IOC Report
SCTR11670000pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
SCTR11670000pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SCTR11670000pdf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SCTR11670000pdf.exe
"C:\Users\user\Desktop\SCTR11670000pdf.exe"
malicious
C:\Users\user\Desktop\SCTR11670000pdf.exe
"C:\Users\user\Desktop\SCTR11670000pdf.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://136.244.109.75/index.php/690877741063
136.244.109.75
malicious
http://alphastand.top/alien/fre.php
malicious
http://136.244.109.75/index.php/feed/
unknown
http://136.244.109.75/index.php/comments/feed/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.ibsensoftware.com/
unknown
http://gmpg.org/xfn/11
unknown

IPs

IP
Domain
Country
Malicious
136.244.109.75
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
13B8000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2801000
trusted library allocation
page read and write
malicious
3BBF000
trusted library allocation
page read and write
malicious
3BA5000
trusted library allocation
page read and write
malicious
3F0000
unkown
page readonly
FBE000
stack
page read and write
BFB000
stack
page read and write
5280000
heap
page read and write
26F0000
heap
page read and write
A46000
trusted library allocation
page execute and read and write
2614000
trusted library allocation
page read and write
2F1F000
stack
page read and write
4808000
trusted library allocation
page read and write
5CAE000
stack
page read and write
53E0000
trusted library section
page read and write
13B0000
heap
page read and write
5BD000
stack
page read and write
FC0000
heap
page read and write
3010000
heap
page read and write
5420000
trusted library section
page read and write
C40000
trusted library allocation
page read and write
513E000
stack
page read and write
49F000
remote allocation
page execute and read and write
3A1E000
trusted library allocation
page read and write
2642000
trusted library allocation
page read and write
C20000
heap
page read and write
A00000
trusted library allocation
page read and write
5140000
heap
page read and write
C10000
heap
page read and write
5D60000
trusted library allocation
page read and write
5EDE000
stack
page read and write
29C7000
trusted library allocation
page read and write
AF8000
heap
page read and write
A1D000
trusted library allocation
page execute and read and write
A30000
trusted library allocation
page read and write
345F000
stack
page read and write
2636000
trusted library allocation
page read and write
138E000
stack
page read and write
5B3D000
stack
page read and write
52B0000
trusted library allocation
page execute and read and write
5D90000
trusted library allocation
page execute and read and write
560000
heap
page read and write
2F5E000
stack
page read and write
499C000
stack
page read and write
AA2000
heap
page read and write
266F000
trusted library allocation
page read and write
839E000
stack
page read and write
2675000
trusted library allocation
page read and write
4D60000
trusted library allocation
page execute and read and write
2690000
heap
page execute and read and write
3F2000
unkown
page readonly
5D50000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
7F6B0000
trusted library allocation
page execute and read and write
4E60000
heap
page execute and read and write
2660000
trusted library allocation
page read and write
4E5E000
stack
page read and write
5B7E000
stack
page read and write
A3D000
trusted library allocation
page execute and read and write
A10000
trusted library allocation
page read and write
D5F000
stack
page read and write
1580000
heap
page read and write
B54000
heap
page read and write
267A000
trusted library allocation
page read and write
A14000
trusted library allocation
page read and write
A42000
trusted library allocation
page read and write
47A000
unkown
page readonly
5AF3000
trusted library allocation
page read and write
8F7000
stack
page read and write
5290000
trusted library allocation
page read and write
BBE000
stack
page read and write
355F000
stack
page read and write
27FE000
stack
page read and write
5AF0000
trusted library allocation
page read and write
5C6E000
stack
page read and write
F40000
heap
page read and write
3BD9000
trusted library allocation
page read and write
2864000
trusted library allocation
page read and write
A20000
heap
page read and write
C50000
heap
page read and write
13DF000
heap
page read and write
262E000
trusted library allocation
page read and write
FE0000
heap
page read and write
859F000
stack
page read and write
4E70000
heap
page read and write
570000
heap
page read and write
1590000
heap
page read and write
5DDE000
stack
page read and write
53F0000
trusted library allocation
page read and write
263D000
trusted library allocation
page read and write
4F7E000
stack
page read and write
F0C000
stack
page read and write
849F000
stack
page read and write
12FC000
stack
page read and write
5D6A000
trusted library allocation
page read and write
869F000
stack
page read and write
2680000
trusted library allocation
page read and write
A4A000
trusted library allocation
page execute and read and write
261B000
trusted library allocation
page read and write
5CF0000
trusted library section
page read and write
26C0000
trusted library allocation
page read and write
A6E000
heap
page read and write
A25000
heap
page read and write
52C0000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
4F80000
trusted library section
page read and write
F70000
heap
page read and write
A6A000
heap
page read and write
B05000
heap
page read and write
ADC000
heap
page read and write
3805000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
509000
stack
page read and write
4E73000
heap
page read and write
5AE0000
trusted library allocation
page execute and read and write
59E0000
heap
page read and write
E5E000
stack
page read and write
A60000
heap
page read and write
52E0000
heap
page read and write
503B000
stack
page read and write
A5B000
trusted library allocation
page execute and read and write
A52000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
5410000
trusted library section
page read and write
3801000
trusted library allocation
page read and write
C00000
trusted library allocation
page execute and read and write
52A0000
heap
page read and write
A13000
trusted library allocation
page execute and read and write
A57000
trusted library allocation
page execute and read and write
2866000
trusted library allocation
page read and write
3A6C000
trusted library allocation
page read and write
F45000
heap
page read and write
AA4000
heap
page read and write
5FE000
stack
page read and write
4D50000
trusted library allocation
page read and write
There are 128 hidden memdumps, click here to show them.