IOC Report
2MUAWaJNFk.exe

loading gif

Files

File Path
Type
Category
Malicious
2MUAWaJNFk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp20E5.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3303.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6B3B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8D0B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp8D43.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8D54.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8F4A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp9113.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9A9E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA98F.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpC4B6.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpE5D9.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpE961.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpF1B8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpF8C.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpFC32.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2MUAWaJNFk.exe
"C:\Users\user\Desktop\2MUAWaJNFk.exe"
malicious

URLs

Name
IP
Malicious
https://pastebin.com/raw/ENEhYpTW
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
213.109.202.229
unknown
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DB2000
unkown
page readonly
malicious
436B000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
18AB000
stack
page read and write
35C6000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
35DB000
trusted library allocation
page read and write
34AE000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
166E000
stack
page read and write
4494000
trusted library allocation
page read and write
3741000
trusted library allocation
page read and write
1497000
heap
page read and write
78C0000
heap
page read and write
6140000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
569D000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
42AB000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
1536000
heap
page read and write
4288000
trusted library allocation
page read and write
749C000
stack
page read and write
34B0000
trusted library allocation
page read and write
146D000
trusted library allocation
page execute and read and write
4384000
trusted library allocation
page read and write
DB0000
unkown
page readonly
37BD000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
4329000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
3510000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
14A5000
trusted library allocation
page execute and read and write
35AD000
trusted library allocation
page read and write
6810000
heap
page read and write
429F000
trusted library allocation
page read and write
37E4000
trusted library allocation
page read and write
610E000
stack
page read and write
5AC0000
trusted library allocation
page read and write
4285000
trusted library allocation
page read and write
42DF000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
58D0000
heap
page read and write
6180000
trusted library allocation
page execute and read and write
689B000
heap
page read and write
438A000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
439A000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
36B3000
trusted library allocation
page read and write
78AC000
stack
page read and write
37BB000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
162D000
unkown
page read and write
7630000
trusted library allocation
page execute and read and write
14AB000
trusted library allocation
page execute and read and write
42D8000
trusted library allocation
page read and write
1581000
heap
page read and write
7F540000
trusted library allocation
page execute and read and write
357D000
trusted library allocation
page read and write
3684000
trusted library allocation
page read and write
5698000
trusted library allocation
page read and write
5672000
trusted library allocation
page read and write
58BF000
stack
page read and write
14BA000
heap
page read and write
14A0000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
174C000
stack
page read and write
369D000
trusted library allocation
page read and write
F80000
heap
page read and write
6110000
trusted library allocation
page execute and read and write
5188000
trusted library allocation
page read and write
35A0000
trusted library allocation
page read and write
4323000
trusted library allocation
page read and write
432D000
trusted library allocation
page read and write
438E000
trusted library allocation
page read and write
3465000
trusted library allocation
page read and write
36BE000
trusted library allocation
page read and write
14A2000
trusted library allocation
page read and write
142E000
stack
page read and write
3696000
trusted library allocation
page read and write
4372000
trusted library allocation
page read and write
1760000
trusted library allocation
page execute and read and write
440F000
trusted library allocation
page read and write
42F4000
trusted library allocation
page read and write
4315000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
37B2000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page execute and read and write
3504000
trusted library allocation
page read and write
68BB000
heap
page read and write
620E000
stack
page read and write
68AB000
heap
page read and write
78B0000
heap
page read and write
56A2000
trusted library allocation
page read and write
68C2000
heap
page read and write
365C000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
34D6000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
34E8000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
17A0000
heap
page read and write
57BA000
trusted library allocation
page read and write
4419000
trusted library allocation
page read and write
148A000
trusted library allocation
page execute and read and write
1463000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
372C000
trusted library allocation
page read and write
34BC000
trusted library allocation
page read and write
15ED000
stack
page read and write
431B000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
68A1000
heap
page read and write
36A7000
trusted library allocation
page read and write
6B4E000
stack
page read and write
37AC000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
43FD000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5688000
trusted library allocation
page read and write
42FE000
trusted library allocation
