IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Aqua_3.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\ConfigXML_ScenarioProfile.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MsMpCom.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Ottawas.bmp
PC bitmap, Windows 3.x format, 312 x 145 x 24
dropped
C:\Users\user\AppData\Local\Temp\nsaF229.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\touchpad-disabled-symbolic.svg
SVG Scalable Vector Graphics image
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://msdvc.com/oluwa_RcQBQnZSyJ230.bin
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
30B0000
direct allocation
page execute and read and write
malicious
57AF1BB000
stack
page read and write
174A1307000
heap
page read and write
2C72C870000
heap
page read and write
19BD2C80000
heap
page read and write
DE0AFFF000
stack
page read and write
1564AC80000
heap
page read and write
2C72C900000
heap
page read and write
174A1B04000
heap
page read and write
2C011CC0000
heap
page readonly
2C010D60000
heap
page read and write
174A6940000
trusted library allocation
page read and write
23294C29000
heap
page read and write
174A26A8000
heap
page read and write
2C011120000
trusted library allocation
page read and write
23294B30000
heap
page read and write
174A6A60000
trusted library allocation
page read and write
12555570000
remote allocation
page read and write
174A2570000
trusted library allocation
page read and write
21FE000
stack
page read and write
174A10B0000
heap
page read and write
2C72C7F0000
trusted library allocation
page read and write
DE0A9FF000
stack
page read and write
454A47E000
stack
page read and write
1FF31213000
heap
page read and write
23294AD0000
heap
page read and write
6927D7B000
stack
page read and write
174A26FD000
heap
page read and write
20710868000
heap
page read and write
1FF3123D000
heap
page read and write
17DCA7D000
stack
page read and write
2C72C84A000
heap
page read and write
174A2687000
heap
page read and write
12555602000
trusted library allocation
page read and write
174A26E0000
heap
page read and write
DE0A47B000
stack
page read and write
174A1B13000
heap
page read and write
1BF8BFD000
stack
page read and write
174A2647000
heap
page read and write
CCECFFE000
stack
page read and write
12554E13000
heap
page read and write
20710800000
heap
page read and write
DBF5D7C000
stack
page read and write
CCECCFF000
stack
page read and write
20710859000
heap
page read and write
174A6910000
trusted library allocation
page read and write
692774F000
stack
page read and write
17DC97E000
stack
page read and write
7DD000
heap
page read and write
12554E00000
heap
page read and write
174A1B02000
heap
page read and write
2C72D002000
trusted library allocation
page read and write
1564AC63000
heap
page read and write
17DCC7D000
stack
page read and write
1564AC45000
heap
page read and write
2394000
heap
page read and write
174A6934000
trusted library allocation
page read and write
DBF5EF9000
stack
page read and write
CCECB7F000
stack
page read and write
19BD2E00000
heap
page read and write
4A4F000
trusted library allocation
page read and write
4A4F000
trusted library allocation
page read and write
19BD2F08000
heap
page read and write
174A2665000
heap
page read and write
17DC87B000
stack
page read and write
12554E40000
heap
page read and write
200A523C000
heap
page read and write
174A2560000
trusted library allocation
page read and write
692877F000
stack
page read and write
2350000
trusted library allocation
page read and write
19BD2C20000
heap
page read and write
40A000
unkown
page write copy
19BD2E7C000
heap
page read and write
2C72C7C0000
heap
page read and write
30000
heap
page read and write
174A128F000
heap
page read and write
1564AC42000
heap
page read and write
488000
unkown
page readonly
200A5213000
heap
page read and write
23294CD0000
heap
page read and write
40A000
unkown
page read and write
20710913000
heap
page read and write
72E66000
unkown
page readonly
12554E02000
heap
page read and write
2340000
trusted library allocation
page read and write
174A12ED000
