IOC Report
New shipment AWB NO - 09804480383.exe

loading gif

Files

File Path
Type
Category
Malicious
New shipment AWB NO - 09804480383.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\New shipment AWB NO - 09804480383.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New shipment AWB NO - 09804480383.exe
"C:\Users\user\Desktop\New shipment AWB NO - 09804480383.exe"
malicious
C:\Users\user\Desktop\New shipment AWB NO - 09804480383.exe
"C:\Users\user\Desktop\New shipment AWB NO - 09804480383.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2012 -s 12

URLs

Name
IP
Malicious
http://checkip.dyndns.org/q
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://reallyfreegeoip.org/xml/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
154B9000
trusted library allocation
page read and write
malicious
35F0000
heap
page read and write
1EDAD000
stack
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD344F6000
trusted library allocation
page read and write
1C743000
heap
page read and write
1F9F000
stack
page read and write
7FFD34464000
trusted library allocation
page read and write
8A2000
unkown
page readonly
3ACC000
trusted library allocation
page read and write
3680000
heap
page execute and read and write
1C740000
heap
page read and write
19DE000
stack
page read and write
7FFD34612000
trusted library allocation
page read and write
1B95000
heap
page read and write
1E988000
heap
page read and write
1E462000
trusted library allocation
page read and write
1C840000
heap
page read and write
9E0000
trusted library allocation
page read and write
153CF000
trusted library allocation
page read and write
1C889000
heap
page read and write
13A91000
trusted library allocation
page read and write
7FFD34453000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
15DE000
stack
page read and write
7FFD344F0000
trusted library allocation
page read and write
930000
heap
page read and write
11C1000
heap
page read and write
1B90000
heap
page read and write
7FFD34444000
trusted library allocation
page read and write
7FFD3446B000
trusted library allocation
page execute and read and write
7FFD345E9000
trusted library allocation
page read and write
7FFD34442000
trusted library allocation
page read and write
1E8B0000
heap
page read and write
7FFD3446D000
trusted library allocation
page execute and read and write
110C000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
3620000
trusted library section
page readonly
970000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
13A98000
trusted library allocation
page read and write
35D0000
heap
page read and write
11DC000
heap
page read and write
10EC000
heap
page read and write
7FFD345E1000
trusted library allocation
page read and write
114F000
heap
page read and write
1F5AF000
stack
page read and write
1159000
heap
page read and write
3A91000
trusted library allocation
page read and write
1CA30000
heap
page read and write
1F1AE000
stack
page read and write
1125000
heap
page read and write
1C850000
heap
page read and write
7FFD344FC000
trusted library allocation
page execute and read and write
7FFD345F0000
trusted library allocation
page execute and read and write
7FFD34630000
trusted library allocation
page read and write
3AE5000
trusted library allocation
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
3650000
heap
page read and write
1C31C000
stack
page read and write
800000
unkown
page readonly
1CA35000
heap
page read and write
7FFD34450000
trusted library allocation
page read and write
13AA1000
trusted library allocation
page read and write
802000
unkown
page readonly
1DF50000
trusted library allocation
page read and write
114D000
heap
page read and write
1E990000
heap
page read and write
1DF40000
trusted library section
page read and write
990000
heap
page read and write
10E0000
heap
page read and write
7FFD3444D000
trusted library allocation
page execute and read and write
1C860000
heap
page read and write
1CE3C000
stack
page read and write
940000
heap
page read and write
7FFD34440000
trusted library allocation
page read and write
3A8E000
stack
page read and write
7FFD3445D000
trusted library allocation
page execute and read and write
7FFD34560000
trusted library allocation
page execute and read and write
950000
heap
page read and write
1FDAE000
stack
page read and write
1C710000
trusted library section
page read and write
7FFD34526000
trusted library allocation
page execute and read and write
945000
heap
page read and write
1E0E0000
trusted library section
page read and write
7FF4B0A20000
trusted library allocation
page execute and read and write
3E7F000
trusted library allocation
page read and write
7FFD3449C000
trusted library allocation
page execute and read and write
9FC000
stack
page read and write
7FFD34460000
trusted library allocation
page read and write
15381000
trusted library allocation
page read and write
7FFD34443000
trusted library allocation
page execute and read and write
15333000
trusted library allocation
page read and write
3640000
heap
page execute and read and write
1114000
heap
page read and write
FF4000
stack
page read and write
1122000
heap
page read and write
1E150000
heap
page read and write
1F9AE000
stack
page read and write
1DE40000
heap
page read and write
There are 91 hidden memdumps, click here to show them.