IOC Report
DataIndustrial.exe

loading gif

Files

File Path
Type
Category
Malicious
DataIndustrial.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\128[1]
HTML document, ISO-8859 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\badger_logo[1]
GIF image data, version 89a, 108 x 109
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\style[1]
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DataIndustrial.exe
"C:\Users\user\Desktop\DataIndustrial.exe"
malicious

URLs

Name
IP
Malicious
http://google.com/
unknown
http://google.com/(
unknown
http://www.badgermeter.com/Industrial.aspx
unknown
http://www.badgermeter.com/Literature/Industrial-Literature-Index/Impeller-Products.aspxopenManuals
unknown
http://www.badgermeter.com/Literature/Industrial-Literature-Index/Impeller-Products.aspx
unknown

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
50AB000
heap
page read and write
50B6000
heap
page read and write
50B6000
heap
page read and write
50AB000
heap
page read and write
93E0000
trusted library allocation
page read and write
2336000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
24FC000
heap
page read and write
50B4000
heap
page read and write
50B2000
heap
page read and write
45B8000
trusted library allocation
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
50BF000
heap
page read and write
50B5000
heap
page read and write
45B0000
trusted library allocation
page read and write
50A5000
heap
page read and write
50B4000
heap
page read and write
50B6000
heap
page read and write
50E2000
heap
page read and write
4B1C000
stack
page read and write
50BF000
heap
page read and write
24F7000
heap
page read and write
50D7000
heap
page read and write
50F1000
heap
page read and write
50BA000
heap
page read and write
459C000
trusted library allocation
page read and write
A000000
trusted library allocation
page read and write
50FD000
heap
page read and write
50B4000
heap
page read and write
4D0000
heap
page read and write
45A2000
trusted library allocation
page read and write
50BB000
heap
page read and write
50BA000
heap
page read and write
50C9000
heap
page read and write
50AB000
heap
page read and write
256E000
stack
page read and write
2330000
heap
page read and write
50BC000
heap
page read and write
50CE000
heap
page read and write
50B4000
heap
page read and write
50C9000
heap
page read and write
5040000
heap
page read and write
7EF000
heap
page read and write
5094000
heap
page read and write
4484000
heap
page read and write
2753000
heap
page read and write
50F3000
heap
page read and write
45F0000
trusted library allocation
page read and write
26E9000
heap
page read and write
50B4000
heap
page read and write
2450000
heap
page read and write
45EC000
trusted library allocation
page read and write
50BF000
heap
page read and write
50B6000
heap
page read and write
50AB000
heap
page read and write
448F000
heap
page read and write
50BA000
heap
page read and write
50AB000
heap
page read and write
50BF000
heap
page read and write
503D000
trusted library allocation
page read and write
50AB000
heap
page read and write
814000
heap
page read and write
50BF000
heap
page read and write
50AB000
heap
page read and write
50B6000
heap
page read and write
50BB000
heap
page read and write
510E000
heap
page read and write
510E000
heap
page read and write
A000000
heap
page read and write
50AB000
heap
page read and write
50B2000
heap
page read and write
781000
heap
page read and write
45BA000
trusted library allocation
page read and write
2310000
heap
page read and write
50BF000
heap
page read and write
4A3000
unkown
page readonly
7FA000
heap
page read and write
50BA000
heap
page read and write
45F8000
trusted library allocation
page read and write
47E000
unkown
page readonly
400000
unkown
page readonly
81D000
heap
page read and write
271A000
heap
page read and write
50B6000
heap
page read and write
18C000
stack
page read and write
A010000
trusted library allocation
page read and write
5091000
heap
page read and write
50BB000
heap
page read and write
926F000
stack
page read and write
50BF000
heap
page read and write
45D7000
trusted library allocation
page read and write
7FE40000
trusted library allocation
page execute read
5099000
heap
page read and write
50BF000
heap
page read and write
93C0000
trusted library allocation
page read and write
50BF000
heap
page read and write
50AB000
heap
page read and write
50BA000
heap
page read and write
50BB000
heap
page read and write
50A5000
heap
page read and write
400000
unkown
page readonly
2706000
heap
page read and write
50C0000
heap
page read and write
A200000
heap
page read and write
50BF000
heap
page read and write
50A8000
heap
page read and write
645000
heap
page read and write
4588000
trusted library allocation
page read and write
474C000
stack
page read and write
2673000
heap
page read and write
50B2000
heap
page read and write
50DB000
heap
page read and write
78D000
heap
page read and write
508D000
heap
page read and write
72A000
heap
page read and write
4A3000
unkown
page readonly
50EA000
heap
page read and write
50BA000
heap
page read and write
816000
heap
page read and write
50B2000
heap
page read and write
5105000
heap
page read and write
459A000
trusted library allocation
page read and write
50A5000
heap
page read and write
50BF000
heap
page read and write
50BF000
heap
page read and write
50B2000
heap
page read and write
2280000
heap
page read and write
401000
unkown
page execute read
24F3000
heap
page read and write
50AB000
heap
page read and write
93D0000
trusted library allocation
page read and write
7FE44000
trusted library allocation
page execute read
50B4000
heap
page read and write
50FD000
heap
page read and write
50B7000
heap
page read and write
50B4000
heap
page read and write
50BF000
heap
page read and write
2284000
heap
page read and write
484D000
stack
page read and write
50B4000
heap
page read and write
50BB000
heap
page read and write
26FC000
heap
page read and write
50B4000
heap
page read and write
5099000
heap
page read and write
4E3C000
stack
page read and write
720000
heap
page read and write
4A8E000
stack
page read and write
50B4000
heap
page read and write
7F5000
heap
page read and write
50AB000
heap
page read and write
45C0000
trusted library allocation