heap
page read and write
F58EBFF000
stack
page read and write
7E1000
heap
page read and write
454A67E000
stack
page read and write
2200000
heap
page read and write
174A1229000
heap
page read and write
E351FB000
stack
page read and write
20710813000
heap
page read and write
200A5202000
heap
page read and write
7D8000
heap
page read and write
2C010E4D000
heap
page read and write
DBF5E7E000
stack
page read and write
48D000
unkown
page readonly
174A1A02000
heap
page read and write
12554E5C000
heap
page read and write
2C72C813000
heap
page read and write
217E000
stack
page read and write
408000
unkown
page readonly
1564AC7C000
heap
page read and write
2C72C853000
heap
page read and write
7E1000
heap
page read and write
200A51F0000
trusted library allocation
page read and write
1564B402000
trusted library allocation
page read and write
23294CCA000
heap
page read and write
2C010E4B000
heap
page read and write
19BD2F00000
heap
page read and write
174A6B60000
trusted library allocation
page read and write
200A5160000
heap
page read and write
F58E8FB000
stack
page read and write
174A12A4000
heap
page read and write
454A4FE000
stack
page read and write
2C72C86C000
heap
page read and write
174A1B18000
heap
page read and write
F58ECFF000
stack
page read and write
174A69E0000
trusted library allocation
page read and write
12555540000
trusted library allocation
page read and write
24E67113000
heap
page read and write
2C011110000
trusted library allocation
page read and write
7842D7F000
stack
page read and write
1564AC5A000
heap
page read and write
174A26B5000
heap
page read and write
19BD2E02000
heap
page read and write
2C011CB0000
trusted library allocation
page read and write
7E1000
heap
page read and write
24E67108000
heap
page read and write
488000
unkown
page readonly
57AF9FF000
stack
page read and write
17DCD7F000
stack
page read and write
174A12AF000
heap
page read and write
2C011135000
heap
page read and write
7E1000
heap
page read and write
207107F0000
trusted library allocation
page read and write
174A1A15000
heap
page read and write
174A6A70000
remote allocation
page read and write
174A6954000
trusted library allocation
page read and write
20710802000
heap
page read and write
23294CE1000
heap
page read and write
19A000
stack
page read and write
57AF4FE000
stack
page read and write
24E67000000
heap
page read and write
7A0000
heap
page read and write
1BF887C000
stack
page read and write
1564AC43000
heap
page read and write
F58EAFD000
stack
page read and write
CCED1FF000
stack
page read and write
27E8000
trusted library allocation
page read and write
174A6A30000
trusted library allocation
page read and write
12555570000
remote allocation
page read and write
19BD2E47000
heap
page read and write
23294C89000
heap
page read and write
200A5252000
heap
page read and write
2C010FD0000
heap
page read and write
174A12C0000
heap
page read and write
7D8000
heap
page read and write
200A5200000
heap
page read and write
7CC000
heap
page read and write
19BD2E70000
heap
page read and write
12555570000
remote allocation
page read and write
19BD2E50000
heap
page read and write
174A69E0000
trusted library allocation
page read and write
2C010D70000
trusted library allocation
page read and write
27DF000
stack
page read and write
19BD2E4B000
heap
page read and write
23294D13000
heap
page read and write
7842F7E000
stack
page read and write
7DD000
heap
page read and write
1564AC48000
heap
page read and write
7CC000
heap
page read and write
400000
unkown
page readonly
174A6A70000
remote allocation
page read and write
401000
unkown
page execute read
1564AC65000
heap
page read and write
CCECA7B000
stack
page read and write
12554D80000
heap
page read and write
692847A000
stack
page read and write
1564AC13000
heap
page read and write
1564AC46000
heap
page read and write
174A6930000
trusted library allocation
page read and write
200A5262000
heap
page read and write
24E67066000
heap
page read and write
454A87F000
stack
page read and write
1BF8A7D000
stack
page read and write
19BD2E4A000
heap
page read and write
20710E02000
