Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
42.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\acceptancy
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrorrheuma
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2C63.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2CC2.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\42.exe
|
"C:\Users\user\Desktop\42.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\42.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r3.o.lencr.org0
|
unknown
|
||
http://funworld.co.id
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://mail.funworld.co.id
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
funworld.co.id
|
180.235.148.163
|
||
mail.funworld.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
180.235.148.163
|
funworld.co.id
|
Indonesia
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28E9000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2720000
|
heap
|
page execute and read and write
|
||
38DC000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
4D11000
|
trusted library allocation
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
6470000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
606F000
|
stack
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
59A000
|
stack
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
53F7000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
unkown
|
page readonly
|
||
8F9000
|
stack
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
FDF000
|
unkown
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
37F4000
|
heap
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
1DA0000
|
direct allocation
|
page execute and read and write
|
||
11AD000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page execute and read and write
|
||
5FED000
|
stack
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
602E000
|
stack
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
4EB4000
|
heap
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
5410000
|
trusted library allocation
|
page execute and read and write
|
||
5EAD000
|
stack
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
4D0E000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
4D16000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
4CFB000
|
trusted library allocation
|
page read and write
|
||
6480000
|
trusted library allocation
|
page execute and read and write
|
||
117F000
|
heap
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
FD5000
|
unkown
|
page readonly
|
||
1153000
|
heap
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
62EE000
|
stack
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
C25000
|
trusted library allocation
|
page execute and read and write
|
||
E50000
|
heap
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
heap
|
page execute and read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
FE3000
|
unkown
|
page write copy
|
||
A1E000
|
stack
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
1D1F000
|
stack
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
7F080000
|
trusted library allocation
|
page execute and read and write
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
1152000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
4D1D000
|
trusted library allocation
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
28D7000
|
trusted library allocation
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
C12000
|
trusted library allocation
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
3899000
|
trusted library allocation
|
page read and write
|
||
1E60000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
12D1000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page execute and read and write
|
||
124A000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
5B94000
|
heap
|
page read and write
|
||
5B75000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
2678000
|
trusted library allocation
|
page read and write
|
||
37F0000
|
heap
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
28FE000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
unkown
|
page readonly
|
||
11AD000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
3B40000
|
direct allocation
|
page read and write
|
||
191E000
|
stack
|
page read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
unkown
|
page write copy
|
||
79A000
|
stack
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
||
1282000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write
|
||
3E0D000
|
direct allocation
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
3C63000
|
direct allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
FE8000
|
unkown
|
page readonly
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
28BC000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
F21000
|
unkown
|
page execute read
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
12D1000
|
heap
|
page read and write
|
||
FE8000
|
unkown
|
page readonly
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
B5E000
|
stack
|
page read and write
|
||
F21000
|
unkown
|
page execute read
|
||
3B40000
|
direct allocation
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
3E7E000
|
direct allocation
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
A50000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
49AD000
|
stack
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
48AC000
|
stack
|
page read and write
|
||
1152000
|
heap
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
3CE0000
|
direct allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
unkown
|
page readonly
|
||
D3B000
|
heap
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
direct allocation
|
page read and write
|
There are 217 hidden memdumps, click here to show them.