page read and write
50B4000
heap
page read and write
50BF000
heap
page read and write
458E000
trusted library allocation
page read and write
45E8000
trusted library allocation
page read and write
2693000
heap
page read and write
50AB000
heap
page read and write
7FE48000
trusted library allocation
page execute read
5085000
heap
page read and write
8352000
trusted library allocation
page read and write
50BB000
heap
page read and write
46FE000
unkown
page read and write
803000
heap
page read and write
50B5000
heap
page read and write
5B0000
heap
page read and write
7FE000
heap
page read and write
93B0000
trusted library allocation
page read and write
50B6000
heap
page read and write
50C9000
heap
page read and write
50FF000
heap
page read and write
50BB000
heap
page read and write
50AB000
heap
page read and write
50F9000
heap
page read and write
50FD000
heap
page read and write
4610000
trusted library allocation
page read and write
50B2000
heap
page read and write
45A4000
trusted library allocation
page read and write
50AB000
heap
page read and write
50A4000
heap
page read and write
50B4000
heap
page read and write
50B4000
heap
page read and write
50C3000
heap
page read and write
50D0000
heap
page read and write
793000
heap
page read and write
50AB000
heap
page read and write
24C0000
heap
page read and write
50AB000
heap
page read and write
A220000
trusted library allocation
page read and write
50BA000
heap
page read and write
50BF000
heap
page read and write
50B2000
heap
page read and write
50B5000
heap
page read and write
769000
heap
page read and write
A000000
trusted library allocation
page read and write
796000
heap
page read and write
45DA000
trusted library allocation
page read and write
72E000
heap
page read and write
4598000
trusted library allocation
page read and write
401000
unkown
page execute read
93B0000
trusted library allocation
page read and write
494F000
stack
page read and write
4ADF000
stack
page read and write
916C000
stack
page read and write
50AB000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
776000
heap
page read and write
506E000
heap
page read and write
2430000
trusted library allocation
page read and write
50B4000
heap
page read and write
21D0000
heap
page read and write
50B4000
heap
page read and write
50C9000
heap
page read and write
2711000
heap
page read and write
50B4000
heap
page read and write
2680000
heap
page read and write
50BF000
heap
page read and write
50B4000
heap
page read and write
4486000
heap
page read and write
270D000
heap
page read and write
5091000
heap
page read and write
45F4000
trusted library allocation
page read and write
8334000
trusted library allocation
page read and write
5099000
heap
page read and write
50C9000
heap
page read and write
50B6000
heap
page read and write
50B4000
heap
page read and write
50BA000
heap
page read and write
26F5000
heap
page read and write
50C3000
heap
page read and write
50C0000
heap
page read and write
50BF000
heap
page read and write
42CF000
stack
page read and write
26F2000
heap
page read and write
690000
heap
page read and write
45F2000
trusted library allocation
page read and write
98000
stack
page read and write
92AC000
stack
page read and write
45EA000
trusted library allocation
page read and write
46BE000
stack
page read and write
2688000
heap
page read and write
50B6000
heap
page read and write
50BC000
heap
page read and write
7FE46000
trusted library allocation
page execute read
50BF000
heap
page read and write
50BA000
heap
page read and write
4A4F000
stack
page read and write
80D000
heap
page read and write
458A000
trusted library allocation
page read and write
50B6000
heap
page read and write
50AB000
heap
page read and write
50AB000
heap
page read and write
4590000
trusted library allocation
page read and write
271E000
heap
page read and write
50BA000
heap
page read and write
2520000
heap
page read and write
50AB000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
50B6000
heap
page read and write
24F0000
heap
page read and write
4600000
trusted library allocation
page read and write
5096000
heap
page read and write
50AB000
heap
page read and write
2670000
heap
page read and write
50BA000
heap
page read and write
50BA000
heap
page read and write
50BB000
heap
page read and write
50BF000
heap
page read and write
45D0000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
7FE42000
trusted library allocation
page execute read
50B5000
heap
page read and write
50B4000
heap
page read and write
266D000
stack
page read and write
45E6000
trusted library allocation
page read and write
230E000
stack
page read and write
49C000
unkown
page read and write
458C000
trusted library allocation
page read and write
50BA000
heap
page read and write
45DE000
trusted library allocation
page read and write
5099000
heap
page read and write
508D000
heap
page read and write
93AE000
stack
page read and write
4F3F000
stack
page read and write
50AB000
heap
page read and write
4480000
heap
page read and write
4C1F000
stack
page read and write
50C9000
heap
page read and write
50AB000
heap
page read and write
50AB000
heap
page read and write
50AB000
heap
page read and write
233D000
heap
page read and write
50B7000
heap
page read and write
640000
heap
page read and write
50B4000
heap
page read and write
50AB000
heap
page read and write
50D5000
heap
page read and write
50BF000
heap
page read and write
50AB000
heap
page read and write
50C3000
heap
page read and write
A010000
trusted library allocation
page read and write
50B4000
heap
page read and write
A000000
trusted library allocation
page read and write
50BA000
heap
page read and write
50B4000
heap
page read and write
50E8000
heap
page read and write
26E5000
heap
page read and write
A210000
trusted library allocation
page read and write
50C2000
heap
page read and write
50BA000
heap
page read and write
2701000
heap
page read and write
760000
heap
page read and write
50B5000
heap
page read and write
50AB000
heap
page read and write
50B6000
heap
page read and write
50BC000
heap
page read and write
47E000
unkown
page readonly
49C000
unkown
page write copy
4609000
trusted library allocation
page read and write
50BF000
heap
page read and write
There are 315 hidden memdumps, click here to show them.