
13DE000
heap
page read and write
3BF3000
direct allocation
page read and write
120C000
heap
page read and write
13D5000
heap
page read and write
57C0000
heap
page execute and read and write
1900000
heap
page read and write
3C70000
direct allocation
page read and write
8DA000
stack
page read and write
31AF000
stack
page read and write
11FD000
heap
page read and write
42FC000
trusted library allocation
page read and write
13F8000
heap
page read and write
321E000
trusted library allocation
page read and write
131E000
heap
page read and write
3C70000
direct allocation
page read and write
12D0000
heap
page read and write
1406000
heap
page read and write
122C000
heap
page read and write
1467000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
1720000
trusted library allocation
page read and write
13E5000
heap
page read and write
144A000
heap
page read and write
133C000
heap
page read and write
There are 276 hidden memdumps, click here to show them.