IOC Report
Odeme_belgesi.exe

loading gif

Files

File Path
Type
Category
Malicious
Odeme_belgesi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Odeme_belgesi.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Odeme_belgesi.exe
"C:\Users\user\Desktop\Odeme_belgesi.exe"
malicious
C:\Users\user\Desktop\Odeme_belgesi.exe
C:\Users\user\Desktop\Odeme_belgesi.exe
malicious
C:\Users\user\Desktop\Odeme_belgesi.exe
C:\Users\user\Desktop\Odeme_belgesi.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 80

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://solutviewmen.viewdns.net/bdifygidj/five/fre.php
45.66.231.242
malicious
http://alphastand.trade/alien/fre.php
malicious
http://solutviewmen.viewdns.net/bdifygidj/five/fre.phpwD
unknown
malicious
http://alphastand.top/alien/fre.php
malicious
http://www.ibsensoftware.com/
unknown

Domains

Name
IP
Malicious
solutviewmen.viewdns.net
45.66.231.242
malicious

IPs

IP
Domain
Country
Malicious
45.66.231.242
solutviewmen.viewdns.net
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4478000
trusted library allocation
page read and write
malicious
29B8000
trusted library allocation
page read and write
malicious
29D3000
trusted library allocation
page read and write
malicious
1268000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
A6D0000
trusted library allocation
page read and write
B710000
trusted library allocation
page read and write
2FC0000
heap
page read and write
6EB000
stack
page read and write
26E0000
trusted library allocation
page read and write
EFE000
stack
page read and write
A6CD000
stack
page read and write
3935000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
4F6E000
stack
page read and write
1180000
heap
page read and write
4E60000
heap
page read and write
103C000
stack
page read and write
43A8000
trusted library allocation
page read and write
E1AE000
stack
page read and write
DC40000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
26D3000
trusted library allocation
page execute and read and write
E0AE000
stack
page read and write
2E3E000
stack
page read and write
2F9E000
stack
page read and write
1185000
heap
page read and write
3931000
trusted library allocation
page read and write
4E4E000
stack
page read and write
26F6000
trusted library allocation
page execute and read and write
DC50000
trusted library allocation
page read and write
2DD0000
heap
page read and write
B59000
heap
page read and write
E06E000
stack
page read and write
2707000
trusted library allocation
page execute and read and write
42D8000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
B3E000
heap
page read and write
4410000
trusted library allocation
page read and write
B5D000
heap
page read and write
4183000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
26DD000
trusted library allocation
page execute and read and write
2770000
heap
page read and write
AAAE000
stack
page read and write
DB60000
trusted library section
page read and write
12A8000
heap
page read and write
DDAE000
stack
page read and write
2920000
heap
page execute and read and write
B66000
heap
page read and write
DC21000
trusted library allocation
page read and write
A58D000
stack
page read and write
DD6E000
stack
page read and write
53D000
stack
page read and write
26E4000
trusted library allocation
page read and write
B3A000
heap
page read and write
A70000
heap
page read and write
A50000
heap
page read and write
5D0000
unkown
page readonly
4340000
trusted library allocation
page read and write
340F000
stack
page read and write
4ACD000
stack
page read and write
DBF0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
DF6E000
stack
page read and write
2F3F000
stack
page read and write
2FC5000
heap
page read and write
4FF0000
trusted library allocation
page execute and read and write
7E8000
stack
page read and write
A82D000
stack
page read and write
5D2000
unkown
page execute and read and write
430C000
trusted library allocation
page read and write
270B000
trusted library allocation
page execute and read and write
DC06000
trusted library allocation
page read and write
28DC000
stack
page read and write
B73000
heap
page read and write
DBBA000
trusted library section
page read and write
4FEE000
stack
page read and write
2F50000
heap
page read and write
A85000
heap
page read and write
DC35000
trusted library allocation
page read and write
DC59000
trusted library allocation
page read and write
11FE000
stack
page read and write
ACE000
stack
page read and write
C00000
heap
page read and write
424D000
trusted library allocation
page read and write
BF6000
heap
page read and write
DC0B000
trusted library allocation
page read and write
26D4000
trusted library allocation
page read and write
A72E000
stack
page read and write
B0E000
stack
page read and write
B30000
heap
page read and write
DC1E000
trusted library allocation
page read and write
2790000
heap
page read and write
11B0000
heap
page read and write
F20000
heap
page read and write
3410000
heap
page read and write
4FAE000
stack
page read and write
41B7000
trusted library allocation
page read and write
748E000
stack
page read and write
276E000
stack
page read and write
DC10000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
660000
heap
page read and write
A96D000
stack
page read and write
F10000
trusted library allocation
page read and write
A86E000
stack
page read and write
5000000
heap
page execute and read and write
BA1000
heap
page read and write
26FA000
trusted library allocation
page execute and read and write
26F0000
trusted library allocation
page read and write
289F000
stack
page read and write
A5CE000
stack
page read and write
43C000
stack
page read and write
2931000
trusted library allocation
page read and write
3420000
heap
page read and write
632000
unkown
page readonly
28E0000
trusted library allocation
page execute and read and write
49F000
remote allocation
page execute and read and write
A6E0000
trusted library allocation
page execute and read and write
152F000
stack
page read and write
A60000
heap
page read and write
A9AE000
stack
page read and write
5D0000
unkown
page execute and read and write
2900000
trusted library allocation
page read and write
49C0000
trusted library section
page read and write
29F1000
trusted library allocation
page read and write
4E50000
trusted library section
page read and write
A80000
heap
page read and write
1260000
heap
page read and write
113B000
stack
page read and write
DC49000
trusted library allocation
page read and write
5D2000
unkown
page readonly
626000
unkown
page readonly
1240000
heap
page read and write
DFF000
stack
page read and write
626000
unkown
page execute and read and write
DC4C000
trusted library allocation
page read and write
There are 128 hidden memdumps, click here to show them.