IOC Report
SCB#89940578.exe

loading gif

Files

File Path
Type
Category
Malicious
SCB#89940578.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SCB#89940578.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SCB#89940578.exe
"C:\Users\user\Desktop\SCB#89940578.exe"
malicious
C:\Users\user\Desktop\SCB#89940578.exe
"C:\Users\user\Desktop\SCB#89940578.exe"
malicious

URLs

Name
IP
Malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://45.77.223.48/~blog/?ajax=posts.php
45.77.223.48
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://45.77.223.48/~blog/?feed=comments-rss2
unknown
http://www.fontbureau.com/designers/?
unknown
http://45.77.223.48/~blog/index.php?rest_route=/
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.ibsensoftware.com/
unknown
http://www.sakkal.comJ
unknown
https://api.w.org/
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://45.77.223.48/~blog/?ajax=posts.phpJ
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://45.77.223.48/~blog/?feed=rss2
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 28 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.77.223.48
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4507000
trusted library allocation
page read and write
malicious
3B19000
trusted library allocation
page read and write
malicious
2CD6000
trusted library allocation
page read and write
malicious
C4B000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7BE0000
trusted library section
page read and write
malicious
4756000
trusted library allocation
page read and write
malicious
5290000
trusted library allocation
page execute and read and write
70AE000
stack
page read and write
76AE000
stack
page read and write
D09E000
stack
page read and write
76EE000
stack
page read and write
7A0000
heap
page read and write
2DEE000
trusted library allocation
page read and write
9FD0000
trusted library section
page read and write
4E7D000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
D050000
trusted library allocation
page execute and read and write
5030000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
1038000
trusted library allocation
page read and write
2DE2000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
DB7000
trusted library allocation
page execute and read and write
43CE000
trusted library allocation
page read and write
970000
heap
page read and write
5385000
heap
page read and write
2DDA000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
5000000
heap
page read and write
508B000
stack
page read and write
D84000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
2B00000
heap
page execute and read and write
4EA0000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
79A0000
heap
page read and write
AB5000
heap
page read and write
2E06000
trusted library allocation
page read and write
5380000
heap
page read and write
AD0000
heap
page read and write
5003000
heap
page read and write
BE0000
heap
page read and write
DD0000
heap
page read and write
2DDC000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
D030000
trusted library allocation
page read and write
548E000
stack
page read and write
93C000
stack
page read and write
2CEF000
stack
page read and write
2E04000
trusted library allocation
page read and write
A90000
heap
page read and write
4F20000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
D9D000
trusted library allocation
page execute and read and write
DBB000
trusted library allocation
page execute and read and write
24A0000
heap
page read and write
2DD8000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
C20000
heap
page read and write
AF7000
stack
page read and write
2DE6000
trusted library allocation
page read and write
2DFC000
trusted library allocation
page read and write
612000
unkown
page readonly
4FE0000
trusted library allocation
page read and write
4EA5000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
5090000
trusted library section
page readonly
6B70000
trusted library allocation
page read and write
7BDE000
stack
page read and write
7ADE000
stack
page read and write
4380000
trusted library allocation
page read and write
C25000
heap
page read and write
D83000
trusted library allocation
page execute and read and write
DA6000
trusted library allocation
page execute and read and write
C0E000
stack
page read and write
2DE8000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
DF9000
heap
page read and write
297E000
stack
page read and write
2DF2000
trusted library allocation
page read and write
2D04000
heap
page read and write
2B11000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
782E000
stack
page read and write
2DFA000
trusted library allocation
page read and write
4F22000
trusted library allocation
page read and write
610000
unkown
page readonly
5150000
trusted library allocation
page read and write
2980000
trusted library allocation
page execute and read and write
2DF6000
trusted library allocation
page read and write
54A9000
heap
page read and write
83C000
stack
page read and write
D035000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
75AE000
stack
page read and write
2D9D000
trusted library allocation
page read and write
A8D000
stack
page read and write
50A0000
heap
page read and write
FCF000
stack
page read and write
2DEC000
trusted library allocation
page read and write
10D0000
heap
page read and write
71AE000
stack
page read and write
D2F000
stack
page read and write
DB2000
trusted library allocation
page read and write
2AAE000
stack
page read and write
4E71000
trusted library allocation
page read and write
BC0000
heap
page read and write
54CE000
heap
page read and write
D26E000
stack
page read and write
2CF9000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
54A0000
heap
page read and write
792E000
stack
page read and write
DA2000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
74A000
stack
page read and write
6F70000
heap
page read and write
2990000
heap
page read and write
6B92000
trusted library allocation
page read and write
DDE000
heap
page read and write
7560000
trusted library allocation
page read and write
DDA000
heap
page read and write
3B11000
trusted library allocation
page read and write
2CF9000
heap
page read and write
5490000
heap
page read and write
D80000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
77EE000
stack
page read and write
4E6E000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
E1B000
heap
page read and write
D30000
heap
page read and write
102E000
stack
page read and write
2BEE000
stack
page read and write
5590000
trusted library section
page read and write
54E0000
heap
page read and write
2ADC000
stack
page read and write
5140000
heap
page read and write
5190000
heap
page execute and read and write
441C000
trusted library allocation
page read and write
AB0000
heap
page read and write
C6D000
heap
page read and write
7FE000
stack
page read and write
29DB000
stack
page read and write
4F28000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
D93000
trusted library allocation
page read and write
DC0000
heap
page read and write
5010000
trusted library allocation
page read and write
7B0000
heap
page read and write
BE8000
heap
page read and write
D8D000
trusted library allocation
page execute and read and write
4F30000
trusted library allocation
page execute and read and write
2DDE000
trusted library allocation
page read and write
10D7000
heap
page read and write
E6A000
heap
page read and write
FE0000
trusted library allocation
page read and write
5130000
heap
page read and write
AC0000
heap
page read and write
2D84000
trusted library allocation
page read and write
55A0000
trusted library allocation
page execute and read and write
2DF8000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
E16000
heap
page read and write
4A0000
remote allocation
page execute and read and write
E19000
heap
page read and write
2BAF000
stack
page read and write
516F000
trusted library allocation
page read and write
28EE000
stack
page read and write
7370000
trusted library allocation
page execute and read and write
DAA000
trusted library allocation
page execute and read and write
4F10000
heap
page read and write
4E82000
trusted library allocation
page read and write
There are 172 hidden memdumps, click here to show them.