IOC Report
SHIPMENTDOCUMENTSPDF.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe
"C:\Users\user\Desktop\SHIPMENTDOCUMENTSPDF.exe"
malicious

URLs

Name
IP
Malicious
goodies.dynamic-dns.net
malicious
https://github.com/syohex/java-simple-mine-sweeperC:
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\ActiveMovie\devenum
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
2910000
direct allocation
page execute and read and write
malicious
B7F000
direct allocation
page readonly
malicious
A44000
direct allocation
page readonly
malicious
688D8F7000
stack
page read and write
21734F93000
heap
page read and write
21734429000
heap
page read and write
1000FE000
stack
page read and write
1710B856000
heap
page read and write
23457471000
heap
page read and write
217344B4000
heap
page read and write
1BA8DA02000
trusted library allocation
page read and write
21734F85000
heap
page read and write
217343F0000
remote allocation
page read and write
21734F7E000
heap
page read and write
970000
heap
page read and write
1BBF4B8D000
heap
page read and write
21734FD7000
heap
page read and write
22106629000
heap
page read and write
10DD000
unkown
page execute read
21734F89000
heap
page read and write
217343F0000
remote allocation
page read and write
83E000
stack
page read and write
167319EB000
heap
page read and write
23DC15C000
stack
page read and write
973000
heap
page read and write
21734F23000
heap
page read and write
21734F89000
heap
page read and write
1BA8D081000
heap
page read and write
21734FAF000
heap
page read and write
21734F91000
heap
page read and write
21735400000
heap
page read and write
10DD000
unkown
page execute read
21734F85000
heap
page read and write
A31000
direct allocation
page execute read
133F000
unkown
page readonly
2345748A000
heap
page read and write
21734455000
heap
page read and write
9CD60FC000
stack
page read and write
16731860000
heap
page read and write
167319A0000
heap
page read and write
16731BB0000
heap
page read and write
21735403000
heap
page read and write
21734F5F000
heap
page read and write
390E000
trusted library allocation
page read and write
10D1000
unkown
page execute read
1BFA7F9000
stack
page read and write
21734F61000
heap
page read and write
21734F85000
heap
page read and write
688DAF8000
stack
page read and write
21734F9A000
heap
page read and write
21734F85000
heap
page read and write
1710B888000
heap
page read and write
217344A9000
heap
page read and write
1BA8D052000
heap
page read and write
1BBF4BAE000
heap
page read and write
21734F83000
heap
page read and write
259A4FE000
stack
page read and write
22106400000
heap
page read and write
21734F77000
heap
page read and write
1BA8D013000
heap
page read and write
1005FB000
stack
page read and write
23457513000
heap
page read and write
1BA8D113000
heap
page read and write
21734F6F000
heap
page read and write
21734F83000
heap
page read and write
23DC777000
stack
page read and write
96A000
heap
page read and write
1BFA77E000
stack
page read and write
9CD5BAA000
stack
page read and write
1BBF4BA6000
heap
page read and write
22106670000
heap
page read and write
21735402000
heap
page read and write
21735402000
heap
page read and write
259AAFF000
stack
page read and write
21734F9F000
heap
page read and write
1BFA47C000
stack
page read and write
1710B88F000
heap
page read and write
21734FFE000
heap
page read and write
1BA8D047000
heap
page read and write
1BBF4BAE000
heap
page read and write
1BBF4BBA000
heap
page read and write
21734F7E000
heap
page read and write
21734F89000
heap
page read and write
384B000
trusted library allocation
page read and write
21734F94000
heap
page read and write
930000
heap
page read and write
1BBF4B80000
heap
page read and write
23457C02000
trusted library allocation
page read and write
22106E02000
trusted library allocation
page read and write
2173444E000
heap
page read and write
21734F86000
heap
page read and write
21734F83000
heap
page read and write
1710B800000
heap
page read and write
6DC167F000
stack
page read and write
285F000
stack
page read and write
2345743C000
heap
page read and write
1BBF4B97000
heap
page read and write
21734F87000
heap
page read and write
16732920000
trusted library allocation
page read and write
217344F9000
heap
page read and write
1BA8D102000
heap
page read and write
10D9000
unkown
page execute read
221063A0000
heap
page read and write
21734458000
heap
page read and write
23457502000
heap
page read and write
1BBF4AB0000
heap
page read and write
21734F91000
heap
page read and write
6DC1477000
stack
page read and write
1BA8CF70000
trusted library allocation
page read and write
1BBF4BBE000
heap
page read and write
21734F22000
heap
page read and write
1BBF4B97000
heap
page read and write
1BFA6FC000
stack
page read and write
1BA8D000000
heap
page read and write
1007FE000
stack
page read and write
21734FB4000
heap
page read and write
21734F87000
heap
page read and write
21734F8D000
heap
page read and write
21734F87000
heap
page read and write
21734FA1000
heap
page read and write
21734FB4000
heap
page read and write
21734F9F000
heap
page read and write
3847000
trusted library allocation
page read and write
1BBF4BA7000
heap
page read and write
21734FAF000
heap
page read and write
2210664B000
heap
page read and write
