Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SOA CONTAINER LINE Oct 24.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SOA CONTAINER LINE Oct 24.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe
|
"C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
|
||
C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe
|
"C:\Users\user\Desktop\SOA CONTAINER LINE Oct 24.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 356 -s 12
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/q
|
unknown
|
||
https://www.google.com/#q=
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
13E71000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
stack
|
page read and write
|
||
13E68000
|
trusted library allocation
|
page read and write
|
||
7FFD342EB000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE000
|
stack
|
page read and write
|
||
1CBF7000
|
heap
|
page read and write
|
||
17374000
|
trusted library allocation
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
7FFD34472000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
3EE0000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
7FFD342CD000
|
trusted library allocation
|
page execute and read and write
|
||
1CBF5000
|
heap
|
page read and write
|
||
15889000
|
trusted library allocation
|
page read and write
|
||
1C9B0000
|
trusted library allocation
|
page read and write
|
||
3E61000
|
trusted library allocation
|
page read and write
|
||
7FFD342E4000
|
trusted library allocation
|
page read and write
|
||
1CFFC000
|
stack
|
page read and write
|
||
1EE60000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
20FFE000
|
stack
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page read and write
|
||
1FA00000
|
heap
|
page read and write
|
||
7FFD34476000
|
trusted library allocation
|
page read and write
|
||
140D000
|
heap
|
page read and write
|
||
1ED60000
|
heap
|
page read and write
|
||
203FE000
|
stack
|
page read and write
|
||
146C000
|
heap
|
page read and write
|
||
1D83B000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
17355000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
1F462000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
1330000
|
heap
|
page read and write
|
||
1CBFC000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
207FE000
|
stack
|
page read and write
|
||
1F35D000
|
stack
|
page read and write
|
||
7FFD34479000
|
trusted library allocation
|
page read and write
|
||
1635000
|
heap
|
page read and write
|
||
1680000
|
trusted library section
|
page read and write
|
||
172F4000
|
trusted library allocation
|
page read and write
|
||
7FFD34380000
|
trusted library allocation
|
page execute and read and write
|
||
B50000
|
heap
|
page read and write
|
||
1353000
|
heap
|
page read and write
|
||
1D7FE000
|
stack
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1579F000
|
trusted library allocation
|
page read and write
|
||
7FFD342DD000
|
trusted library allocation
|
page execute and read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
1CBF0000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page execute and read and write
|
||
7FFD34470000
|
trusted library allocation
|
page read and write
|
||
7FFD342ED000
|
trusted library allocation
|
page execute and read and write
|
||
1DD5D000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1D800000
|
heap
|
page read and write
|
||
11F4000
|
stack
|
page read and write
|
||
1D810000
|
heap
|
page read and write
|
||
1D950000
|
heap
|
page execute and read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
1C5DA000
|
stack
|
page read and write
|
||
1FA25000
|
heap
|
page read and write
|
||
20BFB000
|
stack
|
page read and write
|
||
15751000
|
trusted library allocation
|
page read and write
|
||
7FF419B20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34370000
|
trusted library allocation
|
page read and write
|
||
22BE000
|
stack
|
page read and write
|
||
7FFD343E0000
|
trusted library allocation
|
page execute and read and write
|
||
1424000
|
heap
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1F990000
|
trusted library section
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1EBE000
|
stack
|
page read and write
|
||
1C9A0000
|
trusted library section
|
page read and write
|
||
144F000
|
heap
|
page read and write
|
||
7FFD342C2000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library section
|
page readonly
|
||
7FFD342C3000
|
trusted library allocation
|
page execute and read and write
|
||
1605000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
13E61000
|
trusted library allocation
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page execute and read and write
|
||
A22000
|
unkown
|
page readonly
|
||
1455000
|
heap
|
page read and write
|
||
7FFD3437C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3448C000
|
trusted library allocation
|
page read and write
|
||
1C9C0000
|
heap
|
page read and write
|
||
7FFD34460000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7FFD343A6000
|
trusted library allocation
|
page execute and read and write
|
||
144D000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
7FFD34376000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1EF40000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
15703000
|
trusted library allocation
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page read and write
|
||
7FFD3431C000
|
trusted library allocation
|
page execute and read and write
|
||
1FFFF000
|
stack
|
page read and write
|
||
7FFD342C4000
|
trusted library allocation
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
7FFD3447C000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7FFD34481000
|
trusted library allocation
|
page read and write
|
||
7FFD342D3000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
7FFD344B4000
|
trusted library allocation
|
page read and write
|
There are 107 hidden memdumps, click here to show them.