IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\bf045808586a24\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
"C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\bf045808586a24\cred64.dll, Main
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
193.56.146.194/h49vlBP/index.php
malicious

IPs

IP
Domain
Country
Malicious
193.56.146.194
unknown
unknown
malicious
192.168.2.5
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
674000
heap
page read and write
malicious
674000
heap
page read and write
malicious
3F55000
trusted library allocation
page read and write
465000
unkown
page readonly
213F7C3C000
heap
page read and write
2E60000
heap
page read and write
45E1000
heap
page read and write
BE0000
heap
page read and write
45E1000
heap
page read and write
229F47A0000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
3943000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
A8430FF000
stack
page read and write
4EA000
stack
page read and write
1B0000
remote allocation
page read and write
1FFEDC90000
trusted library allocation
page read and write
E3801FE000
stack
page read and write
45E1000
heap
page read and write
2D8C000
stack
page read and write
45E1000
heap
page read and write
3F5D000
trusted library allocation
page read and write
45E1000
heap
page read and write
A842D7A000
stack
page read and write
45E1000
heap
page read and write
229F4B02000
heap
page read and write
A3A000
heap
page read and write
3640000
heap
page read and write
43E000
unkown
page execute and read and write
465000
unkown
page readonly
3F50000
trusted library allocation
page read and write
5CE000
stack
page read and write
AEAE07D000
stack
page read and write
3E51000
trusted library allocation
page read and write
213F8813000
heap
page read and write
229F4940000
remote allocation
page read and write
213F7C2A000
heap
page read and write
8B4000
heap
page read and write
213F8712000
heap
page read and write
3F5D000
trusted library allocation
page read and write
8B4000
heap
page read and write
213F7C91000
heap
page read and write
213F7C8B000
heap
page read and write
401000
unkown
page execute read
2E10000
heap
page read and write
2EDA000
heap
page read and write
45E1000
heap
page read and write
2B0F000
stack
page read and write
2C8E000
stack
page read and write
2FE0000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
57E000
stack
page read and write
213F7C70000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
2220000
heap
page read and write
45E1000
heap
page read and write
213F7C88000
heap
page read and write
440000
heap
page read and write
9CF000
stack
page read and write
1FFED426000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
2260000
heap
page read and write
45E1000
heap
page read and write
9E0000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
3F51000
trusted library allocation
page read and write
213F876B000
heap
page read and write
213F7D13000
heap
page read and write
2EB0000
heap
page read and write
3F59000
trusted library allocation
page read and write
649000
heap
page read and write
C17000
heap
page read and write
45E1000
heap
page read and write
1FFED454000
heap
page read and write
2E1A000
heap
page read and write
697000
heap
page read and write
2B4E000
stack
page read and write
7F0000
heap
page read and write
213F7C77000
heap
page read and write
412000
unkown
page write copy
2C4F000
stack
page read and write
229F4940000
remote allocation
page read and write
3F5F000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
1FFED440000
heap
page read and write
66D000
heap
page read and write
401000
unkown
page execute read
8AE000
stack
page read and write
213F8754000
heap
page read and write
AEAE1FD000
stack
page read and write
410000
unkown
page execute read
770000
heap
page read and write
E3800FC000
stack
page read and write
3E51000
trusted library allocation
page read and write
412000
unkown
page write copy
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
400000
unkown
page readonly
3E51000
trusted library allocation
page read and write
5D0000
heap
page read and write
AEADDFC000
stack
page read and write
3E51000
trusted library allocation
page read and write
30000
heap
page read and write
45E1000
heap
page read and write
A842FF9000
stack
page read and write
AEADE7C000
stack
page read and write
463000
unkown
page read and write
45E1000
heap
page read and write
278E000
stack
page read and write
1FFED402000
heap
page read and write
2E1A000
heap
page read and write
A84337E000
stack
page read and write
45E1000
heap
page read and write
670000
heap
page read and write
2A0E000
stack
page read and write
213F8800000