21734F87000
heap
page read and write
23457466000
heap
page read and write
1BA8D060000
heap
page read and write
217342E0000
heap
page read and write
688DD78000
stack
page read and write
21734F96000
heap
page read and write
2345745D000
heap
page read and write
23457220000
heap
page read and write
21734F8D000
heap
page read and write
21734F6F000
heap
page read and write
9CD5FF9000
stack
page read and write
21734F7E000
heap
page read and write
1710B852000
heap
page read and write
28D0000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
2173445D000
heap
page read and write
688D2EB000
stack
page read and write
1BFA679000
stack
page read and write
1710B5C0000
heap
page read and write
259A9FE000
stack
page read and write
21734F95000
heap
page read and write
21734F75000
heap
page read and write
16731870000
trusted library allocation
page read and write
1710B87E000
heap
page read and write
21734F96000
heap
page read and write
259A57E000
stack
page read and write
23DC67B000
stack
page read and write
22106700000
heap
page read and write
3AC000
stack
page read and write
96A000
heap
page read and write
21734F8B000
heap
page read and write
23457230000
heap
page read and write
1BA8CF40000
heap
page read and write
21734380000
trusted library allocation
page read and write
7F0000
heap
page read and write
21734F77000
heap
page read and write
23457400000
heap
page read and write
217344C0000
heap
page read and write
21734F9E000
heap
page read and write
1BBF4B8B000
heap
page read and write
21734F9E000
heap
page read and write
23DC47F000
stack
page read and write
259A8F7000
stack
page read and write
16731BC0000
trusted library allocation
page read and write
21734F8D000
heap
page read and write
1710B902000
heap
page read and write
217344AA000
heap
page read and write
1BA8D05F000
heap
page read and write
A49000
direct allocation
page read and write
16731AC0000
heap
page read and write
1BA8D108000
heap
page read and write
22106713000
heap
page read and write
10D0000
unkown
page readonly
3500000
heap
page read and write
23457508000
heap
page read and write
23457466000
heap
page read and write
21734F75000
heap
page read and write
21734F85000
heap
page read and write
119F000
unkown
page execute read
1710B5B0000
heap
page read and write
1BBF4E25000
heap
page read and write
6FC000
stack
page read and write
21735402000
heap
page read and write
96A000
heap
page read and write
96A000
heap
page read and write
2210663C000
heap
page read and write
16732900000
heap
page readonly
16731B30000
trusted library allocation
page read and write
688DB7F000
unkown
page read and write
21734F85000
heap
page read and write
B7D000
direct allocation
page read and write
6DC157F000
stack
page read and write
22106650000
heap
page read and write
133B000
unkown
page readonly
217343F0000
remote allocation
page read and write
217344FB000
heap
page read and write
11D2000
unkown
page write copy
688DC78000
stack
page read and write
23DC87F000
stack
page read and write
22106602000
heap
page read and write
10007C000
stack
page read and write
1BBF4BAE000
heap
page read and write
1BBF4B92000
heap
page read and write
21735403000
heap
page read and write
9CD5E7F000
stack
page read and write
1BA8D05D000
heap
page read and write
21734F20000
heap
page read and write
1BBF4BC6000
heap
page read and write
96C000
heap
page read and write
22106702000
heap
page read and write
21734F75000
heap
page read and write
21734FFF000
heap
page read and write
1BA8CED0000
heap
page read and write
21734FAB000
heap
page read and write
21734F7E000
heap
page read and write
1710B871000
heap
page read and write
1336000
unkown
page read and write
21734513000
heap
page read and write
1BA8D029000
heap
page read and write
21734F80000
heap
page read and write
21734F9E000
heap
page read and write
21734471000
heap
page read and write
21734502000
heap
page read and write
6DC127B000
stack
page read and write
1BBF4960000
heap
page read and write
22106688000
heap
page read and write
16731BA0000
trusted library allocation
page read and write
3F0000
trusted library allocation
page read and write
167319EB000
heap
page read and write
688D9FE000
stack
page read and write
8FE000
stack
page read and write
21734FA0000
heap
page read and write
11A3000
unkown
page readonly
21734F87000
heap
page read and write
956000
heap
page read and write
23457390000
trusted library allocation
page read and write
16731B40000
trusted library allocation
page read and write
21734F96000
heap
page read and write
11A3000
unkown
page readonly
11D2000
unkown
page write copy
16731BB9000
heap
page read and write
23DC97E000
stack
page read and write
10D0000
unkown
page readonly
1710B720000
trusted library allocation
page read and write
21734F9C000
heap
page read and write
3AA3000
trusted library allocation
page read and write
21734FFF000
heap
page read and write
21734F87000
heap
page read and write
21735462000
heap
page read and write
1BBF4BC4000
heap
page read and write
167319E3000
heap
page read and write
21734FA0000
heap
page read and write
1710B913000
heap
page read and write
259A47B000
stack
page read and write
217344E3000
heap
page read and write
21734400000
heap
page read and write
259A6FF000
stack
page read and write
16731BB5000
heap
page read and write
1710B82A000
heap
page read and write
