IOC Report
RFQ#1047.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ#1047.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ#1047.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ#1047.exe
"C:\Users\user\Desktop\RFQ#1047.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
https://account.dyn.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.xpl.co.nz
203.170.87.105
malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
203.170.87.105
mail.xpl.co.nz
Australia
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2851000
trusted library allocation
page read and write
malicious
389E000
trusted library allocation
page read and write
malicious
28C9000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
D00000
heap
page read and write
5D0000
heap
page read and write
3661000
trusted library allocation
page read and write
AD7000
heap
page read and write
C4D000
trusted library allocation
page execute and read and write
C6B000
trusted library allocation
page execute and read and write
870000
trusted library allocation
page read and write
24EE000
stack
page read and write
C56000
trusted library allocation
page execute and read and write
8400000
heap
page read and write
89D000
trusted library allocation
page execute and read and write
8F9000
stack
page read and write
284E000
stack
page read and write
9EF000
stack
page read and write
63AD000
stack
page read and write
C62000
trusted library allocation
page read and write
4C40000
heap
page read and write
385E000
trusted library allocation
page read and write
C5A000
trusted library allocation
page execute and read and write
4AAB000
trusted library allocation
page read and write
2740000
heap
page read and write
A3A000
heap
page read and write
4B32000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
AF30000
heap
page read and write
97E000
heap
page read and write
400000
remote allocation
page execute and read and write
4ABE000
trusted library allocation
page read and write
A3E000
heap
page read and write
A58000
heap
page read and write
36B7000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
4AC1000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page execute and read and write
274A000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
5F6D000
stack
page read and write
4DCC000
stack
page read and write
847B000
heap
page read and write
A00000
heap
page read and write
A44000
heap
page read and write
26DB000
trusted library allocation
page read and write
5D6E000
stack
page read and write
846B000
heap
page read and write
893000
trusted library allocation
page read and write
9EE000
heap
page read and write
DC0000
heap
page read and write
6D20000
trusted library section
page read and write
28E1000
trusted library allocation
page read and write
93E000
stack
page read and write
9FE000
heap
page read and write
9F0000
trusted library allocation
page execute and read and write
26FD000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
FFB90000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
580000
heap
page read and write
28B7000
trusted library allocation
page read and write
265F000
stack
page read and write
8B7000
trusted library allocation
page execute and read and write
50A0000
heap
page read and write
53C0000
trusted library allocation
page execute and read and write
A6E000
heap
page read and write
CC0000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
2661000
trusted library allocation
page read and write
3753000
trusted library allocation
page read and write
863E000
stack
page read and write
26FC000
trusted library allocation
page read and write
6CB0000
trusted library section
page read and write
2540000
trusted library allocation
page execute and read and write
C2E000
stack
page read and write
B12F000
stack
page read and write
B16D000
stack
page read and write
CD0000
heap
page read and write
5AF0000
heap
page read and write
B0C000
heap
page read and write
210000
unkown
page readonly
6CC0000
trusted library allocation
page execute and read and write
C3D000
trusted library allocation
page execute and read and write
68C2000
trusted library allocation
page read and write
27DE000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
CB0000
heap
page read and write
5B11000
heap
page read and write
C30000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
4E70000
heap
page read and write
6530000
heap
page read and write
AF2D000
stack
page read and write
6870000
heap
page read and write
26F1000
trusted library allocation
page read and write
4F7C000
stack
page read and write
996000
heap
page read and write
5DAD000
stack
page read and write
4C90000
heap
page read and write
3C0000
heap
page read and write
585000
heap
page read and write
4C20000
trusted library section
page readonly
8E0000
heap
page read and write
4F0E000
stack
page read and write
717E000
stack
page read and write
C80000
trusted library allocation
page read and write
2714000
trusted library allocation
page read and write
C67000
trusted library allocation
page execute and read and write
6500000
heap
page read and write
3705000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
4ACD000
trusted library allocation
page read and write
7F9D0000
trusted library allocation
page execute and read and write
4E40000
trusted library allocation
page read and write
4E5C000
trusted library allocation
page read and write
8410000
heap
page read and write
A10000
trusted library allocation
page read and write
4F90000
heap
page read and write
A30000
