IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\json[1].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
malicious

URLs

Name
IP
Malicious
127.0.0.1
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gples8
unknown
http://geoplugin.net/json.gprol
unknown
http://geoplugin.net/json.gp1
unknown
http://geoplugin.net/json.gp2C9DCABD6423689A465F00D4F
unknown
http://geoplugin.net/json.gpf
unknown
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gpESS
unknown
http://geoplugin.net/j
unknown

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
185.65.134.166
unknown
Sweden
malicious
45.128.234.54
unknown
United Kingdom
malicious
10.11.0.5
unknown
unknown
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Rmc-UQ90W9
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-UQ90W9
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-UQ90W9
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EC7000
heap
page read and write
malicious
17793375000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
177EB4B0000
trusted library allocation
page read and write
177EC0B0000
trusted library allocation
page read and write
177EC2D0000
trusted library allocation
page read and write
177EC080000
trusted library allocation
page read and write
F01000
heap
page read and write
177EB310000
trusted library allocation
page read and write
177EC230000
trusted library allocation
page read and write
177EC060000
trusted library allocation
page read and write
177EBCE0000
trusted library allocation
page read and write
378D000
stack
page read and write
177EB310000
trusted library allocation
page read and write
177EBED0000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
65FB7FF000
stack
page read and write
1778002C000
trusted library allocation
page read and write
177EBFA6000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EC470000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177E9941000
heap
page read and write
65FABFB000
stack
page read and write
F08000
heap
page read and write
177EBDF0000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
177EC430000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC130000
trusted library allocation
page read and write
F51000
heap
page read and write
177EC030000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC3F0000
trusted library allocation
page read and write
177E994D000
heap
page read and write
177EB340000
trusted library allocation
page read and write
177EBC69000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
F42000
heap
page read and write
177EBCC0000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EBF8F000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB530000
trusted library allocation
page read and write
177EC1A0000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EBC31000
heap
page read and write
17780020000
trusted library allocation
page read and write
35FF000
stack
page read and write
177EC310000
trusted library allocation
page read and write
177EBFA0000
trusted library allocation
page read and write
476000
remote allocation
page execute and read and write
177EB310000
trusted library allocation
page read and write
177EBE50000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC2B0000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EBF98000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB320000
trusted library section
page read and write
177EB310000
trusted library allocation
page read and write
177EC450000
trusted library allocation
page read and write
177EB4D0000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EC150000
trusted library allocation
page read and write
177EC070000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC250000
trusted library allocation
page read and write
177EB4B0000
trusted library allocation
page read and write
177EC340000
trusted library allocation
page read and write
177E9CD5000
heap
page read and write
177EC2E0000
trusted library allocation
page read and write
177EB370000
heap
page read and write
177EB324000
trusted library allocation
page read and write
177EC400000
trusted library allocation
page read and write
177EBC30000
trusted library allocation
page read and write
177EC370000
trusted library allocation
page read and write
177EBDD0000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EC010000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177920B6000
trusted library allocation
page read and write
177EBC0D000
heap
page read and write
177EC1C0000
trusted library allocation
page read and write
177EB4D0000
trusted library allocation
page read and write
177EB36F000
trusted library allocation
page read and write
177EC040000
trusted library allocation
page read and write
177EB4F0000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB530000
trusted library allocation
page read and write
177EBE70000
trusted library allocation
page read and write
177EC380000
trusted library allocation
page read and write
177EBDA0000
trusted library allocation
page read and write
177EBC30000
trusted library allocation
page read and write
177EB510000
trusted library allocation
page read and write
177E9910000
heap
page read and write
D80000
heap
page read and write
7FF814FB0000
trusted library allocation
page read and write
177EC3A0000
trusted library allocation
page read and write
34FE000
stack
page read and write
7FF814FC0000
trusted library allocation
page read and write
177E994F000
heap
page read and write
177EC480000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBCF0000
trusted library allocation
page read and write
65F8FF4000
stack
page read and write
177EB510000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
177EC000000
trusted library allocation
page read and write
9CE000
stack
page read and write
7FF814FEA000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EC260000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EC410000
trusted library allocation
page read and write
17790003000
trusted library allocation
page read and write
7FF814E0D000
trusted library allocation
page execute and read and write
373F000
stack
page read and write
177EB330000
trusted library allocation
page read and write
65F9FFE000
stack
page read and write
177EB360000
trusted library allocation
page read and write
177EBD10000
trusted library allocation
page read and write
177EBF60000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
177EC420000
trusted library allocation
page read and write
177EBFC7000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EB4D0000
trusted library allocation
page read and write
F32000
heap
page read and write
177E97B2000
unkown
page readonly
9D0000
heap
page read and write
2B0E000
stack
page read and write
177EC270000
trusted library allocation
page read and write
7FF814DFD000
trusted library allocation
page execute and read and write
177EBFF0000
trusted library allocation
page read and write
F1C000
heap
page read and write
177EBC20000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC020000
