IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
malicious

URLs

Name
IP
Malicious
pekonomia.duckdns.org
malicious
http://geoplugin.net/json.gp
unknown
http://geoplugin.net/json.gp/C
unknown

Domains

Name
IP
Malicious
pekonomia.duckdns.org
192.169.69.26
malicious

IPs

IP
Domain
Country
Malicious
192.169.69.26
pekonomia.duckdns.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Rmc-B0VP4N
exepath
malicious
HKEY_CURRENT_USER\Software\Rmc-B0VP4N
licence
malicious
HKEY_CURRENT_USER\Software\Rmc-B0VP4N
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
13F7000
heap
page read and write
malicious
18F9283E000
trusted library allocation
page read and write
malicious
18F91E43000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7FF814D62000
trusted library allocation
page read and write
2A003660000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFADB0000
trusted library allocation
page read and write
74647FD000
stack
page read and write
18FFAE90000
heap
page execute and read and write
7FF814D54000
trusted library allocation
page read and write
18FF8920000
unkown
page readonly
7FF814EF9000
trusted library allocation
page read and write
1422000
heap
page read and write
18FFA5B0000
trusted library allocation
page read and write
18FF8E34000
trusted library allocation
page read and write
7FF814D6D000
trusted library allocation
page execute and read and write
E737B7F000
stack
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFACB8000
heap
page read and write
2A002645000
heap
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
301F000
stack
page read and write
18FF8B3E000
heap
page read and write
2F1E000
stack
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FFA5B0000
trusted library allocation
page read and write
74633F5000
stack
page read and write
18FF8E60000
trusted library allocation
page read and write
1431000
heap
page read and write
18FF8E50000
heap
page read and write
18FF8B00000
heap
page read and write
18FFA5C0000
trusted library allocation
page read and write
2A0026A9000
heap
page read and write
7FF814D5D000
trusted library allocation
page execute and read and write
2A0026EE000
heap
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5D0000
trusted library allocation
page read and write
1434000
heap
page read and write
1433000
heap
page read and write
1439000
heap
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FFA5B0000
trusted library allocation
page read and write
18FF8922000
unkown
page readonly
18FFADD0000
trusted library allocation
page read and write
2A003650000
trusted library allocation
page read and write
3050000
heap
page read and write
319F000
stack
page read and write
476000
remote allocation
page execute and read and write
18F918E9000
trusted library allocation
page read and write
18FF8C20000
heap
page read and write
18FFA5B0000
trusted library allocation
page read and write
E737AF9000
stack
page read and write
7464FFE000
stack
page read and write
18FF8B19000
heap
page read and write
18FF8E60000
trusted library allocation
page read and write
18FF8B90000
heap
page read and write
18FF8C60000
trusted library allocation
page read and write
18FF8C75000
heap
page read and write
142E000
heap
page read and write
7FF814E70000
trusted library allocation
page execute and read and write
2A0026F1000
heap
page read and write
18FF8C70000
heap
page read and write
18F90005000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FF8AE0000
heap
page read and write
2A0026EF000
heap
page read and write
18FF8E60000
trusted library allocation
page read and write
7464BFD000
stack
page read and write
7FF814E36000
trusted library allocation
page execute and read and write
18FF8E60000
trusted library allocation
page read and write
2A003380000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA630000
trusted library allocation
page read and write
18FFACD0000
trusted library allocation
page read and write
2A003640000
heap
page readonly
2A002649000
heap
page read and write
7465BFF000
stack
page read and write
12FB000
stack
page read and write
18FF8E60000
trusted library allocation
page read and write
2A0026EE000
heap
page read and write
2A0026E7000
heap
page read and write
18FF8E60000
trusted library section
page read and write
18FF8B3B000
heap
page read and write
18FFADC0000
trusted library allocation
page read and write
18FFAEA8000
heap
page read and write
18FF8E60000
trusted library allocation
page read and write
7FF814DAC000
trusted library allocation
page execute and read and write
142F000
heap
page read and write
18FFA5A0000
trusted library allocation
page read and write
7FF814D64000
trusted library allocation
page read and write
2A0025A0000
heap
page read and write
18F91E16000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FFACB0000
heap
page read and write
472000
remote allocation
page execute and read and write
