IOC Report
NRFQFP.exe

loading gif

Files

File Path
Type
Category
Malicious
NRFQFP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut7D3A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\seskin
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NRFQFP.exe
"C:\Users\user\Desktop\NRFQFP.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\NRFQFP.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2B0000
system
page execute and read and write
malicious
2CD0000
direct allocation
page read and write
malicious
2D30000
direct allocation
page read and write
4070000
direct allocation
page read and write
1ADC000
heap
page read and write
F20000
heap
page read and write
FC1000
unkown
page execute read
4339000
direct allocation
page read and write
2D20000
direct allocation
page read and write
2D20000
direct allocation
page read and write
18E3000
heap
page read and write
17DB000
stack
page read and write
D90000
heap
page read and write
1190000
direct allocation
page read and write
18AE000
heap
page read and write
4193000
direct allocation
page read and write
104D000
unkown
page readonly
4210000
direct allocation
page read and write
433D000
direct allocation
page read and write
4339000
direct allocation
page read and write
23BE000
stack
page read and write
4210000
direct allocation
page read and write
1ADC000
heap
page read and write
209E000
stack
page read and write
2F00000
direct allocation
page execute and read and write
2613000
heap
page read and write
43AE000
direct allocation
page read and write
43AE000
direct allocation
page read and write
433D000
direct allocation
page read and write
4193000
direct allocation
page read and write
23FE000
stack
page read and write
43AE000
direct allocation
page read and write
4070000
direct allocation
page read and write
FC1000
unkown
page execute read
106E000
unkown
page readonly
4339000
direct allocation
page read and write
106E000
unkown
page readonly
2613000
heap
page read and write
2613000
heap
page read and write
4193000
direct allocation
page read and write
4070000
direct allocation
page read and write
199A000
heap
page read and write
2613000
heap
page read and write
2D30000
direct allocation
page read and write
4210000
direct allocation
page read and write
17CF000
stack
page read and write
2800000
heap
page read and write
4193000
direct allocation
page read and write
43AE000
direct allocation
page read and write
4070000
direct allocation
page read and write
2E9E000
heap
page read and write
199A000
heap
page read and write
18E3000
heap
page read and write
43AE000
direct allocation
page read and write
31D1000
direct allocation
page execute and read and write
18E3000
heap
page read and write
2613000
heap
page read and write
4070000
direct allocation
page read and write
300000
heap
page read and write
18E2000
heap
page read and write
433D000
direct allocation
page read and write
2B00000
heap
page read and write
4210000
direct allocation
page read and write
4210000
direct allocation
page read and write
2613000
heap
page read and write
18A0000
heap
page read and write
4193000
direct allocation
page read and write
2613000
heap
page read and write
F80000
heap
page read and write
4339000
direct allocation
page read and write
19BA000
heap
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
1AD8000
heap
page read and write
1084000
unkown
page readonly
4070000
direct allocation
page read and write
107A000
unkown
page write copy
2613000
heap
page read and write
1184000
heap
page read and write
23D000
stack
page read and write
2613000
heap
page read and write
2817000
heap
page read and write
EBE000
stack
page read and write
2613000
heap
page read and write
4210000
direct allocation
page read and write
2613000
heap
page read and write
2D00000
heap
page read and write
43AE000
direct allocation
page read and write
2E2D000
heap
page read and write
2613000
heap
page read and write
FC0000
unkown
page readonly
2613000
heap
page read and write
31CD000
direct allocation
page execute and read and write
433D000
direct allocation
page read and write
2613000
heap
page read and write
EFD000
stack
page read and write
104D000
unkown
page readonly
3242000
direct allocation
page execute and read and write
107F000
unkown
page write copy
4339000
direct allocation
page read and write
2D30000
direct allocation
page read and write
4339000
direct allocation
page read and write
107A000
unkown
page read and write
1A5A000
heap
page read and write
1084000
unkown
page readonly
2C23000
heap
page read and write
2602000
heap
page read and write
3401000
heap
page read and write
2E29000
heap
page read and write
2613000
heap
page read and write
17BB000
stack
page read and write
2370000
heap
page read and write
2613000
heap
page read and write
18E3000
heap
page read and write
1AD8000
heap
page execute and read and write
2901000
heap
page read and write
249E000
stack
page read and write
199B000
heap
page read and write
2805000
heap
page read and write
4193000
direct allocation
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
2600000
heap
page read and write
1AD8000
heap
page read and write
2CCF000
stack
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
1180000
heap
page read and write
43AE000
direct allocation
page read and write
E70000
heap
page read and write
4210000
direct allocation
page read and write
2613000
heap
page read and write
2613000
heap
page read and write
17FC000
stack
page read and write
1930000
heap
page read and write
433D000
direct allocation
page read and write
433D000
direct allocation
page read and write
4193000
direct allocation
page read and write
27C000
stack
page read and write
309E000
direct allocation
page execute and read and write
2817000
heap
page read and write
3029000
direct allocation
page execute and read and write
D2A000
stack
page read and write
2812000
heap
page read and write
2613000
heap
page read and write
433D000
direct allocation
page read and write
302D000
direct allocation
page execute and read and write
320000
heap
page read and write
2D30000
direct allocation
page read and write
2360000
heap
page read and write
2613000
heap
page read and write
18DA000
heap
page read and write
2613000
heap
page read and write
1AD8000
heap
page read and write
F50000
heap
page read and write
1ADF000
heap
page read and write
18AA000
heap
page read and write
2380000
direct allocation
page read and write
2BCE000
stack
page read and write
2613000
heap
page read and write
4070000
direct allocation
page read and write
4339000
direct allocation
page read and write
2805000
heap
page read and write
FC0000
unkown
page readonly
There are 154 hidden memdumps, click here to show them.