trusted library allocation
page read and write
177EBD20000
trusted library allocation
page read and write
177E9850000
heap
page read and write
7FF814FE5000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC320000
trusted library allocation
page read and write
177EBC10000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBCA0000
trusted library allocation
page read and write
177EC3D0000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
1778002E000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177E97B0000
unkown
page readonly
177EB310000
trusted library allocation
page read and write
177EB4B0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
F17000
heap
page read and write
177EB310000
trusted library allocation
page read and write
F46000
heap
page read and write
7FF814EA0000
trusted library allocation
page read and write
2C0F000
stack
page read and write
177E99AF000
heap
page read and write
177EBE10000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
17790005000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177E9939000
heap
page read and write
DA0000
heap
page read and write
177EBC60000
trusted library allocation
page read and write
177EBC60000
trusted library allocation
page read and write
177E991C000
heap
page read and write
177E9CD0000
heap
page read and write
177EB320000
trusted library allocation
page read and write
177EBDB0000
trusted library allocation
page read and write
177EBFAB000
trusted library allocation
page read and write
65F93FE000
stack
page read and write
177EBF40000
trusted library allocation
page read and write
177EBC20000
heap
page read and write
177EB310000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB390000
heap
page read and write
CFC000
stack
page read and write
177EBFCC000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
7FF814FA5000
trusted library allocation
page read and write
177EC1E0000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EBD30000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EBF90000
trusted library allocation
page read and write
472000
remote allocation
page execute and read and write
177EB340000
trusted library allocation
page read and write
177EBF00000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC3E0000
trusted library allocation
page read and write
177EBC10000
trusted library allocation
page read and write
177EBFB4000
trusted library allocation
page read and write
177EBC90000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB580000
trusted library allocation
page read and write
177EB500000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
92C000
stack
page read and write
177EBEB0000
trusted library allocation
page read and write
177EBC70000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EBC00000
heap
page read and write
177EC1B0000
trusted library allocation
page read and write
177E9CA0000
heap
page read and write
177EB310000
trusted library allocation
page read and write
F2F000
heap
page read and write
177EB310000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
177EB380000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
7FF814FA0000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
EC0000
heap
page read and write
177EBD00000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
17790001000
trusted library allocation
page read and write
177EC0C0000
trusted library allocation
page read and write
F2F000
heap
page read and write
177EB340000
trusted library allocation
page read and write
177EBFBE000
trusted library allocation
page read and write
177EC300000
trusted library allocation
page read and write
7FF814E04000
trusted library allocation
page read and write
177EC0A0000
trusted library allocation
page read and write
177EBC00000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
7FF814FE0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB540000
heap
page execute and read and write
177EC090000
trusted library allocation
page read and write
177EC190000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
F5B000
heap
page read and write
177EB330000
trusted library allocation
page read and write
17790007000
trusted library allocation
page read and write
177EB4B0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC210000
trusted library allocation
page read and write
177EB380000
trusted library allocation
page read and write
337F000
stack
page read and write
8C0000
heap
page read and write
177EB330000
trusted library allocation
page read and write
177EBD90000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EC280000
trusted library allocation
page read and write
177EBC26000
heap
page read and write
177EBE90000
trusted library allocation
page read and write
7FF814F10000
trusted library allocation
page read and write
10BF000
stack
page read and write
177EC330000
trusted library allocation
page read and write
177EBCD0000
trusted library allocation
page read and write
177EBFB0000
trusted library allocation
page read and write
7FF814EB0000
trusted library allocation
page execute and read and write
177EB380000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
F57000
heap
page read and write
177EB330000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB4F0000
trusted library allocation
page read and write
177EBEE0000
trusted library allocation
page read and write
177EBD40000
trusted library allocation
page read and write
177EBDC0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBF30000
trusted library allocation
page read and write
177EC390000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177E9842000
unkown
page readonly
177EB310000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
65F97FF000
stack
page read and write
177EB340000
trusted library allocation
page read and write
177EC240000
trusted library allocation
page read and write
177E98C0000
heap
page read and write
F4B000
heap
page read and write
177EBC00000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB300000
trusted library allocation
page read and write
177EBFE0000
trusted library allocation
page read and write
177EC160000
trusted library allocation
page read and write
65FA7FD000
stack
page read and write
177EB2F0000
trusted library allocation
page read and write
38CE000
stack
page read and write
177EB310000
trusted library section
page read and write
177EB380000
trusted library allocation
page read and write
F0D000
heap
page read and write
177EB340000
trusted library allocation
page read and write
177E9AE0000
heap
page read and write
177EBDE0000
trusted library allocation
page read and write
F14000
heap
page read and write
177E9979000
heap
page read and write
177EBF50000
trusted library allocation
page read and write
177EBF9D000
trusted library allocation
page read and write
177EBD70000
trusted library allocation
page read and write
177EC3B0000
trusted library allocation
page read and write
177E98E0000
heap
page read and write
177EB4E0000
trusted library allocation
page read and write
177EB350000
trusted library allocation
page read and write
