IOC Report
z1quote93039-pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
z1quote93039-pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Lymnaeidae
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z1quote93039-pdf.exe
"C:\Users\user\Desktop\z1quote93039-pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\z1quote93039-pdf.exe"
malicious

URLs

Name
IP
Malicious
http://mail.zqamcx.com
unknown
malicious
http://zqamcx.com
unknown
malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82
malicious
mail.zqamcx.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB1000
trusted library allocation
page read and write
malicious
2D28000
trusted library allocation
page read and write
malicious
2CFE000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
46FD000
direct allocation
page read and write
3844000
heap
page read and write
41BD000
heap
page read and write
4AB000
unkown
page readonly
F46000
heap
page read and write
41BD000
heap
page read and write
3843000
heap
page read and write
41BD000
heap
page read and write
3841000
heap
page read and write
51A6000
trusted library allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
3848000
heap
page read and write
384D000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
44F6000
heap
page read and write
384D000
heap
page read and write
46F9000
direct allocation
page read and write
384C000
heap
page read and write
3841000
heap
page read and write
2A60000
trusted library allocation
page read and write
6220000
heap
page read and write
44FA000
heap
page read and write
41B5000
heap
page read and write
4553000
direct allocation
page read and write
41BD000
heap
page read and write
2CFC000
trusted library allocation
page read and write
51D2000
trusted library allocation
page read and write
4169000
heap
page read and write
384F000
heap
page read and write
41BC000
heap
page read and write
41BD000
heap
page read and write
3841000
heap
page read and write
41BD000
heap
page read and write
2A9A000
trusted library allocation
page execute and read and write
44FA000
heap
page read and write
DF0000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
384E000
heap
page read and write
4430000
direct allocation
page read and write
41BD000
heap
page read and write
4553000
direct allocation
page read and write
44F3000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
60F0000
trusted library allocation
page execute and read and write
EEB000
heap
page read and write
EDA000
heap
page read and write
44FE000
heap
page read and write
44FF000
heap
page read and write
41BD000
heap
page read and write
384D000
heap
page read and write
41BD000
heap
page read and write
2A74000
trusted library allocation
page read and write
51BA000
trusted library allocation
page read and write
41AD000
heap
page read and write
41BD000
heap
page read and write
6261000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
476E000
direct allocation
page read and write
384F000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2B0E000
stack
page read and write
41BD000
heap
page read and write
4438000
heap
page read and write
41BD000
heap
page read and write
3846000
heap
page read and write
2AA2000
trusted library allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
2C6E000
stack
page read and write
490000
unkown
page write copy
41BD000
heap
page read and write
52EC000
trusted library allocation
page read and write
41BD000
heap
page read and write
3841000
heap
page read and write
44F8000
heap
page read and write
44F5000
heap
page read and write
41BD000
heap
page read and write
476E000
direct allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
4430000
direct allocation
page read and write
3844000
heap
page read and write
384C000
heap
page read and write
3845000
heap
page read and write
51BE000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
41BD000
heap
page read and write
525C000
stack
page read and write
44FD000
heap
page read and write
41BD000
heap
page read and write
6289000
heap
page read and write
6A90000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
52E0000
trusted library allocation
page read and write
384F000
heap
page read and write
51A4000
trusted library allocation
page read and write
4148000
heap
page read and write
44FF000
heap
page read and write
44FA000
heap
page read and write
41BD000
heap
page read and write
EB0000
heap
page read and write
41BD000
heap
page read and write
3842000
heap
page read and write
41BD000
heap
page read and write
51AB000
trusted library allocation
page read and write
4138000
heap
page read and write
41B5000
heap
page read and write
3CD9000
trusted library allocation
page read and write
3847000
heap
page read and write
41BD000
heap
page read and write
4553000
direct allocation
page read and write
44F2000
heap
page read and write
60E0000
trusted library allocation
page read and write
41BD000
heap
page read and write
384D000
heap
page read and write
2A8D000
trusted library allocation
page execute and read and write
2CA0000
heap
page read and write
3CB1000
trusted library allocation
page read and write
41BD000
heap
page read and write
476E000
direct allocation
page read and write
41B4000
heap
page read and write
384D000
heap
page read and write
55FE000
stack
page read and write
3840000
heap
page read and write
384D000
heap
page read and write
2A7D000
trusted library allocation
page execute and read and write
58A0000
trusted library allocation
page read and write
44FF000
heap
page read and write
6AA0000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
4430000
direct allocation
page read and write
384A000
heap
page read and write
691F000
stack
page read and write
44F0000
heap
page read and write
3845000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
44F6000
heap
page read and write
52F0000
heap
page read and write
3845000
heap
page read and write
52F3000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
3843000
heap
page read and write
41BD000
heap
page read and write
384F000
heap
page read and write
51B2000
trusted library allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
587F000
stack
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
44FF000
heap
page read and write
2AA7000
trusted library allocation
page execute and read and write
41BD000
heap
page read and write
52D0000
trusted library allocation
page read and write
44F0000
heap
page read and write
ECE000
heap
page read and write
44FF000
heap
page read and write
63A0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