page read and write
4487000
trusted library allocation
page read and write
755E000
stack
page read and write
773E000
stack
page read and write
42E9000
trusted library allocation
page read and write
6A0E000
stack
page read and write
6CC0000
trusted library allocation
page read and write
17A7000
heap
page read and write
1750000
heap
page read and write
440C000
trusted library allocation
page read and write
430B000
trusted library allocation
page read and write
1464000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
4345000
trusted library allocation
page read and write
154C000
heap
page read and write
78D8000
heap
page read and write
37B9000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
427D000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
34C9000
trusted library allocation
page read and write
14BE000
heap
page read and write
5684000
trusted library allocation
page read and write
68D0000
heap
page read and write
43C0000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
1430000
heap
page read and write
F1B000
stack
page read and write
1790000
trusted library allocation
page read and write
42E4000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
37C2000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
5A8E000
stack
page read and write
5674000
trusted library allocation
page read and write
16AE000
stack
page read and write
6120000
trusted library allocation
page read and write
34EF000
trusted library allocation
page read and write
4188000
trusted library allocation
page read and write
6B0E000
stack
page read and write
1770000
heap
page read and write
12F9000
stack
page read and write
3763000
trusted library allocation
page read and write
43CE000
trusted library allocation
page read and write
14F5000
heap
page read and write
353C000
trusted library allocation
page read and write
3574000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
688B000
heap
page read and write
5A99000
trusted library allocation
page read and write
5DAC000
stack
page read and write
1534000
heap
page read and write
42CD000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
3170000
heap
page execute and read and write
567C000
trusted library allocation
page read and write
3654000
trusted library allocation
page read and write
43A4000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
14B0000
heap
page read and write
5A4D000
stack
page read and write
4414000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
736D000
stack
page read and write
683F000
heap
page read and write
E80000
unkown
page readonly
F90000
heap
page read and write
4409000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
61C0000
trusted library allocation
page execute and read and write
6C4E000
stack
page read and write
435E000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
42AE000
trusted library allocation
page read and write
587E000
stack
page read and write
43B1000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
330C000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
147D000
trusted library allocation
page execute and read and write
34F9000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
5FAE000
stack
page read and write
43AA000
trusted library allocation
page read and write
4304000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
7CAE000
stack
page read and write
3439000
trusted library allocation
page read and write
7560000
trusted library allocation
page execute and read and write
1482000
trusted library allocation
page read and write
5900000
heap
page execute and read and write
37C6000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
74F0000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
365E000
trusted library allocation
page read and write
7390000
trusted library allocation
page execute and read and write
4320000
trusted library allocation
page read and write
443B000
trusted library allocation
page read and write
6CBB000
stack
page read and write
35B4000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
327E000
trusted library allocation
page read and write
598D000
stack
page read and write
154F000
heap
page read and write
43C4000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
13E5000
heap
page read and write
364B000
trusted library allocation
page read and write
366A000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
3734000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
3722000
trusted library allocation
page read and write
43B7000
trusted library allocation
page read and write
43D3000
trusted library allocation
page read and write
58C0000
heap
page read and write
1450000
trusted library allocation
page read and write
594D000
stack
page read and write
3585000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
FDE000
stack
page read and write
57C0000
trusted library allocation
page execute and read and write
375B000
trusted library allocation
page read and write
170E000
stack
page read and write
6CE0000
trusted library section
page read and write
61A0000
trusted library allocation
page execute and read and write
57A0000
trusted library allocation
page read and write
178C000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
4351000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
57BC000
trusted library allocation
page read and write
14A7000
trusted library allocation
page execute and read and write
4311000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
437D000
trusted library allocation
page read and write
5EAD000
stack
page read and write
78D2000
heap
page read and write
79B0000
heap
page read and write
36EB000
trusted library allocation
page read and write
4406000
trusted library allocation
page read and write
43C9000
trusted library allocation
page read and write
43F6000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
531D000
stack
page read and write
6190000
trusted library allocation
page execute and read and write
35D0000
trusted library allocation
page read and write
349D000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
42B8000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
1486000
trusted library allocation
page execute and read and write
314E000
stack
page read and write
43BB000
trusted library allocation
page read and write
35BF000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
60CC000
stack
page read and write
682B000
heap
page read and write
1490000
heap
page read and write
There are 295 hidden memdumps, click here to show them.