Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Shipping Document #100020486.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tabulator
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Shipping Document #100020486.exe
|
"C:\Users\user\Desktop\Shipping Document #100020486.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Shipping Document #100020486.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r11.i.lencr.org/0
|
unknown
|
||
http://srv.masternic.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
srv.masternic.net
|
174.141.234.138
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
174.141.234.138
|
srv.masternic.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2908000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
742000
|
system
|
page execute and read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
CD7000
|
trusted library allocation
|
page execute and read and write
|
||
482000
|
unkown
|
page readonly
|
||
93E000
|
stack
|
page read and write
|
||
3B47000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3BD0000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
933000
|
heap
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3A70000
|
heap
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
28F7000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3EE5000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
5C9F000
|
stack
|
page read and write
|
||
3D2A000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
2682000
|
trusted library allocation
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
740000
|
system
|
page execute and read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
3D3A000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
CAD000
|
trusted library allocation
|
page execute and read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
CBD000
|
trusted library allocation
|
page execute and read and write
|
||
3D89000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page execute and read and write
|
||
5A90000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3C79000
|
heap
|
page read and write
|
||
4DE3000
|
heap
|
page read and write
|
||
3C8B000
|
heap
|
page read and write
|
||
3D60000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
CD2000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
6420000
|
trusted library allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3AD0000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E51000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3DA6000
|
heap
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
26A2000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
26F8000
|
trusted library allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
7F2B0000
|
trusted library allocation
|
page execute and read and write
|
||
86E000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
2904000
|
trusted library allocation
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
A04000
|
heap
|
page read and write
|
||
3CC6000
|
heap
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
6460000
|
heap
|
page read and write
|
||
3E50000
|
heap
|
page read and write
|
||
62DF000
|
stack
|
page read and write
|
||
3C68000
|
heap
|
page read and write
|
||
4256000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
CCA000
|
trusted library allocation
|
page execute and read and write
|
||
3AD1000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
5E9D000
|
stack
|
page read and write
|
||
430E000
|
heap
|
page read and write
|
||
5BA6000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3E9F000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
5BFD000
|
stack
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
268A000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
27CC000
|
stack
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
46DD000
|
direct allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3B66000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
267B000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
4EEC000
|
stack
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3D8C000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3E9F000
|
heap
|
page read and write
|
||
267E000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3F1A000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
CA3000
|
trusted library allocation
|
page execute and read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3D44000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
396A000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
3D88000
|
heap
|
page execute and read and write
|
||
180F000
|
stack
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
3C3F000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
498D000
|
stack
|
page read and write
|
||
3D89000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
CC6000
|
trusted library allocation
|
page execute and read and write
|
||
3D89000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
38F9000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page execute and read and write
|
||
8B4000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
269D000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
268E000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page execute and read and write
|
||
889000
|
heap
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
3DB6000
|
heap
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
CDB000
|
trusted library allocation
|
page execute and read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
CC2000
|
trusted library allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
CD5000
|
trusted library allocation
|
page execute and read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
26C0000
|
heap
|
page execute and read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
3EBD000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
CA4000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
2676000
|
trusted library allocation
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
738000
|
stack
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3E9F000
|
heap
|
page read and write
|
||
3E98000
|
heap
|
page read and write
|
||
3EE5000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
There are 277 hidden memdumps, click here to show them.