D89000
stack
page read and write
46F9000
direct allocation
page read and write
44F9000
heap
page read and write
4553000
direct allocation
page read and write
2D24000
trusted library allocation
page read and write
E60000
heap
page read and write
41BD000
heap
page read and write
45D0000
direct allocation
page read and write
2A70000
trusted library allocation
page read and write
41BB000
heap
page read and write
44FE000
heap
page read and write
4E4D000
stack
page read and write
EE5000
heap
page read and write
6140000
trusted library allocation
page execute and read and write
41BD000
heap
page read and write
44F7000
heap
page read and write
44F9000
heap
page read and write
6A60000
trusted library allocation
page read and write
54FC000
stack
page read and write
5200000
trusted library allocation
page read and write
384A000
heap
page read and write
384E000
heap
page read and write
F99000
heap
page read and write
4430000
direct allocation
page read and write
51A0000
trusted library allocation
page read and write
44F7000
heap
page read and write
41B6000
heap
page read and write
41BD000
heap
page read and write
44F7000
heap
page read and write
2C70000
trusted library allocation
page read and write
41BD000
heap
page read and write
46FD000
direct allocation
page read and write
384B000
heap
page read and write
41BD000
heap
page read and write
384A000
heap
page read and write
2D30000
trusted library allocation
page read and write
F1F000
heap
page read and write
44F3000
heap
page read and write
41BD000
heap
page read and write
60E6000
trusted library allocation
page read and write
41BD000
heap
page read and write
3847000
heap
page read and write
41BD000
heap
page read and write
44F2000
heap
page read and write
44FE000
heap
page read and write
6D90000
heap
page read and write
2A90000
trusted library allocation
page read and write
46F9000
direct allocation
page read and write
46FD000
direct allocation
page read and write
41BD000
heap
page read and write
2B60000
heap
page execute and read and write
44FC000
heap
page read and write
63A7000
trusted library allocation
page read and write
41BD000
heap
page read and write
384F000
heap
page read and write
41BD000
heap
page read and write
2AAB000
trusted library allocation
page execute and read and write
41BD000
heap
page read and write
613D000
stack
page read and write
4138000
heap
page read and write
45D0000
direct allocation
page read and write
44F7000
heap
page read and write
44FE000
heap
page read and write
41BD000
heap
page read and write
384D000
heap
page read and write
621E000
stack
page read and write
3849000
heap
page read and write
3840000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
573E000
stack
page read and write
3848000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
4138000
heap
page read and write
44FC000
heap
page read and write
44FE000
heap
page read and write
44F8000
heap
page read and write
2B4C000
stack
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
2C80000
heap
page read and write
51CD000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
52D8000
trusted library allocation
page read and write
44F6000
heap
page read and write
3844000
heap
page read and write
41BD000
heap
page read and write
51AE000
trusted library allocation
page read and write
44FE000
heap
page read and write
46F9000
direct allocation
page read and write
E00000
heap
page read and write
4430000
direct allocation
page read and write
384A000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
3848000
heap
page read and write
E65000
heap
page read and write
44F6000
heap
page read and write
44F0000
heap
page read and write
41BD000
heap
page read and write
4CB8000
trusted library allocation
page read and write
3845000
heap
page read and write
400000
system
page execute and read and write
45D0000
direct allocation
page read and write
63B0000
trusted library allocation
page read and write
3848000
heap
page read and write
3D17000
trusted library allocation
page read and write
44FF000
heap
page read and write
400000
unkown
page readonly
2A92000
trusted library allocation
page read and write
44F4000
heap
page read and write
51C1000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
3842000
heap
page read and write
482000
unkown
page readonly
384E000
heap
page read and write
C8A000
stack
page read and write
F33000
heap
page read and write
41BD000
heap
page read and write
2A96000
trusted library allocation
page execute and read and write
3848000
heap
page read and write
41BD000
heap
page read and write
E10000
heap
page read and write
44F5000
heap
page read and write
7F050000
trusted library allocation
page execute and read and write
51C6000
trusted library allocation
page read and write
2D17000
trusted library allocation
page read and write
41BD000
heap
page read and write
A63000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
F3F000
heap
page read and write
384C000
heap
page read and write
44F1000
heap
page read and write
46FD000
direct allocation
page read and write
45D0000
direct allocation
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
EB8000
heap
page read and write
44F4000
heap
page read and write
EE8000
heap
page read and write
5300000
heap
page read and write
476E000
direct allocation
page read and write
44F2000
heap
page read and write
401000
unkown
page execute read
577E000
stack
page read and write
44FF000
heap
page read and write
44F6000
heap
page read and write
655D000
stack
page read and write
44F9000
heap
page read and write
2B50000
trusted library allocation
page execute and read and write
41BD000
heap
page read and write
E80000
heap
page read and write
41B9000
heap
page read and write
61DE000
stack
page read and write
41BD000
heap
page read and write
2A73000
trusted library allocation
page execute and read and write
41BD000
heap
page read and write
44F7000
heap
page read and write
41BD000
heap
page read and write
384E000
heap
page read and write
681E000
stack
page read and write
384B000
heap
page read and write
44F6000
heap
page read and write
5190000
trusted library allocation
page read and write
44F8000
heap
page read and write
563E000
stack
page read and write
41BD000
heap
page read and write
44F5000
heap
page read and write
418A000
heap
page read and write
F84000
heap
page read and write
41BD000
heap
page read and write
41BD000
heap
page read and write
384F000
heap
page read and write
There are 343 hidden memdumps, click here to show them.