1336000
unkown
page write copy
23457453000
heap
page read and write
2900000
heap
page read and write
21734350000
heap
page read and write
217342F0000
heap
page read and write
956000
heap
page read and write
6DC107B000
stack
page read and write
1BBF4A90000
heap
page read and write
21735402000
heap
page read and write
2345747E000
heap
page read and write
1710B908000
heap
page read and write
21734F78000
heap
page read and write
167319A7000
heap
page read and write
259A7FB000
stack
page read and write
21734F75000
heap
page read and write
21734FFF000
heap
page read and write
2345744D000
heap
page read and write
688D3EE000
stack
page read and write
1BBF4E20000
heap
page read and write
1710B84D000
heap
page read and write
87E000
stack
page read and write
21734F75000
heap
page read and write
1710B87C000
heap
page read and write
2903000
heap
page read and write
21734F9E000
heap
page read and write
688D36F000
stack
page read and write
21734F00000
heap
page read and write
1008FF000
stack
page read and write
340C000
stack
page read and write
1BA8D100000
heap
page read and write
22106500000
trusted library allocation
page read and write
21734FA0000
heap
page read and write
21734FAF000
heap
page read and write
21734F9E000
heap
page read and write
16731AA0000
heap
page read and write
21734F17000
heap
page read and write
1BBF4BA4000
heap
page read and write
22106652000
heap
page read and write
10017E000
stack
page read and write
21734F75000
heap
page read and write
21734FD7000
heap
page read and write
22106613000
heap
page read and write
10D1000
unkown
page execute read
2173443C000
heap
page read and write
1BA8D002000
heap
page read and write
21734FC4000
heap
page read and write
21734F83000
heap
page read and write
21734508000
heap
page read and write
2173444C000
heap
page read and write
23457402000
heap
page read and write
23457413000
heap
page read and write
920000
trusted library allocation
page read and write
21734F89000
heap
page read and write
1BA8D08D000
heap
page read and write
21734F81000
heap
page read and write
21734F8B000
heap
page read and write
2210664D000
heap
page read and write
1BBF4BBA000
heap
page read and write
1BBF4BBA000
heap
page read and write
21735402000
heap
page read and write
21734F87000
heap
page read and write
1BA8CEE0000
heap
page read and write
943000
heap
page read and write
1006F7000
stack
page read and write
21734F9E000
heap
page read and write
2210667D000
heap
page read and write
6DC10FD000
stack
page read and write
21734FAE000
heap
page read and write
133B000
unkown
page readonly
21734FFF000
heap
page read and write
23457290000
heap
page read and write
956000
heap
page read and write
2173444D000
heap
page read and write
21734F8B000
heap
page read and write
167328F0000
trusted library allocation
page read and write
688D7F7000
stack
page read and write
217344C7000
heap
page read and write
167319EB000
heap
page read and write
9CD5F79000
stack
page read and write
A30000
direct allocation
page read and write
21734FC0000
heap
page read and write
6DC117E000
stack
page read and write
10BF000
stack
page read and write
340000
heap
page read and write
21734F8B000
heap
page read and write
21734F81000
heap
page read and write
21734516000
heap
page read and write
21734F8F000
heap
page read and write
21734F8D000
heap
page read and write
2345742A000
heap
page read and write
167326B0000
trusted library allocation
page read and write
21734413000
heap
page read and write
2173445C000
heap
page read and write
1BA8D03C000
heap
page read and write
1710B900000
heap
page read and write
21734E02000
heap
page read and write
16732910000
trusted library allocation
page read and write
119F000
unkown
page execute read
22106600000
heap
page read and write
21734489000
heap
page read and write
2173541A000
heap
page read and write
21734FFF000
heap
page read and write
1BBF4BC0000
heap
page read and write
21734456000
heap
page read and write
962000
heap
page read and write
21734459000
heap
page read and write
21734450000
heap
page read and write
93A000
heap
page read and write
1BBF4BA2000
heap
page read and write
21734F50000
heap
page read and write
9CD5EFF000
stack
page read and write
23457500000
heap
page read and write
10D9000
unkown
page execute read
1BA8D062000
heap
page read and write
1BA8D05B000
heap
page read and write
2210667B000
heap
page read and write
21734F78000
heap
page read and write
1710B813000
heap
page read and write
1710C002000
trusted library allocation
page read and write
1710B83C000
heap
page read and write
21734F7E000
heap
page read and write
21735402000
heap
page read and write
2345745D000
heap
page read and write
9CD607F000
stack
page read and write
21735421000
heap
page read and write
1710B620000
heap
page read and write
21734F9F000
heap
page read and write
22106708000
heap
page read and write
6DC137B000
stack
page read and write
8B0000
heap
page read and write
2173445B000
heap
page read and write
383F000
trusted library allocation
page read and write
93E000
heap
page read and write
21735402000
heap
page read and write
133F000
unkown
page readonly
16732970000
trusted library allocation
page read and write
22106390000
heap
page read and write
23DC1DF000
stack
page read and write
There are 393 hidden memdumps, click here to show them.