trusted library allocation
page read and write
7DD000
heap
page read and write
174A1257000
heap
page read and write
7D8000
heap
page read and write
1FF31100000
heap
page read and write
7E1000
heap
page read and write
24E66F20000
heap
page read and write
692807B000
stack
page read and write
23295500000
heap
page read and write
174A25F0000
trusted library allocation
page read and write
1564B280000
trusted library allocation
page read and write
2C72C802000
heap
page read and write
174A20E0000
trusted library allocation
page read and write
CCECDFB000
stack
page read and write
174A26F5000
heap
page read and write
20710902000
heap
page read and write
2C011140000
trusted library allocation
page read and write
2C72C87E000
heap
page read and write
23294C00000
heap
page read and write
1FF31302000
heap
page read and write
1FF31313000
heap
page read and write
19BD2E4E000
heap
page read and write
174A6A70000
trusted library allocation
page read and write
1FF31A02000
trusted library allocation
page read and write
454A77E000
stack
page read and write
7DD000
heap
page read and write
23294AC0000
heap
page read and write
174A1314000
heap
page read and write
19BD2E68000
heap
page read and write
1564AC6B000
heap
page read and write
7D8000
heap
page read and write
6927C7A000
stack
page read and write
174A2600000
heap
page read and write
784307E000
stack
page read and write
200A527F000
heap
page read and write
174A127D000
heap
page read and write
174A1294000
heap
page read and write
2071086F000
heap
page read and write
CCECAFE000
stack
page read and write
427000
unkown
page read and write
174A691E000
trusted library allocation
page read and write
1564AD02000
heap
page read and write
174A1A00000
heap
page read and write
174A26A6000
heap
page read and write
1FF310F0000
heap
page read and write
24E67802000
trusted library allocation
page read and write
57AF47E000
stack
page read and write
454A1CC000
stack
page read and write
174A26FD000
heap
page read and write
200A5313000
heap
page read and write
453000
unkown
page readonly
2C010E44000
heap
page read and write
174A1225000
heap
page read and write
19BD2E88000
heap
page read and write
7CE000
heap
page read and write
2C72C86C000
heap
page read and write
CCED0FE000
stack
page read and write
23294C40000
heap
page read and write
72E60000
unkown
page readonly
7CC000
heap
page read and write
E353FF000
stack
page read and write
24E67038000
heap
page read and write
17DD17F000
stack
page read and write
174A12E0000
heap
page read and write
646000
heap
page read and write
6927AF7000
stack
page read and write
2C011130000
heap
page read and write
DE0ABFB000
stack
page read and write
17DD07E000
stack
page read and write
23294B60000
trusted library allocation
page read and write
24E67029000
heap
page read and write
1BF86FE000
stack
page read and write
1564AC47000
heap
page read and write
7842CFC000
stack
page read and write
1564AC5B000
heap
page read and write
2C72C84E000
heap
page read and write
19BD2E46000
heap
page read and write
437000
unkown
page read and write
1564AC33000
heap
page read and write
1564AC77000
heap
page read and write
1564AC24000
heap
page read and write
35B0000
trusted library allocation
page read and write
1BF87FC000
stack
page read and write
F58E9F7000
stack
page read and write
174A1B59000
heap
page read and write
2C011139000
heap
page read and write
1564AC00000
heap
page read and write
1FF31200000
heap
page read and write
174A6940000
trusted library allocation
page read and write
E350FB000
stack
page read and write
174A11B0000
trusted library allocation
page read and write
DE0AA7C000
stack
page read and write
27E1000
trusted library allocation
page read and write
2C010E08000
heap
page read and write
2C011100000
trusted library allocation
page read and write
174A6910000
trusted library allocation
page read and write
E352FE000
stack
page read and write
174A1274000
heap
page read and write
200A51C0000
heap
page read and write
24E67059000
heap
page read and write
174A12D0000
heap
page read and write
1564AC71000
heap
page read and write
174A6800000
trusted library allocation
