IOC Report
fresh_shrunk.exe

loading gif

Files

File Path
Type
Category
Malicious
fresh_shrunk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bddddsx.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fresh_shrunk.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fresh_shrunk.exe
"C:\Users\user\Desktop\fresh_shrunk.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\bddddsx"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\Desktop\fresh_shrunk.exe" "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe"
malicious
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\bddddsx"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe" "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
vbdsg.duckdns.org
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
vbdsg.duckdns.org
57.128.155.22
malicious

IPs

IP
Domain
Country
Malicious
57.128.155.22
vbdsg.duckdns.org
Belgium
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2861000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2FB1000
trusted library allocation
page read and write
malicious
2DF1000
trusted library allocation
page read and write
malicious
1266000
heap
page read and write
2E00000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
31F0000
heap
page read and write
2FEE000
unkown
page read and write
1110000
trusted library allocation
page read and write
10F2000
trusted library allocation
page read and write
2674000
trusted library allocation
page read and write
1178000
heap
page read and write
2DA0000
heap
page execute and read and write
526A000
stack
page read and write
10ED000
trusted library allocation
page execute and read and write
2DA7000
trusted library allocation
page execute and read and write
63F9000
heap
page read and write
3240000
heap
page read and write
30CE000
stack
page read and write
D7B000
stack
page read and write
2D70000
trusted library allocation
page read and write
2E50000
trusted library allocation
page execute and read and write
366F000
stack
page read and write
1080000
heap
page read and write
2DC4000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
FD1000
heap
page read and write
2670000
trusted library allocation
page read and write
1170000
heap
page read and write
5AF0000
heap
page read and write
14F0000
heap
page read and write
26A0000
trusted library allocation
page read and write
117E000
heap
page read and write
2D40000
trusted library allocation
page read and write
555E000
stack
page read and write
2EA0000
heap
page read and write
FD8000
heap
page read and write
1000000
heap
page read and write
2D96000
trusted library allocation
page execute and read and write
4F70000
heap
page execute and read and write
573F000
stack
page read and write
10D4000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
2E80000
heap
page read and write
123E000
heap
page read and write
493C000
stack
page read and write
2DC0000
trusted library allocation
page read and write
5B0000
unkown
page readonly
285D000
stack
page read and write
50AD000
stack
page read and write
2E5E000
stack
page read and write
52D6000
trusted library allocation
page read and write
4EEE000
stack
page read and write
1150000
heap
page read and write
D78000
stack
page read and write
5295000
heap
page read and write
320E000
stack
page read and write
6A0D000
stack
page read and write
2B20000
heap
page read and write
7F170000
trusted library allocation
page execute and read and write
5A1E000
stack
page read and write
3DF1000
trusted library allocation
page read and write
112A000
trusted library allocation
page execute and read and write
2D10000
heap
page read and write
ACA000
heap
page read and write
268D000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
4DEB000
trusted library allocation
page read and write
2D20000
heap
page read and write
14EC000
stack
page read and write
6E0C000
stack
page read and write
54CE000
stack
page read and write
308F000
unkown
page read and write
110B000
trusted library allocation
page execute and read and write
4F2E000
stack
page read and write
4DD5000
trusted library allocation
page read and write
2D0E000
stack
page read and write
1212000
heap
page read and write
2DD0000
trusted library allocation
page execute and read and write
10F0000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
A5D000
heap
page read and write
3250000
heap
page read and write
1059000
heap
page read and write
2C40000
heap
page read and write
3E58000
trusted library allocation
page read and write
322F000
stack
page read and write
9E0000
heap
page read and write
5330000
heap
page read and write
40C000
remote allocation
page execute and read and write
11B3000
trusted library allocation
page execute and read and write
7F4D0000
trusted library allocation
page execute and read and write
1020000
heap
page read and write
6A4C000
stack
page read and write
2D90000
trusted library allocation
page read and write
C2E000
stack
page read and write
2FAE000
stack
page read and write
104E000
heap
page read and write
254D000
stack
page read and write
507E000
stack
page read and write
52B0000
trusted library allocation
page read and write
11FE000
heap
page read and write
5480000
trusted library allocation
page read and write
2ACE000
stack
page read and write
25FE000
unkown
page read and write
267D000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
623E000
stack
page read and write
2E09000
trusted library allocation
page read and write
4DA4000
trusted library allocation
page read and write
F3E000
stack
page read and write
2E3F000
unkown
page read and write
2730000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
146E000
stack
page read and write
1130000
trusted library allocation
page read and write
4DFD000
trusted library allocation
page read and write
1176000
heap
page read and write
2D70000
heap
page execute and read and write
1510000
trusted library allocation
