IOC Report
S12.exe

loading gif

Files

File Path
Type
Category
Malicious
S12.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\QQWER.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\602d46.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\602da4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\60bae0.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\60bb2f.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\ .bmp
PC bitmap, Windows 3.x format, 88 x 30 x 24, image size 7920, cbSize 7974, bits offset 54
dropped
C:\Users\user\Desktop\ .bmp
PC bitmap, Windows 3.x format, 113 x 35 x 24, image size 11900, cbSize 11954, bits offset 54
dropped
C:\Users\user\Desktop\ .bmp
PC bitmap, Windows 3.x format, 30 x 30 x 24, image size 2760, cbSize 2814, bits offset 54
dropped
C:\Users\user\Desktop\ .bmp
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Desktop\ .ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\CF1.bmp
PC bitmap, Windows 3.x format, 122 x 40 x 24, image size 14720, cbSize 14774, bits offset 54
dropped
C:\Users\user\Desktop\dt3.bmp
PC bitmap, Windows 3.x format, 35 x 20 x 24, image size 2160, cbSize 2214, bits offset 54
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S12.exe
"C:\Users\user\Desktop\S12.exe"
malicious
C:\Users\user\Desktop\S12.exe
"C:\Users\user\Desktop\S12.exe"
malicious

URLs

Name
IP
Malicious
http://82.156.239.188/123.txtxt1P
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt
82.156.239.188
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt=
unknown
http://www.eyuyan.com)DVarFileInfo$
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txty
unknown
http://ts-ocsp.ws.s
unknown
http://ts-ocsp.ws.symantec.
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt8E
unknown
https://ww(w.v
unknown
http://82.156.239.188/123.txt-2476756634-1003N
unknown
http://82.156.239.188/%E5%AD%98%E6%A1%A3/
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt:&B
unknown
http://82.156.239.188/%E7%89%88%E6%9C%AC%E6%9B%B4%E6%96%B0.txt
unknown
http://82.156.239.188/123.txtpP
unknown
http://ocsp.t
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txthttp://82.156.239.188/123.txt
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt2658-3693405117-2476756634-1003
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txtmP
unknown
http://sf.symc
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt.
unknown
http://82.156.239.188/
unknown
http://82.156.239.188/-E
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txtbP
unknown
http://82.156.239.188/123.txtz
unknown
http://82.156.239.188/123.txt
82.156.239.188
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txth
unknown
http://82.156.239.188/123.txtxt
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txt0
unknown
http://82.156.239.188/%E8%87%AA%E5%B7%B1%E7%9A%84%E6%A1%A3.txtwsock.dll.mui1
unknown
http://82.156.239.188/123.txtu
unknown
There are 20 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
82.156.239.188
unknown
China