page read and write
1FF31160000
heap
page read and write
DE0AEFC000
stack
page read and write
23294CBF000
heap
page read and write
1564AC29000
heap
page read and write
174A12D3000
heap
page read and write
174A1292000
heap
page read and write
1564AC3C000
heap
page read and write
12554DE0000
heap
page read and write
174A2702000
heap
page read and write
2C72C829000
heap
page read and write
27E5000
trusted library allocation
page read and write
F58E67E000
stack
page read and write
2390000
heap
page read and write
174A2643000
heap
page read and write
174A6950000
trusted library allocation
page read and write
174A2706000
heap
page read and write
1564AC76000
heap
page read and write
376F000
stack
page read and write
24E66FB0000
trusted library allocation
page read and write
174A26DE000
heap
page read and write
2C011A70000
trusted library allocation
page read and write
784273E000
stack
page read and write
1BF8AFF000
stack
page read and write
19BD3602000
trusted library allocation
page read and write
174A1B00000
heap
page read and write
49A000
unkown
page readonly
CCECEF7000
stack
page read and write
174A12A6000
heap
page read and write
1564AC66000
heap
page read and write
DE0A87C000
stack
page read and write
174A1302000
heap
page read and write
17DCF7F000
stack
page read and write
20710863000
heap
page read and write
2C72C750000
heap
page read and write
200A5300000
heap
page read and write
78427BE000
stack
page read and write
2C011D30000
trusted library allocation
page read and write
400000
unkown
page readonly
422000
unkown
page read and write
7842BF7000
stack
page read and write
2071087B000
heap
page read and write
1FF3125B000
heap
page read and write
19BD2E5F000
heap
page read and write
57AF8FF000
stack
page read and write
660000
heap
page read and write
200A525D000
heap
page read and write
174A2702000
heap
page read and write
72E61000
unkown
page execute read
1FF31202000
heap
page read and write
1BF837C000
stack
page read and write
2C72C908000
heap
page read and write
174A12D4000
heap
page read and write
174A69E0000
trusted library allocation
page read and write
448000
unkown
page readonly
174A127A000
heap
page read and write
57AF7F7000
stack
page read and write
200A5A02000
trusted library allocation
page read and write
24E66F80000
heap
page read and write
24E67102000
heap
page read and write
174A69F0000
trusted library allocation
page read and write
2C010E4B000
heap
page read and write
1564AC61000
heap
page read and write
78426BB000
stack
page read and write
2C011CE0000
trusted library allocation
page read and write
174A2658000
heap
page read and write
2C010E4B000
heap
page read and write
F58E36B000
stack
page read and write
1564AC60000
heap
page read and write
DBF59BB000
stack
page read and write
1564AAC0000
heap
page read and write
24E67100000
heap
page read and write
19BD2E4D000
heap
page read and write
1564AC7D000
heap
page read and write
24E67061000
heap
page read and write
1564AC4F000
heap
page read and write
200A5268000
heap
page read and write
24E67013000
heap
page read and write
200A528D000
heap
page read and write
207105B0000
heap
page read and write
1564AC69000
heap
page read and write
2C011CD0000
trusted library allocation
page read and write
174A2643000
heap
page read and write
174A6918000
trusted library allocation
page read and write
23295532000
heap
page read and write
24E6703C000
heap
page read and write
7F1000
heap
page read and write
F58E7FF000
stack
page read and write
1564AC59000
heap
page read and write
DE0A8FE000
stack
page read and write
174A1200000
heap
page read and write
692857C000
stack
page read and write
27ED000
trusted library allocation
page read and write
1564AB20000
heap
page read and write
230F000
stack
page read and write
2C72C888000
heap
page read and write
174A6931000
trusted library allocation
page read and write
23294C6E000
heap
page read and write
57AF6FB000
stack
page read and write
12554F02000
heap
page read and write
174A2647000
heap
page read and write
174A2563000
trusted library allocation
page read and write
19BD2C10000
heap
page read and write
