IOC Report
INV NO -609983773 60983768.exe

loading gif

Files

File Path
Type
Category
Malicious
INV NO -609983773 60983768.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\INV NO -609983773 60983768.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INV NO -609983773 60983768.exe
C:\Users\user\Desktop\INV NO -609983773 60983768.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe

URLs

Name
IP
Malicious
172.111.234.110
malicious
https://opensource.bulkpdf.de/Whttps://opensource.bulkpdf.de/documentation
unknown
https://opensource.bulkpdf.de/documentation
unknown
https://opensource.bulkpdf.de/
unknown
http://fsf.org/
unknown
http://geoplugin.net/json.gp/C
unknown
http://itextpdf.com/terms-of-use/
unknown
http://www.gnu.org/licenses
unknown
http://www.gnu.org/licenses/gpl-faq.html#FontException
unknown
http://www.gnu.org/licenses/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
13DB3EAF000
trusted library allocation
page read and write
malicious
13DB3F8F000
trusted library allocation
page read and write
malicious
13DA2350000
trusted library allocation
page read and write
13DA2430000
trusted library allocation
page read and write
17A58440000
remote allocation
page read and write
13DA2420000
trusted library allocation
page read and write
13DBBE10000
trusted library allocation
page read and write
13DA22F0000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2400000
trusted library allocation
page read and write
13DB3DE7000
trusted library allocation
page read and write
7FFDC38E3000
trusted library allocation
page execute and read and write
13DA2330000
trusted library allocation
page read and write
14BB8EF0000
remote allocation
page read and write
265FFF40000
remote allocation
page read and write
13DA3DB0000
trusted library allocation
page read and write
13DA216B000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
13DA213A000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
7FFDC390B000
trusted library allocation
page execute and read and write
13DA2169000
heap
page read and write
1C89CFF000
stack
page read and write
13DA2340000
trusted library allocation
page read and write
13DA2312000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DB3DE3000
trusted library allocation
page read and write
7FFDC38F4000
trusted library allocation
page read and write
13DA2450000
trusted library allocation
page read and write
13DA22D0000
trusted library allocation
page read and write
13DA3D70000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2330000
trusted library allocation
page read and write
17A58440000
remote allocation
page read and write
13DA2310000
trusted library allocation
page read and write
7FFDC3A07000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2460000
trusted library allocation
page read and write
7FFDC38F0000
trusted library allocation
page read and write
13DA2410000
heap
page execute and read and write
13DA2490000
trusted library allocation
page read and write
13DA2340000
trusted library allocation
page read and write
13DA2360000
trusted library allocation
page read and write
7FFDC3990000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2321000
trusted library allocation
page read and write
13DA24A0000
trusted library allocation
page read and write
13DA244C000
trusted library allocation
page read and write
13DA20C0000
heap
page read and write
1C89594000
stack
page read and write
13DA2109000
heap
page read and write
13DA2350000
trusted library allocation
page read and write
13DA1F40000
unkown
page readonly
13DB3DE1000
trusted library allocation
page read and write
1C89BFD000
stack
page read and write
24BC9880000
remote allocation
page read and write
13DA2420000
trusted library allocation
page read and write
265FFF40000
remote allocation
page read and write
13DA2340000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2320000
trusted library allocation
page read and write
1C899FE000
stack
page read and write
13DA2020000
heap
page read and write
7FFDC38E4000
trusted library allocation
page read and write
7FFDC39A0000
trusted library allocation
page execute and read and write
13DA2304000
trusted library allocation
page read and write
13DA231D000
trusted library allocation
page read and write
7FFDC393C000
trusted library allocation
page execute and read and write
13DA3DE1000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA20A0000
heap
page read and write
7FFDC3A00000
trusted library allocation
page read and write
13DA2360000
trusted library allocation
page read and write
13DA3DC0000
trusted library allocation
page read and write
13DA24B5000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
7FF43DE20000
trusted library allocation
page execute and read and write
7FFDC3900000
trusted library allocation
page read and write
1C89DFE000
stack
page read and write
13DA2310000
trusted library allocation
page read and write
7FFDC390D000
trusted library allocation
page execute and read and write
1C898FE000
stack
page read and write
7FFDC38ED000
trusted library allocation
page execute and read and write
13DA2310000
trusted library allocation
page read and write
13DA2330000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2400000
trusted library allocation
page read and write
13DA3D80000
trusted library allocation
page read and write
7FFDC39C6000
trusted library allocation
page execute and read and write
13DA2310000
trusted library allocation
page read and write
13DA2320000
trusted library allocation
page read and write
24BC9880000
remote allocation
page read and write
13DA2310000
trusted library allocation
page read and write
7FFDC38E0000
trusted library allocation
page read and write
13DA2430000
trusted library allocation
page read and write
13DA1F42000
unkown
page readonly
13DA2350000
trusted library allocation
page read and write
7FFDC3A03000
trusted library allocation
page read and write
13DA2370000
heap
page read and write
13DBC490000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
1C89EFF000
stack
page read and write
13DA24B0000
heap
page read and write
13DA2080000
heap
page read and write
13DA2324000
trusted library allocation
page read and write
1C89AFE000
stack
page read and write
13DBC670000
heap
page execute and read and write
13DA3DD0000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
2BC033B0000
remote allocation
page read and write
13DA1F42000
unkown
page readonly
13DA233B000
trusted library allocation
page read and write
13DA2440000
trusted library allocation
page read and write
2BC033B0000
remote allocation
page read and write
13DA2320000
trusted library allocation
page read and write
13DA2420000
trusted library section
page read and write
13DA213D000
heap
page read and write
13DA2129000
heap
page read and write
13DA3D90000
trusted library allocation
page read and write
13DA2470000
trusted library allocation
page read and write
13DA2320000
trusted library allocation
page read and write
7FFDC3A10000
trusted library allocation
page execute and read and write
13DA2320000
trusted library allocation
page read and write
13DA3DA0000
trusted library allocation
page read and write
1C89FFE000
stack
page read and write
13DA2100000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
13DA1F40000
unkown
page readonly
7FFDC38FD000
trusted library allocation
page execute and read and write
13DA2360000
trusted library allocation
page read and write
13DA2480000
trusted library allocation
page read and write
13DA2320000
trusted library allocation
page read and write
13DA2375000
heap
page read and write
13DA2310000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
13DA23F0000
heap
page read and write
13DA213F000
heap
page read and write
14BB8EF0000
remote allocation
page read and write
13DA2300000
trusted library allocation
page read and write
13DA3DB4000
trusted library allocation
page read and write
13DA2400000
trusted library allocation
page read and write
13DA2310000
trusted library allocation
page read and write
There are 132 hidden memdumps, click here to show them.