IOC Report
952cgs4G29.exe

loading gif

Files

File Path
Type
Category
Malicious
952cgs4G29.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\952cgs4G29.exe
"C:\Users\user\Desktop\952cgs4G29.exe"
malicious

URLs

Name
IP
Malicious
http://crl.micro
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
rootsaul.duckdns.org
45.128.96.204
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
45.128.96.204
rootsaul.duckdns.org
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D42000
unkown
page readonly
malicious
30F1000
trusted library allocation
page read and write
malicious
5D3E000
stack
page read and write
5AFF000
stack
page read and write
1240000
heap
page read and write
5776000
heap
page read and write
318B000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5C3D000
stack
page read and write
668D000
stack
page read and write
5D49000
trusted library allocation
page read and write
2E8E000
stack
page read and write
2FB0000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
5E60000
heap
page read and write
59FC000
stack
page read and write
1697000
heap
page read and write
D52000
unkown
page readonly
60EE000
stack
page read and write
71EE000
stack
page read and write
2E20000
trusted library allocation
page read and write
563E000
heap
page read and write
2E2B000
trusted library allocation
page execute and read and write
70EC000
stack
page read and write
5613000
heap
page read and write
2E40000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page execute and read and write
564C000
heap
page read and write
5636000
heap
page read and write
5600000
heap
page read and write
DEC000
stack
page read and write
40F7000
trusted library allocation
page read and write
1367000
heap
page read and write
5D40000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page execute and read and write
30EE000
stack
page read and write
40F9000
trusted library allocation
page read and write
562E000
heap
page read and write
2E27000
trusted library allocation
page execute and read and write
1179000
heap
page read and write
2DB0000
heap
page read and write
658C000
stack
page read and write
1150000
heap
page read and write
D40000
unkown
page readonly
2E10000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
1340000
heap
page read and write
55F0000
heap
page execute and read and write
2DF4000
trusted library allocation
page read and write
684D000
stack
page read and write
5D84000
trusted library allocation
page read and write
1250000
heap
page read and write
7F590000
trusted library allocation
page execute and read and write
2FE0000
heap
page read and write
57E0000
heap
page read and write
11CC000
heap
page read and write
2EF0000
heap
page execute and read and write
1158000
heap
page read and write
1260000
heap
page read and write
2E16000
trusted library allocation
page execute and read and write
66CE000
stack
page read and write
1204000
heap
page read and write
5E80000
heap
page read and write
5FEE000
stack
page read and write
2DAD000
stack
page read and write
2DF0000
trusted library allocation
page read and write
644E000
stack
page read and write
2ECC000
stack
page read and write
6E6E000
stack
page read and write
6F6E000
stack
page read and write
63CE000
stack
page read and write
13AE000
stack
page read and write
5DFE000
stack
page read and write
2E12000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5700000
heap
page read and write
640F000
stack
page read and write
2E00000
trusted library allocation
page read and write
10F9000
stack
page read and write
5D94000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
57E7000
heap
page read and write
2DFD000
trusted library allocation
page execute and read and write
670E000
stack
page read and write
5E90000
heap
page read and write
2DE0000
trusted library allocation
page read and write
556E000
stack
page read and write
5E70000
heap
page read and write
2EE0000
trusted library allocation
page read and write
1690000
heap
page read and write
55EE000
stack
page read and write
51ED000
stack
page read and write
5DA9000
trusted library allocation
page read and write
5E5D000
stack
page read and write
2ED0000
trusted library allocation
page execute and read and write
1187000
heap
page read and write
5629000
heap
page read and write
57E4000
heap
page read and write
2F08000
trusted library allocation
page read and write
654E000
stack
page read and write
1185000
heap
page read and write
167C000
stack
page read and write
55AE000
stack
page read and write
40F1000
trusted library allocation
page read and write
1360000
heap
page read and write
1255000
heap
page read and write
674C000
stack
page read and write
2E22000
trusted library allocation
page read and write
5BFD000
stack
page read and write
14AE000
stack
page read and write
There are 101 hidden memdumps, click here to show them.