20710900000
heap
page read and write
200A5229000
heap
page read and write
23294C13000
heap
page read and write
207105C0000
heap
page read and write
F58E3EF000
stack
page read and write
7CC000
heap
page read and write
640000
heap
page read and write
49A000
unkown
page readonly
1FF31190000
trusted library allocation
page read and write
19BD2E51000
heap
page read and write
174A12E0000
heap
page read and write
7D8000
heap
page read and write
24E6705F000
heap
page read and write
1564AC3E000
heap
page read and write
448000
unkown
page readonly
200A5308000
heap
page read and write
6927E7E000
stack
page read and write
19BD2E5F000
heap
page read and write
24E67086000
heap
page read and write
2C72C83C000
heap
page read and write
19BD2E27000
heap
page read and write
174A123D000
heap
page read and write
19BD2E29000
heap
page read and write
1564AC5D000
heap
page read and write
200A5302000
heap
page read and write
DE0ADFE000
stack
page read and write
1FF31229000
heap
page read and write
174A12B2000
heap
page read and write
1FF31278000
heap
page read and write
24E6705C000
heap
page read and write
401000
unkown
page execute read
20710620000
heap
page read and write
174A2580000
trusted library allocation
page read and write
174A1B59000
heap
page read and write
19BD2E49000
heap
page read and write
2C010DD0000
heap
page read and write
174A1040000
heap
page read and write
2C72C760000
heap
page read and write
174A26DE000
heap
page read and write
24E6707C000
heap
page read and write
24E66F10000
heap
page read and write
27E8000
trusted library allocation
page read and write
19BD2E3C000
heap
page read and write
174A6B80000
trusted library allocation
page read and write
2C72C902000
heap
page read and write
DE0AB7D000
stack
page read and write
DBF5DF9000
stack
page read and write
174A1050000
heap
page read and write
19BD2E13000
heap
page read and write
174A6A40000
trusted library allocation
page read and write
454A97F000
stack
page read and write
17DCE7F000
stack
page read and write
665000
heap
page read and write
DE0ACFD000
stack
page read and write
1564AC79000
heap
page read and write
174A26FD000
heap
page read and write
1564AC6F000
heap
page read and write
1564AAB0000
heap
page read and write
174A2800000
trusted library allocation
page read and write
23294D02000
heap
page read and write
69276CB000
stack
page read and write
366D000
stack
page read and write
7A7000
heap
page read and write
19BD2E68000
heap
page read and write
1564AC2E000
heap
page read and write
19BD2F13000
heap
page read and write
17DC67B000
stack
page read and write
48D000
unkown
page readonly
12554E29000
heap
page read and write
1564AC58000
heap
page read and write
5C0000
trusted library allocation
page read and write
174A6A70000
remote allocation
page read and write
72E64000
unkown
page readonly
19BD2F02000
heap
page read and write
6927F7A000
stack
page read and write
19BD2D80000
trusted library allocation
page read and write
770000
heap
page read and write
1564AC62000
heap
page read and write
1564AC85000
heap
page read and write
2C010E00000
heap
page read and write
7DD000
heap
page read and write
20710840000
heap
page read and write
200A5150000
heap
page read and write
1564AC7B000
heap
page read and write
174A1299000
heap
page read and write
174A2706000
heap
page read and write
174A6A50000
trusted library allocation
page read and write
453000
unkown
page readonly
12554D70000
heap
page read and write
174A26E4000
heap
page read and write
7842E7E000
stack
page read and write
99000
stack
page read and write
174A1213000
heap
page read and write
1564AC30000
heap
page read and write
2C72C913000
heap
page read and write
408000
unkown
page readonly
174A2700000
heap
page read and write
20710828000
heap
page read and write
174A1B18000
heap
page read and write
174A6A20000
trusted library allocation
page read and write
23295402000
heap
page read and write
2C72C800000
heap
page read and write
1564AC41000
heap
page read and write
1564AC64000
heap
page read and write
E34BAB000
stack
page read and write
There are 488 hidden memdumps, click here to show them.