heap
page read and write
4C9B000
stack
page read and write
212000
unkown
page readonly
960000
heap
page read and write
4CD0000
trusted library section
page read and write
4B20000
heap
page read and write
25AE000
stack
page read and write
5FAE000
stack
page read and write
475C000
stack
page read and write
CFF000
stack
page read and write
26F6000
trusted library allocation
page read and write
34A000
stack
page read and write
8481000
heap
page read and write
5420000
trusted library allocation
page execute and read and write
884000
trusted library allocation
page read and write
4D10000
heap
page execute and read and write
6F3E000
stack
page read and write
26A0000
trusted library allocation
page execute and read and write
6CE0000
trusted library allocation
page read and write
C52000
trusted library allocation
page read and write
570000
heap
page read and write
3879000
trusted library allocation
page read and write
C90000
heap
page read and write
6520000
trusted library allocation
page execute and read and write
D07000
heap
page read and write
4CE0000
heap
page read and write
26E2000
trusted library allocation
page read and write
50AE000
heap
page read and write
268C000
stack
page read and write
50A000
stack
page read and write
64EF000
stack
page read and write
26EE000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
6F7000
stack
page read and write
2550000
heap
page execute and read and write
ADB000
heap
page read and write
5CE000
stack
page read and write
28DB000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
C33000
trusted library allocation
page execute and read and write
253E000
stack
page read and write
26C0000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
C34000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
28DD000
trusted library allocation
page read and write
5AE3000
heap
page read and write
A64000
heap
page read and write
38B9000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
4C30000
heap
page read and write
AE2E000
stack
page read and write
4C50000
heap
page read and write
B09000
heap
page read and write
5AE0000
heap
page read and write
28D1000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
9DA000
heap
page read and write
C65000
trusted library allocation
page execute and read and write
2710000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
63EE000
stack
page read and write
A46000
heap
page read and write
5DB0000
trusted library allocation
page read and write
2690000
heap
page execute and read and write
27CA000
trusted library allocation
page read and write
25B8000
trusted library allocation
page read and write
8435000
heap
page read and write
53B0000
trusted library allocation
page read and write
26DE000
trusted library allocation
page read and write
C2F000
stack
page read and write
6CD0000
trusted library allocation
page execute and read and write
80E000
stack
page read and write
3851000
trusted library allocation
page read and write
62AE000
stack
page read and write
4E49000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
3669000
trusted library allocation
page read and write
8A6000
trusted library allocation
page execute and read and write
AD2E000
stack
page read and write
4FB0000
heap
page read and write
5AE5000
heap
page read and write
4F95000
heap
page read and write
4FD0000
heap
page read and write
4FA0000
heap
page read and write
60AE000
stack
page read and write
88D000
trusted library allocation
page execute and read and write
9EA000
heap
page read and write
6EBF000
stack
page read and write
4B40000
trusted library allocation
page execute and read and write
2813000
trusted library allocation
page read and write
AD3000
heap
page read and write
24F8000
trusted library allocation
page read and write
6EFE000
stack
page read and write
8E5000
heap
page read and write
5410000
trusted library allocation
page read and write
965C000
trusted library allocation
page read and write
4E60000
heap
page execute and read and write
4AE0000
trusted library allocation
page read and write
CAB000
stack
page read and write
A71000
heap
page read and write
540D000
stack
page read and write
C50000
trusted library allocation
page read and write
3B0000
heap
page read and write
853E000
stack
page read and write
70FF000
stack
page read and write
4CF0000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
26AF000
trusted library allocation
page read and write
B26F000
stack
page read and write
53A7000
trusted library allocation
page read and write
968000
heap
page read and write
494D000
stack
page read and write
8AA000
trusted library allocation
page execute and read and write
2AE000
unkown
page readonly
994000
heap
page read and write
4AA4000
trusted library allocation
page read and write
84D000
stack
page read and write
6CA0000
trusted library section
page read and write
CC5000
trusted library allocation
page read and write
3E0000
heap
page read and write
A24000
heap
page read and write
98A000
heap
page read and write
8470000
heap
page read and write
4E74000
heap
page read and write
4C53000
heap
page read and write
27FE000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
713D000
stack
page read and write
6DA0000
trusted library allocation
page read and write
883000
trusted library allocation
page execute and read and write
4AC6000
trusted library allocation
page read and write
C6E000
stack
page read and write
8BB000
trusted library allocation
page execute and read and write
There are 250 hidden memdumps, click here to show them.