heap
page read and write
83F000
stack
page read and write
69E000
heap
page execute and read and write
3F53000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
197000
stack
page read and write
7BB000
heap
page read and write
2EE1000
trusted library allocation
page read and write
45E1000
heap
page read and write
401000
unkown
page execute read
45E1000
heap
page read and write
620000
direct allocation
page read and write
45E1000
heap
page read and write
221E000
stack
page read and write
680000
heap
page read and write
400000
unkown
page readonly
5BE000
stack
page read and write
A842E7E000
stack
page read and write
213F8802000
heap
page read and write
80A000
heap
page read and write
3E51000
trusted library allocation
page read and write
213F7C55000
heap
page read and write
410000
unkown
page execute read
3E51000
trusted library allocation
page read and write
352A000
heap
page read and write
465000
unkown
page readonly
45E1000
heap
page read and write
400000
unkown
page readonly
A8431FA000
stack
page read and write
213F7DB9000
heap
page read and write
9C000
stack
page read and write
213F8722000
heap
page read and write
45E1000
heap
page read and write
E3FFC7B000
stack
page read and write
3F59000
trusted library allocation
page read and write
229F4A13000
heap
page read and write
45E1000
heap
page read and write
369A000
heap
page read and write
213F878C000
heap
page read and write
213F87BB000
heap
page read and write
323A000
heap
page read and write
213F7C69000
heap
page read and write
45E1000
heap
page read and write
580000
heap
page read and write
45E1000
heap
page read and write
213F7B40000
heap
page read and write
213F87AD000
heap
page read and write
1FFED3F0000
heap
page read and write
35EA000
heap
page read and write
1FFED449000
heap
page read and write
683000
heap
page read and write
6E0000
direct allocation
page execute and read and write
3F57000
trusted library allocation
page read and write
410000
unkown
page execute read
91F000
stack
page read and write
213F8743000
heap
page read and write
3E51000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
45E1000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
1F0000
trusted library allocation
page read and write
690000
heap
page read and write
8B0000
heap
page read and write
AEAE0FF000
stack
page read and write
2330000
heap
page read and write
45E1000
heap
page read and write
35E0000
heap
page read and write
213F7B30000
heap
page read and write
229F4A00000
heap
page read and write
763000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
465000
unkown
page readonly
3E51000
trusted library allocation
page read and write
368A000
heap
page read and write
213F7C43000
heap
page read and write
229F4A40000
heap
page read and write
45E1000
heap
page read and write
2D80000
heap
page read and write
465000
unkown
page readonly
20C0000
direct allocation
page read and write
A53000
heap
page read and write
3230000
heap
page read and write
213F8700000
heap
page read and write
45E1000
heap
page read and write
1FFED3A0000
heap
page read and write
400000
unkown
page readonly
4420000
direct allocation
page read and write
45E1000
heap
page read and write
AEAD90B000
stack
page read and write
3F5B000
trusted library allocation
page read and write
465000
unkown
page readonly
A54000
heap
page read and write
2EBA000
heap
page read and write
410000
unkown
page execute read
213F8722000
heap
page read and write
C10000
heap
page read and write
45E1000
heap
page read and write
364A000
heap
page read and write
3E51000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
213F7C00000
heap
page read and write
3948000
trusted library allocation
page read and write
465000
unkown
page readonly
3947000
trusted library allocation
page read and write
43E000
unkown
page execute and read and write
626000
heap
page read and write
45E1000
heap
page read and write
213F7C91000
heap
page read and write
2110000
direct allocation
page read and write
88F000
stack
page read and write
45E1000
heap
page read and write
3F58000
trusted library allocation
page read and write
5E0000
direct allocation
page execute and read and write
213F8827000
heap
page read and write
45E1000
heap
page read and write
3F5C000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
45E1000
heap
page read and write
410000
unkown
page execute read
45E1000
heap
page read and write
3690000
heap
page read and write
1B0000
remote allocation
page read and write
1F0000
trusted library allocation
page read and write
9D000
stack
page read and write
A84290B000
stack
page read and write
45E1000
heap
page read and write
720000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