177EBC40000
trusted library allocation
page read and write
177EBF20000
trusted library allocation
page read and write
177EBF7C000
trusted library allocation
page read and write
177EB4C0000
trusted library allocation
page read and write
177EBC70000
trusted library allocation
page read and write
177EBE60000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177E97B2000
unkown
page readonly
177EC40B000
trusted library allocation
page read and write
177EB4B0000
trusted library allocation
page read and write
F01000
heap
page read and write
177EB360000
trusted library allocation
page read and write
177EB520000
heap
page execute and read and write
39CF000
stack
page read and write
177EB4F0000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EC0F0000
trusted library allocation
page read and write
177EBE00000
trusted library allocation
page read and write
177EC350000
trusted library allocation
page read and write
177E9CA5000
heap
page read and write
F42000
heap
page read and write
177EB340000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBF80000
trusted library allocation
page read and write
177EB321000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
177EBD04000
heap
page read and write
177EC2C0000
trusted library allocation
page read and write
177EBEF0000
trusted library allocation
page read and write
1778003B000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBC26000
heap
page read and write
177EC100000
trusted library allocation
page read and write
177EC0E0000
trusted library allocation
page read and write
177E993E000
heap
page read and write
177EB350000
trusted library allocation
page read and write
177EBFC0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
F10000
heap
page read and write
65FBBFE000
stack
page read and write
F10000
heap
page read and write
177EB380000
trusted library allocation
page read and write
65FAFFB000
stack
page read and write
65FB3FE000
stack
page read and write
177EB330000
trusted library allocation
page read and write
177EB380000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB4E0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBF72000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
65FBFFE000
stack
page read and write
177EBD80000
trusted library allocation
page read and write
2A00000
heap
page read and write
177EBF93000
trusted library allocation
page read and write
177EC0D0000
trusted library allocation
page read and write
177EC120000
trusted library allocation
page read and write
177EB340000
trusted library allocation
page read and write
177EBFB9000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC140000
trusted library allocation
page read and write
177EBEA0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB4E0000
trusted library allocation
page read and write
EF2000
heap
page read and write
177EC220000
trusted library allocation
page read and write
33BE000
stack
page read and write
177EB310000
trusted library allocation
page read and write
177EB360000
trusted library allocation
page read and write
177EC180000
trusted library allocation
page read and write
177EBF70000
trusted library allocation
page read and write
177E9CB0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
34BE000
stack
page read and write
DA6000
heap
page read and write
177EBC35000
heap
page read and write
177EB320000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
327E000
stack
page read and write
177EB4B0000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB4E0000
trusted library allocation
page read and write
177EBF8A000
trusted library allocation
page read and write
177EC360000
trusted library allocation
page read and write
177EBF69000
trusted library allocation
page read and write
177E9842000
unkown
page readonly
177EBC2F000
heap
page read and write
F4B000
heap
page read and write
177EBFC2000
trusted library allocation
page read and write
7FF814ED6000
trusted library allocation
page execute and read and write
177EC1D0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC200000
trusted library allocation
page read and write
177EC1F0000
trusted library allocation
page read and write
EBD000
stack
page read and write
7FF4E25F0000
trusted library allocation
page execute and read and write
17780001000
trusted library allocation
page read and write
177EBF10000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177E9977000
heap
page read and write
177EC170000
trusted library allocation
page read and write
177EBD0D000
heap
page read and write
F3D000
heap
page read and write
177EBC26000
heap
page read and write
177EB500000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC2F0000
trusted library allocation
page read and write
65F9BFF000
stack
page read and write
177EB4E0000
trusted library allocation
page read and write
177EC2A0000
trusted library allocation
page read and write
7FF814DF4000
trusted library allocation
page read and write
177EBF85000
trusted library allocation
page read and write
177E97B0000
unkown
page readonly
177EBFD0000
trusted library allocation
page read and write
177EB4D0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EBC20000
trusted library allocation
page read and write
177EB304000
trusted library allocation
page read and write
177EBC50000
trusted library allocation
page read and write
177EBEC0000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EB4D0000
trusted library allocation
page read and write
177EC110000
trusted library allocation
page read and write
65FA3FD000
stack
page read and write
177EBE80000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB380000
trusted library allocation
page read and write
177EC050000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EBC26000
heap
page read and write
177EB340000
trusted library allocation
page read and write
177E9980000
heap
page read and write
177EBC50000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EC42C000
trusted library allocation
page read and write
363E000
stack
page read and write
177EBC80000
trusted library allocation
page read and write
177EBF6E000
trusted library allocation
page read and write
177EB320000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
177EB500000
trusted library allocation
page read and write
177EB330000
trusted library allocation
page read and write
17793211000
trusted library allocation
page read and write
7FF814F20000
trusted library allocation
page execute and read and write
177EC3C0000
trusted library allocation
page read and write
388A000
stack
page read and write
D7E000
stack
page read and write
17780029000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
7FF814F19000
trusted library allocation
page read and write
177EB310000
trusted library allocation
page read and write
177EC3A5000
trusted library allocation
page read and write
177EC290000
trusted library allocation
page read and write
17791809000
trusted library allocation
page read and write
177EBF77000
trusted library allocation
page read and write
There are 468 hidden memdumps, click here to show them.