Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Products Order.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Products Order.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\188E93\31437F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Products Order.exe
|
"C:\Users\user\Desktop\Products Order.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
45.90.57.51/big/five/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://45.90.57.51/big/five/fre.php
|
45.90.57.51
|
||
http://alphastand.trade/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://www.ibsensoftware.com/
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.90.57.51
|
unknown
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
12AA6000
|
trusted library allocation
|
page read and write
|
||
4B6000
|
unkown
|
page readonly
|
||
778000
|
heap
|
page read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
1C000
|
unkown
|
page readonly
|
||
2E7B000
|
trusted library allocation
|
page read and write
|
||
2BF8000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
2BFA000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1A910000
|
trusted library allocation
|
page read and write
|
||
2C07000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
2D6B000
|
trusted library allocation
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
A50000
|
trusted library section
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4893F0000
|
trusted library allocation
|
page execute and read and write
|
||
2D7E000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2E8A000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
4B1000
|
unkown
|
page readonly
|
||
2E6A000
|
trusted library allocation
|
page read and write
|
||
12989000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
128E8000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2A19000
|
trusted library allocation
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
29E6000
|
trusted library allocation
|
page read and write
|
||
12AC0000
|
trusted library allocation
|
page read and write
|
||
12940000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1B380000
|
heap
|
page read and write
|
||
2BDA000
|
trusted library allocation
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
29FC000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B58E000
|
stack
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
1B78F000
|
stack
|
page read and write
|
||
2A17000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
stack
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
2E5F000
|
trusted library allocation
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
129D1000
|
trusted library allocation
|
page read and write
|
||
2DA2000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
4D9000
|
unkown
|
page readonly
|
||
2BD4000
|
trusted library allocation
|
page read and write
|
||
2BC7000
|
trusted library allocation
|
page read and write
|
||
2E4C000
|
trusted library allocation
|
page read and write
|
||
2D8B000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1B68F000
|
stack
|
page read and write
|
||
1AE6D000
|
stack
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
128E3000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page execute and read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
12A19000
|
trusted library allocation
|
page read and write
|
||
29F3000
|
trusted library allocation
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
2BFC000
|
trusted library allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
2E57000
|
trusted library allocation
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
4C9000
|
unkown
|
page readonly
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
12A61000
|
trusted library allocation
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
2A04000
|
trusted library allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
48E000
|
unkown
|
page readonly
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
2E7D000
|
trusted library allocation
|
page read and write
|
||
1AC000
|
stack
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
B6E000
|
heap
|
page read and write
|
||
1AC68000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2E7F000
|
trusted library allocation
|
page read and write
|
||
AC000
|
stack
|
page read and write
|
||
2A1D000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
29F9000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
1B1B0000
|
heap
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
2BD6000
|
trusted library allocation
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
432000
|
unkown
|
page readonly
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
4D2000
|
unkown
|
page readonly
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
12AE3000
|
trusted library allocation
|
page read and write
|
||
2BC9000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
2D67000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
There are 157 hidden memdumps, click here to show them.