3E51000
trusted library allocation
page read and write
87A000
heap
page read and write
45E1000
heap
page read and write
E3802FF000
stack
page read and write
213F8470000
trusted library allocation
page read and write
45E1000
heap
page read and write
2FEA000
heap
page read and write
401000
unkown
page execute read
45E1000
heap
page read and write
3680000
heap
page read and write
213F7C43000
heap
page read and write
45E1000
heap
page read and write
412000
unkown
page write copy
213F7D8E000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
4AC000
stack
page read and write
8F0000
heap
page read and write
3F5A000
trusted library allocation
page read and write
401000
unkown
page execute read
6CE000
stack
page read and write
45E1000
heap
page read and write
2120000
heap
page read and write
213F8823000
heap
page read and write
400000
unkown
page readonly
45E1000
heap
page read and write
2220000
heap
page read and write
45E1000
heap
page read and write
3520000
heap
page read and write
1FFED400000
heap
page read and write
2D8A000
heap
page read and write
45E1000
heap
page read and write
45E0000
heap
page read and write
229F4810000
heap
page read and write
288F000
stack
page read and write
A84347E000
stack
page read and write
412000
unkown
page write copy
29CF000
stack
page read and write
AEAE27F000
stack
page read and write
30000
heap
page read and write
739000
heap
page execute and read and write
1FFED413000
heap
page read and write
1FFED390000
heap
page read and write
45E1000
heap
page read and write
2130000
heap
page read and write
229F4A02000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
A30000
heap
page read and write
400000
unkown
page readonly
1FFED429000
heap
page read and write
2E6A000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
870000
heap
page read and write
213F7C13000
heap
page read and write
45E1000
heap
page read and write
28CE000
stack
page read and write
A8432FE000
stack
page read and write
412000
unkown
page write copy
213F7C59000
heap
page read and write
7FA000
heap
page read and write
2EB0000
heap
page read and write
213F7BA0000
heap
page read and write
213F8602000
heap
page read and write
45E1000
heap
page read and write
229F4A58000
heap
page read and write
229F5202000
trusted library allocation
page read and write
2ED0000
heap
page read and write
367A000
heap
page read and write
8FA000
heap
page read and write
45E1000
heap
page read and write
758000
heap
page read and write
2EBA000
heap
page read and write
3F54000
trusted library allocation
page read and write
229F4910000
trusted library allocation
page read and write
2E10000
heap
page read and write
45E1000
heap
page read and write
800000
heap
page read and write
45E1000
heap
page read and write
1FFEDE02000
trusted library allocation
page read and write
1FFED43C000
heap
page read and write
213F7DE5000
heap
page read and write
45E1000
heap
page read and write
E3FFF7A000
stack
page read and write
45E1000
heap
page read and write
68F000
stack
page read and write
229F4A29000
heap
page read and write
213F8830000
heap
page read and write
45E1000
heap
page read and write
229F4940000
remote allocation
page read and write
45E1000
heap
page read and write
213F7C75000
heap
page read and write
3F53000
trusted library allocation
page read and write
45E1000
heap
page read and write
274F000
stack
page read and write
3670000
heap
page read and write
1FFED502000
heap
page read and write
45E1000
heap
page read and write
213F8702000
heap
page read and write
6BD000
heap
page read and write
229F47B0000
heap
page read and write
3E51000
trusted library allocation
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
45E1000
heap
page read and write
410000
unkown
page execute read
98F000
stack
page read and write
629000
heap
page read and write
45E1000
heap
page read and write
401000
unkown
page execute read
1FFED445000
heap
page read and write
465000
unkown
page readonly
400000
unkown
page execute and read and write
57E000
stack
page read and write
19B000
stack
page read and write
72A000
heap
page read and write
463000
unkown
page read and write
213F7C2C000
heap
page read and write
45E1000
heap
page read and write
1FFED430000
heap
page read and write
45E1000
heap
page read and write
A842F7B000
stack
page read and write
45E1000
heap
page read and write
550000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
213F7BD0000
trusted library allocation
page read and write
45E1000
heap
page read and write
412000
unkown
page write copy
45E1000
heap
page read and write
45E1000
heap
page read and write
There are 375 hidden memdumps, click here to show them.