FFE000
stack
page read and write
18FFADE0000
trusted library allocation
page read and write
18FFA5E0000
trusted library allocation
page read and write
309E000
stack
page read and write
18FFA5B0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5C0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
2A003370000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FF8B2F000
heap
page read and write
74643FF000
stack
page read and write
18FFA5D0000
trusted library allocation
page read and write
2A0025B0000
trusted library allocation
page read and write
18FFA5D0000
trusted library allocation
page read and write
7FF814D70000
trusted library allocation
page read and write
74653FE000
stack
page read and write
2A0033F0000
trusted library allocation
page read and write
18FF8E30000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18F90003000
trusted library allocation
page read and write
7FF814D7D000
trusted library allocation
page execute and read and write
74657FE000
stack
page read and write
18F90001000
trusted library allocation
page read and write
18FFA5B0000
trusted library allocation
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
3020000
heap
page read and write
2A0036B0000
trusted library allocation
page read and write
2A002640000
heap
page read and write
E7376EC000
stack
page read and write
18FFAE00000
trusted library allocation
page read and write
18FF8E70000
heap
page read and write
7463FFF000
stack
page read and write
18FFA5A0000
trusted library allocation
page read and write
2A0026A0000
heap
page read and write
7463BFE000
stack
page read and write
18FFA5C0000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFACB0000
trusted library allocation
page read and write
18FFA5B0000
trusted library allocation
page read and write
74637FE000
stack
page read and write
18FFAEAE000
heap
page read and write
7FF814EF2000
trusted library allocation
page read and write
2A002650000
heap
page read and write
F5D000
stack
page read and write
31DE000
stack
page read and write
2A003630000
trusted library allocation
page read and write
18FF8C00000
heap
page read and write
18FF89A0000
heap
page read and write
18FF8B0C000
heap
page read and write
E737C79000
stack
page read and write
18FFA5A0000
trusted library allocation
page read and write
18F91CB2000
trusted library allocation
page read and write
18FF8B87000
heap
page read and write
E737CF9000
stack
page read and write
18F80001000
trusted library allocation
page read and write
18F91C22000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
13E0000
heap
page read and write
1432000
heap
page read and write
18FF8B6B000
heap
page read and write
18FFA5A0000
trusted library allocation
page read and write
1431000
heap
page read and write
18F800E4000
trusted library allocation
page read and write
142E000
heap
page read and write
18FF8922000
unkown
page readonly
18FFACC0000
trusted library allocation
page read and write
2A002870000
trusted library allocation
page read and write
18FF8E75000
heap
page read and write
E737A79000
stack
page read and write
18F8000A000
trusted library allocation
page read and write
2A0026F1000
heap
page read and write
7FF49BCA0000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
32DE000
stack
page read and write
18FF8920000
unkown
page readonly
18F91C4F000
trusted library allocation
page read and write
18FF8E20000
trusted library allocation
page read and write
18FF8B84000
heap
page read and write
18FFA5A0000
trusted library allocation
page read and write
18FFA5D0000
trusted library allocation
page read and write
7FF814E10000
trusted library allocation
page execute and read and write
7FF814D60000
trusted library allocation
page read and write
18FF8E60000
trusted library allocation
page read and write
18FFACC7000
heap
page read and write
18F91809000
trusted library allocation
page read and write
18FFA5F0000
heap
page execute and read and write
18FF8E60000
trusted library allocation
page read and write
18FF8E40000
heap
page read and write
EF0000
heap
page read and write
18FFA5E0000
trusted library allocation
page read and write
18FFACB0000
trusted library allocation
page read and write
13E5000
heap
page read and write
2A0033E0000
trusted library allocation
page read and write
18FFA5E0000
trusted library allocation
page read and write
18F8008D000
trusted library allocation
page read and write
15EF000
stack
page read and write
18F80005000
trusted library allocation
page read and write
18FF8B41000
heap
page read and write
142E000
heap
page read and write
18FFADF0000
trusted library allocation
page read and write
13D0000
heap
page read and write
18FFA5C0000
trusted library allocation
page read and write
2A002610000
heap
page read and write
7FF814E00000
trusted library allocation
page read and write
There are 200 hidden memdumps, click here to show them.