page execute and read and write
ACE000
heap
page read and write
1100000
trusted library allocation
page read and write
59DE000
stack
page read and write
1160000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2D80000
heap
page read and write
54D9000
stack
page read and write
52C2000
trusted library allocation
page read and write
1090000
heap
page read and write
323E000
stack
page read and write
340C000
heap
page read and write
304F000
trusted library allocation
page read and write
35FF000
unkown
page read and write
63E8000
heap
page read and write
31CF000
stack
page read and write
1102000
trusted library allocation
page read and write
FC4000
heap
page read and write
10F7000
stack
page read and write
A2A000
heap
page read and write
58E1000
trusted library allocation
page read and write
4DE9000
trusted library allocation
page read and write
2C0D000
stack
page read and write
680E000
stack
page read and write
2C4B000
heap
page read and write
1202000
heap
page read and write
126B000
heap
page read and write
28C4000
trusted library allocation
page read and write
125C000
stack
page read and write
A10000
heap
page read and write
5288000
heap
page read and write
2E80000
heap
page execute and read and write
558E000
stack
page read and write
2E92000
trusted library allocation
page read and write
1256000
heap
page read and write
2E10000
trusted library allocation
page read and write
3800000
heap
page read and write
2D60000
trusted library allocation
page read and write
303D000
stack
page read and write
1104000
trusted library allocation
page read and write
1231000
heap
page read and write
2D30000
trusted library allocation
page read and write
3180000
heap
page read and write
116E000
stack
page read and write
52CA000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
EF7000
stack
page read and write
1197000
heap
page read and write
2D9A000
trusted library allocation
page execute and read and write
57F7000
heap
page read and write
2ADE000
unkown
page read and write
3377000
heap
page read and write
2C5D000
stack
page read and write
DF0000
heap
page read and write
2B0E000
stack
page read and write
121D000
heap
page read and write
A47000
heap
page read and write
5D6000
unkown
page readonly
ABE000
heap
page read and write
F90000
heap
page read and write
5C7000
unkown
page readonly
A50000
heap
page read and write
26A7000
trusted library allocation
page execute and read and write
AC6000
heap
page read and write
2CFD000
stack
page read and write
6F0E000
stack
page read and write
11F2000
heap
page read and write
F7C000
stack
page read and write
11A1000
heap
page read and write
1137000
trusted library allocation
page execute and read and write
2CA1000
heap
page read and write
1243000
heap
page read and write
3320000
direct allocation
page read and write
2660000
trusted library allocation
page read and write
2680000
trusted library allocation
page read and write
2DA0000
heap
page execute and read and write
125D000
heap
page read and write
2C8E000
stack
page read and write
2B1E000
stack
page read and write
513E000
stack
page read and write
2D10000
trusted library allocation
page execute and read and write
10AE000
stack
page read and write
6C4E000
stack
page read and write
DC5000
heap
page read and write
3FB1000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
2D8F000
stack
page read and write
559E000
stack
page read and write
1494000
trusted library allocation
page read and write
111D000
trusted library allocation
page execute and read and write
5ADF000
stack
page read and write
10DD000
trusted library allocation
page execute and read and write
1120000
trusted library allocation
page read and write
285E000
stack
page read and write
2720000
heap
page execute and read and write
4F52000
trusted library allocation
page read and write
136F000
stack
page read and write
3861000
trusted library allocation
page read and write
DF0000
heap
page read and write
3E19000
trusted library allocation
page read and write
ED0000
heap
page read and write
5333000
heap
page read and write
517E000
stack
page read and write
5AC1000
trusted library allocation
page read and write
270E000
stack
page read and write
10FA000
trusted library allocation
page execute and read and write
D2E000
stack
page read and write
F9B000
heap
page read and write
1219000
heap
page read and write
2DB0000
trusted library allocation
page read and write
26AB000
trusted library allocation
page execute and read and write
2DE0000
heap
page read and write
A20000
heap
page read and write
2A0E000
stack
page read and write
1259000
heap
page read and write
26C0000
trusted library allocation
page read and write
AA9000
heap
page read and write
14A0000
heap
page read and write
BDC000
stack
page read and write
569F000
stack
page read and write
25B0000
heap
page read and write
DC0000
heap
page read and write
E6F000
stack
page read and write
2E0E000
stack
page read and write
52BB000
trusted library allocation
page read and write
554E000
stack
page read and write
527F000
stack
page read and write
11A0000
trusted library allocation
page read and write
31CE000
unkown
page read and write
29AD000
stack
page read and write
2A4E000
stack
page read and write
664D000
stack
page read and write
2710000
trusted library allocation
page execute and read and write
32D0000
heap
page read and write
2B30000
direct allocation
page read and write
2D80000
trusted library allocation
page execute and read and write
110D000
trusted library allocation
page execute and read and write
2BCF000
unkown
page read and write
269A000
trusted library allocation
page execute and read and write
300F000
trusted library allocation
page read and write
1107000
trusted library allocation
page execute and read and write
A7C000
heap
page read and write
690C000
stack
page read and write
5B80000
heap
page read and write
1221000
heap
