Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
tGm4SuP0sz.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tGm4SuP0sz.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\d3d9.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tGm4SuP0sz.exe
|
"C:\Users\user\Desktop\tGm4SuP0sz.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
justifycanddidatewd.shop
|
|||
employeedscratshj.shop
|
|||
marathonbeedksow.shop
|
|||
pleasurenarrowsdla.shop
|
|||
richardflorespoew.shop
|
|||
falseaudiencekd.shop
|
|||
feighminoritsjda.shop
|
|||
strwawrunnygjwu.shop
|
|||
raiseboltskdlwpow.shop
|
|||
https://pleasurenarrowsdla.shop/
|
unknown
|
||
https://richardflorespoew.shop/apii
|
unknown
|
||
https://feighminoritsjda.shop/api1
|
unknown
|
||
https://falseaudiencekd.shop/api
|
unknown
|
||
https://richardflorespoew.shop/apiy
|
unknown
|
||
https://richardflorespoew.shop/api7
|
unknown
|
||
https://strwawrunnygjwu.shop//l
|
unknown
|
||
https://richardflorespoew.shop/api
|
unknown
|
||
https://justifycanddidatewd.shop/
|
unknown
|
||
https://pleasurenarrowsdla.shop/api?
|
unknown
|
||
https://raiseboltskdlwpow.shop/B
|
unknown
|
||
https://employeedscratshj.shop/api
|
unknown
|
||
https://richardflorespoew.shop/0
|
unknown
|
||
https://richardflorespoew.shop/
|
unknown
|
||
https://strwawrunnygjwu.shop/api
|
unknown
|
||
https://richardflorespoew.shop/g
|
unknown
|
||
https://justifycanddidatewd.shop/api
|
unknown
|
||
https://feighminoritsjda.shop/apiK
|
unknown
|
There are 17 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
justifycanddidatewd.shop
|
unknown
|
||
richardflorespoew.shop
|
unknown
|
||
strwawrunnygjwu.shop
|
unknown
|
||
falseaudiencekd.shop
|
unknown
|
||
raiseboltskdlwpow.shop
|
unknown
|
||
employeedscratshj.shop
|
unknown
|
||
marathonbeedksow.shop
|
unknown
|
||
feighminoritsjda.shop
|
unknown
|
||
pleasurenarrowsdla.shop
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6D36F000
|
unkown
|
page read and write
|
||
48F0000
|
remote allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
479D000
|
stack
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
B2F000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1790000
|
trusted library allocation
|
page execute and read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
10AC000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
16E3000
|
trusted library allocation
|
page execute and read and write
|
||
6D368000
|
unkown
|
page readonly
|
||
A80000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
44F000
|
remote allocation
|
page execute and read and write
|
||
B22000
|
heap
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
stack
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
6D351000
|
unkown
|
page execute read
|
||
546E000
|
stack
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
6D350000
|
unkown
|
page readonly
|
||
15D0000
|
heap
|
page read and write
|
||
E92000
|
unkown
|
page readonly
|
||
1485000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
1605000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
16E4000
|
trusted library allocation
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
4339000
|
trusted library allocation
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
18AF000
|
stack
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
47DD000
|
stack
|
page read and write
|
||
48F0000
|
remote allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
16ED000
|
trusted library allocation
|
page execute and read and write
|
||
1480000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page execute and read and write
|
||
17A0000
|
heap
|
page read and write
|
||
15DA000
|
heap
|
page read and write
|
||
1717000
|
trusted library allocation
|
page execute and read and write
|
||
AD8000
|
heap
|
page read and write
|
||
48F0000
|
remote allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
101C000
|
unkown
|
page readonly
|
||
97D000
|
stack
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
15FC000
|
heap
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
19AF000
|
stack
|
page read and write
|
||
E90000
|
unkown
|
page readonly
|
||
A6E000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
6D3BA000
|
unkown
|
page readonly
|
||
171B000
|
trusted library allocation
|
page execute and read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
16F4000
|
trusted library allocation
|
page read and write
|
There are 72 hidden memdumps, click here to show them.