Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Label.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\Label.exe
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp
|
GIF image data, version 89a, 20545 x 7507
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp-
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\temp\192.168.2.5\c.tmp~
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~E52D1ACF.tmp
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Label.exe
|
"C:\Users\user\Desktop\Label.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c ping -n 3 127.0.0.1 >NUL & echo EEEE > "C:\Users\user\Desktop\Label.exe"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 3 127.0.0.1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25D1000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
4B4000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
48C000
|
heap
|
page read and write
|
||
61185FF000
|
stack
|
page read and write
|
||
22E557E5000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
1401AF000
|
unkown
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
140278000
|
unkown
|
page readonly
|
||
4BC000
|
heap
|
page read and write
|
||
25D7000
|
heap
|
page read and write
|
||
416000
|
heap
|
page read and write
|
||
140260000
|
unkown
|
page read and write
|
||
2C0C000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
61184FF000
|
unkown
|
page read and write
|
||
611817C000
|
stack
|
page read and write
|
||
120000
|
stack
|
page read and write
|
||
2035000
|
heap
|
page read and write
|
||
22E55A80000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
1FC1000
|
direct allocation
|
page execute and read and write
|
||
2014000
|
direct allocation
|
page execute and read and write
|
||
1401AF000
|
unkown
|
page write copy
|
||
140001000
|
unkown
|
page execute read
|
||
140250000
|
unkown
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
22E557A0000
|
heap
|
page read and write
|
||
213F000
|
stack
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
140262000
|
unkown
|
page readonly
|
||
22E557CA000
|
heap
|
page read and write
|
||
22E55A85000
|
heap
|
page read and write
|
||
140262000
|
unkown
|
page readonly
|
||
1A0000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
22E55990000
|
heap
|
page read and write
|
||
25D1000
|
heap
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
140278000
|
unkown
|
page readonly
|
||
22E557C0000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2030000
|
heap
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
22E55790000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
140251000
|
unkown
|
page write copy
|
||
22E55A90000
|
heap
|
page read and write
|
||
44B000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
1F80000
|
direct allocation
|
page execute and read and write
|
||
49E000
|
heap
|
page read and write
|
||
48B000
|
heap
|
page read and write
|
||
25E9000
|
heap
|
page read and write
|
||
14024F000
|
unkown
|
page write copy
|
||
2A0E000
|
stack
|
page read and write
|
||
22E557E6000
|
heap
|
page read and write
|
There are 54 hidden memdumps, click here to show them.