IOC Report
__ ___.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
__ ___.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\__ ___.scr.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\__ ___.scr.exe
"C:\Users\user\Desktop\__ ___.scr.exe"
malicious
C:\Users\user\Desktop\__ ___.scr.exe
"C:\Users\user\Desktop\__ ___.scr.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
spencerstuartllc.top/document/five/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://www.ibsensoftware.com/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
391C000
trusted library allocation
page read and write
malicious
2851000
trusted library allocation
page read and write
malicious
397F000
trusted library allocation
page read and write
malicious
701000
remote allocation
page read and write
malicious
4CF1000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
D5F000
stack
page read and write
B50000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
4E8E000
stack
page read and write
700000
remote allocation
page execute and read and write
A3E000
stack
page read and write
5847000
heap
page read and write
57B000
stack
page read and write
B94000
heap
page read and write
B4E000
stack
page read and write
50EE000
stack
page read and write
5845000
heap
page read and write
C3D000
heap
page read and write
B00000
trusted library allocation
page read and write
6FE000
stack
page read and write
4D99000
trusted library allocation
page read and write
4CD4000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
2840000
heap
page execute and read and write
C48000
heap
page read and write
B60000
heap
page read and write
7A0000
remote allocation
page execute and read and write
4CEE000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
267D000
stack
page read and write
5C2E000
stack
page read and write
4CDB000
trusted library allocation
page read and write
4C98000
trusted library allocation
page read and write
4CD2000
trusted library allocation
page read and write
B6E000
heap
page read and write
4D05000
trusted library allocation
page read and write
C3F000
heap
page read and write
3CD000
stack
page read and write
4EF4000
trusted library allocation
page read and write
8D0000
heap
page read and write
279E000
stack
page read and write
FF0000
heap
page read and write
BF0000
heap
page read and write
3859000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
9F5000
heap
page read and write
AB4000
trusted library allocation
page read and write
5A2E000
stack
page read and write
890000
heap
page read and write
B68000
heap
page read and write
4EC3000
trusted library section
page read and write
3851000
trusted library allocation
page read and write
4CA5000
trusted library allocation
page read and write
B87000
heap
page read and write
5830000
heap
page read and write
4DA0000
trusted library allocation
page read and write
A7E000
stack
page read and write
4E90000
trusted library section
page read and write
B8C000
heap
page read and write
AD6000
trusted library allocation
page execute and read and write
1010000
trusted library allocation
page read and write
583D000
heap
page read and write
4CC0000
heap
page read and write
506F000
stack
page read and write
4C90000
trusted library allocation
page read and write
AAD000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
2690000
heap
page read and write
4CF6000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
51EE000
stack
page read and write
BF2000
heap
page read and write
9F0000
heap
page read and write
4EF9000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
E5F000
stack
page read and write
BA1000
heap
page read and write
494D000
stack
page read and write
5B2E000
stack
page read and write
BD2000
heap
page read and write
AA3000
trusted library allocation
page execute and read and write
4F10000
trusted library section
page read and write
ADA000
trusted library allocation
page execute and read and write
480000
unkown
page readonly
AC0000
heap
page read and write
8F7000
stack
page read and write
4F60000
heap
page execute and read and write
1020000
heap
page read and write
5D2F000
stack
page read and write
5F0000
heap
page read and write
AE7000
trusted library allocation
page execute and read and write
522E000
stack
page read and write
AA0000
trusted library allocation
page read and write
4D9F000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
4EC000
unkown
page readonly
2687000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
AEB000
trusted library allocation
page execute and read and write
50AE000
stack
page read and write
4CA0000
trusted library allocation
page read and write
There are 96 hidden memdumps, click here to show them.