Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut745C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\overfertilize
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe
|
"C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\18112024_Dokman_1 Kas_m 2024- Avans_T24-2112184_dekont.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://zqamcx.com
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://r11.i.lencr.org/0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
zqamcx.com
|
78.110.166.82
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
78.110.166.82
|
zqamcx.com
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AF8000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
1060000
|
direct allocation
|
page read and write
|
||
2898000
|
trusted library allocation
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
1D5E000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
E7D000
|
heap
|
page read and write
|
||
7F040000
|
trusted library allocation
|
page execute and read and write
|
||
2BF3000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
unkown
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
ECF000
|
unkown
|
page write copy
|
||
3AE3000
|
direct allocation
|
page read and write
|
||
2BF7000
|
trusted library allocation
|
page read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
4EE6000
|
trusted library allocation
|
page read and write
|
||
4EC6000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
3C89000
|
direct allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3CD9000
|
direct allocation
|
page read and write
|
||
3CFE000
|
direct allocation
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
1DE0000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
4EED000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
direct allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
5DE7000
|
heap
|
page read and write
|
||
3A81000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4ED2000
|
trusted library allocation
|
page read and write
|
||
3CDD000
|
direct allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
5EF6000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
stack
|
page read and write
|
||
3B33000
|
direct allocation
|
page read and write
|
||
61ED000
|
stack
|
page read and write
|
||
3CD9000
|
direct allocation
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
unkown
|
page readonly
|
||
1161000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page execute and read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
3B60000
|
direct allocation
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5E51000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
699000
|
stack
|
page read and write
|
||
3CDD000
|
direct allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
5DE4000
|
heap
|
page read and write
|
||
799000
|
stack
|
page read and write
|
||
ECA000
|
unkown
|
page write copy
|
||
4F6C000
|
stack
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
4EE1000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
trusted library allocation
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
3B33000
|
direct allocation
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
unkown
|
page readonly
|
||
FF6000
|
trusted library allocation
|
page execute and read and write
|
||
75E000
|
stack
|
page read and write
|
||
1127000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2BFD000
|
trusted library allocation
|
page read and write
|
||
4B7D000
|
stack
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
73CCD000
|
unkown
|
page read and write
|
||
3CD9000
|
direct allocation
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
2970000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
2AE5000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
4EDE000
|
trusted library allocation
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
CDD000
|
trusted library allocation
|
page execute and read and write
|
||
2B7F000
|
trusted library allocation
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
3B60000
|
direct allocation
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
5EE0000
|
trusted library allocation
|
page execute and read and write
|
||
73CCF000
|
unkown
|
page readonly
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
281E000
|
stack
|
page read and write
|
||
3C8D000
|
direct allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
1005000
|
trusted library allocation
|
page execute and read and write
|
||
12A1000
|
heap
|
page read and write
|
||
1CCE000
|
stack
|
page read and write
|
||
3AE6000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2B09000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
EBE000
|
unkown
|
page readonly
|
||
602E000
|
stack
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
4EF2000
|
trusted library allocation
|
page read and write
|
||
3AA9000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
3AE3000
|
direct allocation
|
page read and write
|
||
100B000
|
trusted library allocation
|
page execute and read and write
|
||
2953000
|
heap
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
3AE3000
|
direct allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
73CB0000
|
unkown
|
page readonly
|
||
2BEE000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
3B33000
|
direct allocation
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
79E000
|
stack
|
page read and write
|
||
F07000
|
unkown
|
page readonly
|
||
3B60000
|
direct allocation
|
page read and write
|
||
73CB1000
|
unkown
|
page execute read
|
||
3CFE000
|
direct allocation
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
3C89000
|
direct allocation
|
page read and write
|
||
5E1D000
|
heap
|
page read and write
|
||
39C0000
|
direct allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
CC3000
|
trusted library allocation
|
page execute and read and write
|
||
111A000
|
heap
|
page read and write
|
||
3CDD000
|
direct allocation
|
page read and write
|
||
3C89000
|
direct allocation
|
page read and write
|
||
CC4000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
direct allocation
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
trusted library allocation
|
page execute and read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
trusted library allocation
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
1007000
|
trusted library allocation
|
page execute and read and write
|
||
1114000
|
heap
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
676D000
|
stack
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
39C0000
|
direct allocation
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
1114000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
direct allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute and read and write
|
||
2BD7000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page execute and read and write
|
||
3D4E000
|
direct allocation
|
page read and write
|
||
285C000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
3C8D000
|
direct allocation
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
10DE000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
2930000
|
trusted library allocation
|
page execute and read and write
|
||
1118000
|
heap
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
6030000
|
trusted library allocation
|
page execute and read and write
|
||
73CC6000
|
unkown
|
page readonly
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
unkown
|
page readonly
|
||
6778000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
trusted library allocation
|
page read and write
|
||
E9D000
|
unkown
|
page readonly
|
||
110A000
|
heap
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
39C0000
|
direct allocation
|
page read and write
|
||
1112000
|
heap
|
page read and write
|
||
3C8D000
|
direct allocation
|
page read and write
|
||
DFC000
|
stack
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
2C03000
|
trusted library allocation
|
page read and write
|
||
F07000
|
unkown
|
page readonly
|
||
517C000
|
stack
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
There are 228 hidden memdumps, click here to show them.