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run

Memdumps

Base Address
Regiontype
Protect
Malicious
2BCE000
stack
page read and write
3059000
heap
page read and write
2F0D000
heap
page execute and read and write
2FA2000
heap
page read and write
10000000
direct allocation
page execute and read and write
ACF000
heap
page read and write
30A9000
heap
page read and write
8E5000
unkown
page readonly
53C000
unkown
page readonly
519C000
stack
page read and write
AEB000
heap
page read and write
2B71000
heap
page read and write
CEE000
heap
page read and write
53C000
unkown
page readonly
2FB4000
heap
page read and write
3A2E000
stack
page read and write
E10000
heap
page read and write
30AE000
heap
page read and write
7EB000
unkown
page readonly
A76000
heap
page read and write
7EF000
unkown
page readonly
AC6000
heap
page read and write
7EB000
unkown
page readonly
2C74000
heap
page execute and read and write
92000
stack
page read and write
2A13000
heap
page read and write
2A96000
heap
page read and write
E15000
heap
page read and write
3062000
heap
page read and write
794000
unkown
page read and write
400000
unkown
page readonly
CBB000
heap
page read and write
2EA4000
heap
page read and write
7C3000
unkown
page read and write
8ED000
unkown
page readonly
2904000
heap
page read and write
796000
unkown
page write copy
2E95000
heap
page execute and read and write
28B0000
heap
page execute and read and write
CDA000
heap
page read and write
3A3E000
stack
page read and write
2E67000
heap
page execute and read and write
E00000
heap
page read and write
92000
stack
page read and write
7A9000
unkown
page read and write
2B3C000
heap
page read and write
2839000
heap
page read and write
7EF000
unkown
page readonly
297B000
heap
page read and write
2994000
heap
page read and write
2AAF000
heap
page read and write
397F000
stack
page read and write
79F000
unkown
page read and write
2C92000
heap
page execute and read and write
19C000
stack
page read and write
910000
heap
page read and write
7E3000
unkown
page read and write
7A0000
unkown
page write copy
29A1000
heap
page read and write
A9A000
heap
page read and write
CC4000
heap
page read and write
CB8000
heap
page read and write
796000
unkown
page write copy
2730000
heap
page read and write
2ABC000
heap
page read and write
30AF000
heap
page read and write
7A9000
unkown
page write copy
2AD0000
heap
page read and write
4EDE000
stack
page read and write
2B48000
heap
page read and write
ACF000
heap
page read and write
C10000
heap
page read and write
400000
unkown
page readonly
945000
heap
page read and write
792000
unkown
page write copy
674000
unkown
page readonly
AA4000
heap
page read and write
2ADD000
heap
page read and write
2B6D000
heap
page read and write
401000
unkown
page execute read
2B30000
heap
page read and write
76A000
unkown
page readonly
7E9000
unkown
page read and write
ED0000
heap
page read and write
8ED000
unkown
page readonly
674000
unkown
page readonly
C68000
heap
page read and write
BC0000
heap
page read and write
76A000
unkown
page readonly
D0D000
heap
page read and write
AD0000
heap
page read and write
900000
heap
page read and write
4DEF000
stack
page read and write
AB5000
heap
page read and write
387E000
stack
page read and write
51AC000
stack
page read and write
2B85000
heap
page read and write
2C96000
heap
page execute and read and write
2B8E000
stack
page read and write
792000
unkown
page write copy
7B5000
unkown
page read and write
C90000
heap
page read and write
2BEC000
heap
page execute and read and write
CBB000
heap
page read and write
773000
unkown
page readonly
1003A000
direct allocation
page execute and read and write
773000
unkown
page readonly
4FEB000
stack
page read and write
2C71000
heap
page execute and read and write
EF5000
heap
page read and write
2AEE000
stack
page read and write
2744000
heap
page read and write
792000
unkown
page write copy
2B92000
heap
page read and write
3548000
heap
page read and write
AE7000
heap
page read and write
291C000
heap
page read and write
792000
unkown
page write copy
373F000
stack
page read and write
2AB8000
heap
page read and write
401000
unkown
page execute read
ACF000
heap
page read and write
39FE000
stack
page read and write
AB0000
heap
page read and write
DB0000
heap
page read and write
291E000
heap
page read and write
2BFD000
heap
page execute and read and write
C94000
heap
page read and write
7EB000
unkown
page readonly
3A8E000
stack
page read and write
CCC000
heap
page read and write
2FBA000
heap
page read and write
299F000
heap
page read and write
401000
unkown
page execute read
2A47000
heap
page read and write
7E9000
unkown
page read and write
2774000
heap
page read and write
76A000
