IOC Report
3182473663947752.exe

loading gif

Files

File Path
Type
Category
Malicious
3182473663947752.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3182473663947752.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3182473663947752.exe
C:\Users\user\Desktop\3182473663947752.exe
malicious
C:\Users\user\Desktop\3182473663947752.exe
C:\Users\user\Desktop\3182473663947752.exe
malicious

URLs

Name
IP
Malicious
http://www.aiim.org/pdfa/ns/property#
unknown
http://ns.useplus.org/ldf/xmp/1.0/
unknown
http://www.aiim.org/pdfa/ns/type#
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://account.dyn.com/
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
http://iptc.org/std/Iptc4xmpExt/2008-02-29/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://www.aiim.org/pdfa/ns/schema#
unknown
http://www.npes.org/pdfx/ns/id/
unknown
http://www.aiim.org/pdfa/ns/field#
unknown
http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/
unknown
http://r3.o.lencr.org0
unknown
https://github.com/mgravell/protobuf-net
unknown
http://www.aiim.org/pdfa/ns/extension/
unknown
http://cipa.jp/exif/1.0/
unknown
http://pecrkva.rs
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://r3.i.lencr.org/0
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pecrkva.rs
77.105.36.190

IPs

IP
Domain
Country
Malicious
77.105.36.190
pecrkva.rs
Serbia

Memdumps

Base Address
Regiontype
Protect
Malicious
31EE000
trusted library allocation
page read and write
malicious
3CB9000
trusted library allocation
page read and write
malicious
5590000
trusted library section
page read and write
malicious
31A1000
trusted library allocation
page read and write
malicious
2D9E000
trusted library allocation
page read and write
malicious
40E3000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute read
malicious
2E7E000
trusted library allocation
page read and write
malicious
4372000
trusted library allocation
page read and write
malicious
3218000
trusted library allocation
page read and write
malicious
4072000
trusted library allocation
page read and write
malicious
51C0000
trusted library section
page read and write
malicious
48F0000
trusted library allocation
page read and write
malicious
2C48000
trusted library allocation
page read and write
E2A000
heap
page read and write
340000
unkown
page readonly
58A0000
heap
page read and write
4FDF000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
5440000
trusted library allocation
page execute and read and write
EDC000
heap
page read and write
314F000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
1030000
heap
page read and write
58D7000
heap
page read and write
6820000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
1440000
heap
page read and write
164E000
stack
page read and write
57D0000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
7E0000
heap
page read and write
DF3000
trusted library allocation
page execute and read and write
2F9F000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
54D2000
heap
page read and write
6F80000
trusted library allocation
page read and write
1458000
heap
page read and write
E20000
heap
page read and write
57E0000
trusted library allocation
page execute and read and write
2FD1000
trusted library allocation
page read and write
648F000
stack
page read and write
3205000
trusted library allocation
page read and write
14C1000
heap
page read and write
51BE000
stack
page read and write
687D000
stack
page read and write
5792000
trusted library allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
17C0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
342000
unkown
page readonly
2C71000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
691E000
stack
page read and write
57A6000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
5BC0000
heap
page read and write
3214000
trusted library allocation
page read and write
7F770000
trusted library allocation
page execute and read and write
5820000
heap
page read and write
135E000
stack
page read and write
311B000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
1022000
trusted library allocation
page read and write
17F7000
trusted library allocation
page execute and read and write
30FE000
trusted library allocation
page read and write
7F0000
heap
page read and write
5690000
heap
page read and write
1860000
heap
page read and write
3100000
trusted library allocation
page read and write
17DD000
trusted library allocation
page execute and read and write
5D1E000
stack
page read and write
2F9D000
trusted library allocation
page read and write
400000
remote allocation
page readonly
DF0000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
2C30000
trusted library allocation
page execute and read and write
F99000
stack
page read and write
6F5F000
stack
page read and write
5904000
heap
page read and write
2FA5000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
17F2000
trusted library allocation
page read and write
5870000
heap
page execute and read and write
30F8000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
EA6000
heap
page read and write
316D000
trusted library allocation
page read and write
E16000
trusted library allocation
page execute and read and write
41C9000
trusted library allocation
page read and write
658E000
stack
page read and write
6E5E000
stack
page read and write
102B000
trusted library allocation
page execute and read and write
5498000
heap
page read and write
17CD000
trusted library allocation
page execute and read and write
30FA000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
533E000
stack
page read and write
6FC0000
heap
page read and write
6FD0000
trusted library allocation
page execute and read and write
586C000
stack
page read and write
67D8000
trusted library allocation
page read and write
5490000
heap
page read and write
50BE000
stack
page read and write
1887000
heap
page read and write
5400000
trusted library allocation
page execute and read and write
2FB8000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
312F000
stack
page read and write
3284000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