page read and write
58DE000
stack
page read and write
31A0000
heap
page read and write
D6E000
stack
page read and write
28BF000
trusted library allocation
page read and write
C7B000
stack
page read and write
10E0000
trusted library allocation
page read and write
11B4000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
33F0000
heap
page read and write
52B6000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
57E0000
heap
page read and write
2D40000
heap
page read and write
106E000
stack
page read and write
11F3000
heap
page read and write
3210000
heap
page read and write
2673000
trusted library allocation
page execute and read and write
313D000
stack
page read and write
2D20000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
5B70000
trusted library allocation
page execute and read and write
2D59000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
2F8F000
stack
page read and write
14AE000
stack
page read and write
10E3000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
5B2000
unkown
page readonly
5B10000
heap
page read and write
3390000
heap
page read and write
1068000
heap
page read and write
F40000
heap
page read and write
9A5000
heap
page read and write
532C000
stack
page read and write
2DA0000
trusted library allocation
page read and write
63D0000
heap
page read and write
550E000
stack
page read and write
2F8E000
unkown
page read and write
2D50000
trusted library allocation
page read and write
86C000
stack
page read and write
4A3D000
stack
page read and write
56E0000
heap
page read and write
5B30000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
2E4D000
stack
page read and write
1229000
heap
page read and write
113B000
trusted library allocation
page execute and read and write
3400000
heap
page read and write
57D0000
heap
page execute and read and write
55DD000
stack
page read and write
5A9E000
stack
page read and write
3370000
heap
page read and write
2B50000
heap
page read and write
52CE000
trusted library allocation
page read and write
2A8E000
stack
page read and write
4DF0000
trusted library allocation
page read and write
1140000
heap
page read and write
2E7F000
stack
page read and write
2F60000
heap
page read and write
A2E000
heap
page read and write
1040000
heap
page read and write
DD0000
heap
page read and write
1127000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
10F6000
trusted library allocation
page execute and read and write
52DD000
trusted library allocation
page read and write
1103000
trusted library allocation
page execute and read and write
5485000
trusted library allocation
page read and write
AD6000
heap
page read and write
2DAB000
trusted library allocation
page execute and read and write
10B5000
heap
page read and write
10D0000
trusted library allocation
page read and write
2A10000
heap
page read and write
2E05000
heap
page read and write
A43000
heap
page read and write
AFB000
heap
page read and write
1193000
heap
page read and write
2750000
heap
page read and write
1170000
heap
page read and write
312E000
stack
page read and write
10D3000
trusted library allocation
page execute and read and write
28FD000
stack
page read and write
2E03000
heap
page read and write
1188000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
581E000
stack
page read and write
2DE0000
heap
page read and write
2D3D000
trusted library allocation
page read and write
11AE000
heap
page read and write
2DC0000
heap
page read and write
5D0000
unkown
page readonly
29C0000
heap
page read and write
2D5D000
stack
page read and write
3030000
heap
page execute and read and write
4F61000
trusted library allocation
page read and write
2740000
trusted library allocation
page execute and read and write
2DE8000
heap
page read and write
5A5E000
stack
page read and write
66CD000
stack
page read and write
52BE000
trusted library allocation
page read and write
36FF000
stack
page read and write
5AB0000
heap
page read and write
1100000
heap
page read and write
6B4E000
stack
page read and write
2E80000
heap
page read and write
FCF000
heap
page read and write
10B0000
heap
page read and write
356F000
unkown
page read and write
670E000
stack
page read and write
2697000
trusted library allocation
page execute and read and write
5590000
heap
page read and write
591F000
stack
page read and write
11E2000
heap
page read and write
2DD0000
heap
page read and write
10F0000
trusted library allocation
page read and write
2C54000
heap
page read and write
56DE000
stack
page read and write
31EE000
unkown
page read and write
122D000
heap
page read and write
FF0000
heap
page read and write
295B000
stack
page read and write
4EED000
stack
page read and write
30EF000
unkown
page read and write
11C0000
heap
page read and write
2F3F000
stack
page read and write
148E000
stack
page read and write
313D000
stack
page read and write
52AE000
stack
page read and write
967000
stack
page read and write
2D4B000
heap
page read and write
57DF000
stack
page read and write
400000
remote allocation
page execute and read and write
2AC0000
heap
page read and write
5280000
heap
page read and write
1225000
heap
page read and write
7F690000
trusted library allocation
page execute and read and write
2690000
trusted library allocation
page read and write
3041000
trusted library allocation
page read and write
11EB000
heap
page read and write
2D80000
trusted library allocation
page read and write
2C8B000
heap
page read and write
118E000
stack
page read and write
1260000
heap
page read and write
4D90000
trusted library allocation
page read and write
56D9000
stack
page read and write
4EAE000
stack
page read and write
303D000
stack
page read and write
9F0000
heap
page read and write
2E70000
heap
page read and write
2E02000
heap
page read and write
11F6000
heap
page read and write
1267000
heap
page read and write
There are 408 hidden memdumps, click here to show them.