unkown
page readonly
4D9F000
stack
page read and write
4E9E000
stack
page read and write
9E0000
heap
page read and write
7B6000
unkown
page read and write
7A9000
unkown
page read and write
CE9000
heap
page read and write
C4A000
heap
page read and write
511F000
stack
page read and write
7EF000
unkown
page readonly
76A000
unkown
page readonly
2B64000
heap
page read and write
900000
heap
page read and write
53C000
unkown
page readonly
1003A000
direct allocation
page execute and read and write
2D2A000
heap
page execute and read and write
2E24000
heap
page execute and read and write
CBE000
heap
page read and write
28A0000
heap
page read and write
940000
heap
page read and write
2F6F000
heap
page read and write
501E000
stack
page read and write
7EB000
unkown
page readonly
AA2000
heap
page read and write
2DBF000
heap
page execute and read and write
39DE000
stack
page read and write
8ED000
unkown
page readonly
AB3000
heap
page read and write
A97000
heap
page read and write
3598000
heap
page read and write
383F000
stack
page read and write
2EDF000
heap
page execute and read and write
276E000
stack
page read and write
512F000
stack
page read and write
C8D000
heap
page read and write
C4E000
heap
page read and write
773000
unkown
page readonly
AB5000
heap
page read and write
2A9F000
heap
page read and write
7A5000
unkown
page read and write
400000
unkown
page readonly
AD0000
heap
page read and write
388F000
stack
page read and write
306D000
heap
page read and write
2742000
heap
page read and write
2C6B000
heap
page read and write
3590000
heap
page read and write
3540000
heap
page read and write
2B74000
heap
page read and write
674000
unkown
page readonly
287D000
heap
page read and write
2B2E000
stack
page read and write
2AE0000
heap
page read and write
2CF7000
heap
page execute and read and write
273E000
heap
page read and write
8E5000
unkown
page readonly
7A9000
unkown
page write copy
CC5000
heap
page read and write
2770000
heap
page read and write
C35000
heap
page read and write
306B000
heap
page read and write
2ABF000
heap
page read and write
8E5000
unkown
page readonly
2A1C000
heap
page read and write
529E000
stack
page read and write
19C000
stack
page read and write
C40000
heap
page read and write
8E5000
unkown
page readonly
C3E000
heap
page read and write
2D9B000
heap
page execute and read and write
401000
unkown
page execute read
930000
heap
page read and write
EF0000
heap
page read and write
CC8000
heap
page read and write
53C000
unkown
page readonly
2B44000
heap
page execute and read and write
2F64000
heap
page read and write
2735000
heap
page read and write
4FDB000
stack
page read and write
674000
unkown
page readonly
CC5000
heap
page read and write
AE2000
heap
page read and write
2D26000
heap
page execute and read and write
CDE000
heap
page read and write
7A0000
unkown
page write copy
52AE000
stack
page read and write
2C64000
heap
page execute and read and write
378F000
stack
page read and write
CC1000
heap
page read and write
2A30000
heap
page read and write
30B2000
heap
page read and write
D1C000
heap
page read and write
A8C000
heap
page read and write
2FB9000
heap
page read and write
400000
unkown
page readonly
7A7000
unkown
page write copy
8ED000
unkown
page readonly
A80000
heap
page read and write
AA4000
heap
page read and write
2842000
heap
page read and write
C30000
heap
page read and write
2A49000
heap
page read and write
7A7000
unkown
page write copy
7E3000
unkown
page read and write
4EEE000
stack
page read and write
2B70000
heap
page read and write
2900000
heap
page read and write
A72000
heap
page read and write
79F000
unkown
page read and write
C00000
heap
page execute and read and write
2E20000
heap
page execute and read and write
2F99000
heap
page read and write
A30000
heap
page read and write
773000
unkown
page readonly
2F11000
heap
page execute and read and write
7A5000
unkown
page read and write
2B95000
heap
page read and write
2A4D000
heap
page read and write
2B45000
heap
page read and write
794000
unkown
page read and write
7EF000
unkown
page readonly
502E000
stack
page read and write
A9C000
heap
page read and write
CFD000
heap
page read and write
398F000
stack
page read and write
287B000
heap
page read and write
2972000
heap
page read and write
A38000
heap
page read and write
D03000
heap
page read and write
7C3000
unkown
page read and write
10000000
direct allocation
page execute and read and write
3064000
heap
page read and write
2EEC000
heap
page execute and read and write
2F6D000
heap
page read and write
30B8000
heap
page read and write
CC4000
heap
page read and write
2EEF000
heap
page execute and read and write
There are 264 hidden memdumps, click here to show them.