Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ SN00954666 for prosjekt CMC 40 fot container.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\proximobuccal
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ SN00954666 for prosjekt CMC 40 fot container.exe
|
"C:\Users\user\Desktop\RFQ SN00954666 for prosjekt CMC 40 fot container.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\RFQ SN00954666 for prosjekt CMC 40 fot container.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://bezelety.top
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bezelety.top
|
194.36.191.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.36.191.196
|
bezelety.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DB1000
|
trusted library allocation
|
page read and write
|
||
2E28000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
4240000
|
direct allocation
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
3C40000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
637D000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
2D10000
|
heap
|
page execute and read and write
|
||
100000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
10DA000
|
trusted library allocation
|
page execute and read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
53CC000
|
stack
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
11D8000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
1F6000
|
heap
|
page read and write
|
||
3E9C000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page execute and read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
164F000
|
stack
|
page read and write
|
||
3D8E000
|
heap
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page execute and read and write
|
||
A2E000
|
stack
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
3D56000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
3CF8000
|
heap
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
10E7000
|
trusted library allocation
|
page execute and read and write
|
||
2D2B000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
112A000
|
heap
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
3E9C000
|
heap
|
page read and write
|
||
2E18000
|
trusted library allocation
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
7F8D0000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3E37000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
424E000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
6326000
|
trusted library allocation
|
page read and write
|
||
16EB000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
138C000
|
stack
|
page read and write
|
||
3E33000
|
heap
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
3EC8000
|
heap
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
10EB000
|
trusted library allocation
|
page execute and read and write
|
||
1060000
|
heap
|
page read and write
|
||
3E17000
|
trusted library allocation
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1650000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
661D000
|
stack
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
4307000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1136000
|
heap
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
3E40000
|
heap
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3E8B000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
6467000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
10D6000
|
trusted library allocation
|
page execute and read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
2F5F000
|
heap
|
page read and write
|
||
6380000
|
trusted library allocation
|
page execute and read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page execute and read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
3F04000
|
heap
|
page read and write
|
||
3E41000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
6320000
|
trusted library allocation
|
page read and write
|
||
6249000
|
heap
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
546C000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
stack
|
page read and write
|
||
2D3A000
|
trusted library allocation
|
page read and write
|
||
3D19000
|
heap
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
3E8C000
|
heap
|
page read and write
|
||
5473000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
45B0000
|
direct allocation
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
2DFC000
|
trusted library allocation
|
page read and write
|
||
567C000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
3D00000
|
heap
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page execute and read and write
|
||
695E000
|
stack
|
page read and write
|
||
6285000
|
heap
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3C3F000
|
stack
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
3CFB000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
3DD9000
|
trusted library allocation
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
3DB1000
|
trusted library allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
trusted library allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
3E44000
|
heap
|
page read and write
|
||
46D9000
|
direct allocation
|
page read and write
|
||
16CC000
|
heap
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
3ED2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
EF8000
|
stack
|
page read and write
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
626C000
|
heap
|
page read and write
|
||
2E24000
|
trusted library allocation
|
page read and write
|
||
474E000
|
direct allocation
|
page read and write
|
||
10E5000
|
trusted library allocation
|
page execute and read and write
|
There are 225 hidden memdumps, click here to show them.