5472000
heap
page read and write
3210000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
6FB0000
heap
page read and write
6F70000
trusted library allocation
page read and write
3ED4000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
17FB000
trusted library allocation
page execute and read and write
53FB000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
5880000
heap
page read and write
322A000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
1489000
heap
page read and write
12F8000
stack
page read and write
2C2D000
stack
page read and write
AF7000
stack
page read and write
2F8A000
trusted library allocation
page read and write
101E000
stack
page read and write
C50000
heap
page read and write
3104000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
17F5000
trusted library allocation
page execute and read and write
51A8000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
E63000
heap
page read and write
77C000
stack
page read and write
3C74000
trusted library allocation
page read and write
14C6000
heap
page read and write
5927000
heap
page read and write
563E000
stack
page read and write
D5E000
stack
page read and write
E08000
trusted library allocation
page read and write
C1E000
stack
page read and write
2A80000
heap
page read and write
3244000
trusted library allocation
page read and write
312E000
trusted library allocation
page read and write
293E000
stack
page read and write
3280000
trusted library allocation
page read and write
E49000
heap
page read and write
58F0000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
2F8F000
trusted library allocation
page read and write
575F000
stack
page read and write
2C50000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
695E000
stack
page read and write
2F86000
trusted library allocation
page read and write
43E000
remote allocation
page readonly
6800000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
E0D000
trusted library allocation
page execute and read and write
2FDF000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
5D9E000
stack
page read and write
5680000
heap
page read and write
6960000
trusted library allocation
page execute and read and write
420D000
trusted library allocation
page read and write
1450000
heap
page read and write
1300000
heap
page read and write
146E000
heap
page read and write
56A0000
heap
page read and write
1027000
trusted library allocation
page execute and read and write
2FA1000
trusted library allocation
page read and write
5000000
heap
page execute and read and write
6810000
heap
page read and write
57D0000
trusted library allocation
page read and write
6830000
trusted library allocation
page execute and read and write
314B000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
3FEF000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
14B5000
heap
page read and write
3130000
trusted library allocation
page read and write
BD0000
heap
page read and write
E1A000
trusted library allocation
page execute and read and write
113F000
stack
page read and write
4FD8000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
680C000
trusted library allocation
page read and write
5687000
heap
page read and write
30F6000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
6B1E000
stack
page read and write
DF4000
trusted library allocation
page read and write
17E2000
trusted library allocation
page read and write
17C4000
trusted library allocation
page read and write
E2E000
heap
page read and write
17EA000
trusted library allocation
page execute and read and write
17E0000
trusted library allocation
page read and write
2F8C000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
DDE000
stack
page read and write
3190000
trusted library allocation
page read and write
5580000
trusted library allocation
page execute and read and write
6826000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
2C60000
heap
page execute and read and write
30FC000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
5D5E000
stack
page read and write
5450000
trusted library allocation
page read and write
5C1E000
stack
page read and write
2F88000
trusted library allocation
page read and write
5760000
trusted library section
page read and write
57C0000
trusted library allocation
page read and write
1360000
heap
page read and write
3149000
trusted library allocation
page read and write
2A3F000
stack
page read and write
3190000
heap
page execute and read and write
3220000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
2FD3000
trusted library allocation
page read and write
4FD2000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
6F67000
trusted library allocation
page read and write
2FD5000
trusted library allocation
page read and write
D9E000
stack
page read and write
1880000
heap
page read and write
578B000
trusted library allocation
page read and write
5886000
heap
page read and write
5476000
heap
page read and write
314D000
trusted library allocation
page read and write
5850000
trusted library section
page read and write
6F60000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
147E000
heap
page read and write
17C3000
trusted library allocation
page execute and read and write
1496000
heap
page read and write
185E000
stack
page read and write
3242000
trusted library allocation
page read and write
5823000
heap
page read and write
2A7E000
stack
page read and write
F12000
heap
page read and write
28F0000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
1870000
trusted library allocation
page execute and read and write
E03000
trusted library allocation
page read and write
1493000
heap
page read and write
17E6000
trusted library allocation
page execute and read and write
5910000
heap
page read and write
5BBC000
stack
page read and write
DFD000
trusted library allocation
page execute and read and write
579A000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
316C000
stack
page read and write
E9C000
heap
page read and write
3208000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
There are 276 hidden memdumps, click here to show them.