Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DHL_67329033929228____________________________.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autEFD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autF4C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\epistemology
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\outvaunts
|
ASCII text, with very long lines (29748), with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
|
"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sectigo.com/CPS0
|
unknown
|
||
http://mail.worlorderbillions.top
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://worlorderbillions.top
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.worlorderbillions.top
|
unknown
|
||
worlorderbillions.top
|
185.244.151.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.244.151.84
|
worlorderbillions.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
532000
|
system
|
page execute and read and write
|
||
259A000
|
trusted library allocation
|
page read and write
|
||
D30000
|
direct allocation
|
page read and write
|
||
2521000
|
trusted library allocation
|
page read and write
|
||
256E000
|
trusted library allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page execute and read and write
|
||
4A30000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
65D000
|
trusted library allocation
|
page execute and read and write
|
||
654000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
59FD000
|
stack
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
568F000
|
stack
|
page read and write
|
||
676000
|
trusted library allocation
|
page execute and read and write
|
||
67A000
|
trusted library allocation
|
page execute and read and write
|
||
4A19000
|
trusted library allocation
|
page read and write
|
||
697000
|
trusted library allocation
|
page execute and read and write
|
||
784000
|
heap
|
page read and write
|
||
70231000
|
unkown
|
page execute read
|
||
4DEE000
|
stack
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page execute and read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
4992000
|
trusted library allocation
|
page read and write
|
||
2588000
|
trusted library allocation
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page execute and read and write
|
||
E88000
|
unkown
|
page readonly
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
640000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
4B6C000
|
stack
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
1AEE000
|
stack
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
57B6000
|
heap
|
page read and write
|
||
5C9D000
|
stack
|
page read and write
|
||
1FA000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
611E000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
7024D000
|
unkown
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
256C000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
70230000
|
unkown
|
page readonly
|
||
134C000
|
heap
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
461D000
|
stack
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
13B1000
|
heap
|
page read and write
|
||
12AB000
|
stack
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
57F2000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
49F0000
|
heap
|
page execute and read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
6B0000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
E83000
|
unkown
|
page write copy
|
||
3C60000
|
direct allocation
|
page read and write
|
||
4C6C000
|
stack
|
page read and write
|
||
2596000
|
trusted library allocation
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
69B000
|
trusted library allocation
|
page execute and read and write
|
||
6C8000
|
heap
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
530000
|
system
|
page execute and read and write
|
||
57AB000
|
heap
|
page read and write
|
||
695000
|
trusted library allocation
|
page execute and read and write
|
||
1344000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page execute and read and write
|
||
498D000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page execute and read and write
|
||
4FDC000
|
trusted library allocation
|
page read and write
|
||
E75000
|
unkown
|
page readonly
|
||
3B10000
|
direct allocation
|
page read and write
|
||
3584000
|
trusted library allocation
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
13B1000
|
heap
|
page read and write
|
||
497A000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
7024F000
|
unkown
|
page readonly
|
||
3D89000
|
direct allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
12CC000
|
stack
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
621F000
|
stack
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
E7F000
|
unkown
|
page write copy
|
||
70246000
|
unkown
|
page readonly
|
||
6C0000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
497E000
|
trusted library allocation
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
653000
|
trusted library allocation
|
page execute and read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
1EEE000
|
stack
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
56E000
|
system
|
page execute and read and write
|
||
1396000
|
heap
|
page read and write
|
||
4F8000
|
stack
|
page read and write
|
||
4986000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
7EFF0000
|
trusted library allocation
|
page execute and read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
A39000
|
stack
|
page read and write
|
||
496B000
|
trusted library allocation
|
page read and write
|
||
6250000
|
heap
|
page read and write
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
4981000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
4966000
|
trusted library allocation
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
1322000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
759000
|
heap
|
page read and write
|
||
E4F000
|
unkown
|
page readonly
|
||
692000
|
trusted library allocation
|
page read and write
|
||
580D000
|
heap
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
672000
|
trusted library allocation
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
25A2000
|
trusted library allocation
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
E75000
|
unkown
|
page readonly
|
||
1383000
|
heap
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
A68000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
496E000
|
trusted library allocation
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
E4F000
|
unkown
|
page readonly
|
||
66D000
|
trusted library allocation
|
page execute and read and write
|
||
13D1000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
E88000
|
unkown
|
page readonly
|
||
3C60000
|
direct allocation
|
page read and write
|
||
E7F000
|
unkown
|
page read and write
|
||
6260000
|
trusted library allocation
|
page execute and read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
4972000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
There are 235 hidden memdumps, click here to show them.