Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rOrderRequest09-24.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\wherefore
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rOrderRequest09-24.exe
|
"C:\Users\user\Desktop\rOrderRequest09-24.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\rOrderRequest09-24.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r10.o.lencr.org0#
|
unknown
|
||
http://mail.agaliofu.top
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://agaliofu.top
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
agaliofu.top
|
194.36.191.196
|
||
mail.agaliofu.top
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.36.191.196
|
agaliofu.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2901000
|
trusted library allocation
|
page read and write
|
||
2983000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
4563000
|
direct allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
4563000
|
direct allocation
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
C54000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
3F82000
|
heap
|
page read and write
|
||
C6D000
|
trusted library allocation
|
page execute and read and write
|
||
4590000
|
direct allocation
|
page read and write
|
||
4D46000
|
trusted library allocation
|
page read and write
|
||
46B9000
|
direct allocation
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
3DB0000
|
heap
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
4D52000
|
trusted library allocation
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
515E000
|
stack
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
3DF7000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
3E1A000
|
heap
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
3EF5000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
46BD000
|
direct allocation
|
page read and write
|
||
4F10000
|
heap
|
page execute and read and write
|
||
B90000
|
unkown
|
page readonly
|
||
396F000
|
trusted library allocation
|
page read and write
|
||
C8B000
|
trusted library allocation
|
page execute and read and write
|
||
529E000
|
stack
|
page read and write
|
||
3EB0000
|
heap
|
page read and write
|
||
4EEC000
|
stack
|
page read and write
|
||
3F21000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
3EE3000
|
heap
|
page read and write
|
||
4D4E000
|
trusted library allocation
|
page read and write
|
||
17E8000
|
heap
|
page read and write
|
||
1A83000
|
heap
|
page read and write
|
||
3F73000
|
heap
|
page read and write
|
||
C82000
|
trusted library allocation
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page execute and read and write
|
||
1699000
|
heap
|
page read and write
|
||
C2C000
|
unkown
|
page readonly
|
||
5E6D000
|
unkown
|
page read and write
|
||
17C4000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
46BD000
|
direct allocation
|
page read and write
|
||
3F6E000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
unkown
|
page write copy
|
||
43F0000
|
direct allocation
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
472E000
|
direct allocation
|
page read and write
|
||
4440000
|
direct allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
1B12000
|
heap
|
page read and write
|
||
1B5A000
|
heap
|
page read and write
|
||
1B07000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page execute and read and write
|
||
23DF000
|
stack
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
direct allocation
|
page read and write
|
||
C85000
|
trusted library allocation
|
page execute and read and write
|
||
54A0000
|
trusted library allocation
|
page execute and read and write
|
||
4590000
|
direct allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
3F76000
|
heap
|
page read and write
|
||
3929000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
43F2000
|
heap
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
1A37000
|
heap
|
page read and write
|
||
477E000
|
direct allocation
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
4D72000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
1BC2000
|
heap
|
page read and write
|
||
3B88000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
3DDA000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page write copy
|
||
46B9000
|
direct allocation
|
page read and write
|
||
DBA000
|
stack
|
page read and write
|
||
169C000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
1A43000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
3B8C000
|
heap
|
page read and write
|
||
4D5E000
|
trusted library allocation
|
page read and write
|
||
3F72000
|
heap
|
page execute and read and write
|
||
4D6D000
|
trusted library allocation
|
page read and write
|
||
1A65000
|
heap
|
page read and write
|
||
298B000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
470D000
|
direct allocation
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
5F6D000
|
stack
|
page read and write
|
||
C5C000
|
unkown
|
page read and write
|
||
6510000
|
trusted library allocation
|
page execute and read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
4709000
|
direct allocation
|
page read and write
|
||
4709000
|
direct allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
B7A000
|
heap
|
page read and write
|
||
5BCF000
|
heap
|
page read and write
|
||
4709000
|
direct allocation
|
page read and write
|
||
3E3C000
|
heap
|
page read and write
|
||
4489000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
3F4B000
|
heap
|
page read and write
|
||
3E94000
|
heap
|
page read and write
|
||
477E000
|
direct allocation
|
page read and write
|
||
4D4B000
|
trusted library allocation
|
page read and write
|
||
295B000
|
trusted library allocation
|
page read and write
|
||
4563000
|
direct allocation
|
page read and write
|
||
1BD6000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
C76000
|
trusted library allocation
|
page execute and read and write
|
||
3F73000
|
heap
|
page read and write
|
||
46B9000
|
direct allocation
|
page read and write
|
||
1FDE000
|
stack
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
3FF2000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
472E000
|
direct allocation
|
page read and write
|
||
C72000
|
trusted library allocation
|
page read and write
|
||
1BB0000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page execute and read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
3E8A000
|
heap
|
page read and write
|
||
43F0000
|
direct allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
470D000
|
direct allocation
|
page read and write
|
||
C2C000
|
unkown
|
page readonly
|
||
938000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
C87000
|
trusted library allocation
|
page execute and read and write
|
||
C53000
|
trusted library allocation
|
page execute and read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
4590000
|
direct allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
3B89000
|
heap
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
4440000
|
direct allocation
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
470D000
|
direct allocation
|
page read and write
|
||
C64000
|
unkown
|
page readonly
|
||
297F000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
4513000
|
direct allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
4D61000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
4440000
|
direct allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
B58000
|
heap
|
page read and write
|
||
1B2D000
|
heap
|
page read and write
|
||
26F8000
|
trusted library allocation
|
page read and write
|
||
472E000
|
direct allocation
|
page read and write
|
||
477E000
|
direct allocation
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute read
|
||
3DB0000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
46BD000
|
direct allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2955000
|
trusted library allocation
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
heap
|
page read and write
|
||
4513000
|
direct allocation
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
C64000
|
unkown
|
page readonly
|
||
49FD000
|
stack
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
4513000
|
direct allocation
|
page read and write
|
||
45E0000
|
direct allocation
|
page read and write
|
||
3EFF000
|
heap
|
page read and write
|
||
3E80000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
C5D000
|
trusted library allocation
|
page execute and read and write
|
||
83A000
|
stack
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
3C4D000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
4D66000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
7F4D0000
|
trusted library allocation
|
page execute and read and write
|
||
AB5000
|
heap
|
page read and write
|
||
C7A000
|
trusted library allocation
|
page execute and read and write
|
||
3FF2000
|
heap
|
page read and write
|
There are 217 hidden memdumps, click here to show them.