Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TT Copy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Clinton
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TT Copy.exe
|
"C:\Users\user\Desktop\TT Copy.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\TT Copy.exe"
|
||
C:\Users\user\Desktop\TT Copy.exe
|
"C:\Users\user\Desktop\TT Copy.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\TT Copy.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://mail.mbarieservicesltd.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.mbarieservicesltd.com
|
199.79.62.115
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
199.79.62.115
|
mail.mbarieservicesltd.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53B0000
|
trusted library section
|
page read and write
|
||
2D90000
|
trusted library section
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page read and write
|
||
296E000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
3DF1000
|
trusted library allocation
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
3F12000
|
heap
|
page read and write
|
||
3DC4000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
3DB3000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page execute and read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library section
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
E30000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
5342000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
3D60000
|
heap
|
page read and write
|
||
3F23000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3EB8000
|
heap
|
page read and write
|
||
2FCE000
|
heap
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
291A000
|
trusted library allocation
|
page execute and read and write
|
||
B19000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
444000
|
system
|
page execute and read and write
|
||
3114000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
3B20000
|
direct allocation
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
heap
|
page read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
C23000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
5B2E000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
C37000
|
heap
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
3F52000
|
heap
|
page read and write
|
||
3DBF000
|
heap
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
3F61000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
FE3000
|
heap
|
page read and write
|
||
3F48000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
B42000
|
heap
|
page read and write
|
||
3F19000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
5250000
|
heap
|
page read and write
|
||
3F00000
|
heap
|
page read and write
|
||
533E000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
3F8E000
|
heap
|
page read and write
|
||
2C0C000
|
stack
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
9A000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
E35000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
3B07000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page execute and read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
160000
|
heap
|
page read and write
|
||
C2F000
|
heap
|
page read and write
|
||
B42000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
2916000
|
trusted library allocation
|
page execute and read and write
|
||
CF8000
|
stack
|
page read and write
|
||
292B000
|
trusted library allocation
|
page execute and read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
7FDD0000
|
trusted library allocation
|
page execute and read and write
|
||
178E000
|
stack
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
3F4E000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
6919000
|
trusted library allocation
|
page read and write
|
||
929000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
3FB2000
|
heap
|
page read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
3FAE000
|
heap
|
page read and write
|
||
3F4C000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
3A7E000
|
heap
|
page read and write
|
||
6990000
|
trusted library allocation
|
page read and write
|
||
3F16000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page execute and read and write
|
||
F63000
|
trusted library allocation
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
4301000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
3E36000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
46E9000
|
direct allocation
|
page read and write
|
||
3E43000
|
heap
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
3EB1000
|
heap
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
A95000
|
heap
|
page read and write
|
||
3F4C000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
3F15000
|
heap
|
page execute and read and write
|
||
3DD5000
|
heap
|
page read and write
|
||
3F61000
|
heap
|
page read and write
|
||
3FAC000
|
heap
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
3EC2000
|
heap
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
3F4E000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
3C60000
|
heap
|
page read and write
|
||
3F01000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3EB5000
|
heap
|
page read and write
|
||
583C000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
3E3C000
|
heap
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
3F48000
|
heap
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
3E89000
|
heap
|
page read and write
|
||
46ED000
|
direct allocation
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
E10000
|
trusted library section
|
page read and write
|
||
2922000
|
trusted library allocation
|
page read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
F78000
|
heap
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4620000
|
direct allocation
|
page read and write
|
||
4543000
|
direct allocation
|
page read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
8B4000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
1B2F000
|
stack
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3D00000
|
heap
|
page read and write
|
||
2927000
|
trusted library allocation
|
page execute and read and write
|
||
6900000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
3FEE000
|
heap
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
974000
|
heap
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
6634000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2F4B000
|
heap
|
page read and write
|
||
B42000
|
heap
|
page read and write
|
||
2912000
|
trusted library allocation
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
3DA2000
|
heap
|
page read and write
|
||
3F12000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4543000
|
direct allocation
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
57F2000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
56AC000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
3F60000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
547E000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
4480000
|
direct allocation
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
3E24000
|
heap
|
page read and write
|
||
5A2D000
|
stack
|
page read and write
|
||
3E87000
|
heap
|
page read and write
|
||
475E000
|
direct allocation
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
B42000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page execute and read and write
|
||
3F12000
|
heap
|
page read and write
|
||
3E60000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
5235000
|
heap
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
46E9000
|
direct allocation
|
page read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
3EB4000
|
heap
|
page execute and read and write
|
||
47BE000
|
direct allocation
|
page read and write
|
||
2925000
|
trusted library allocation
|
page execute and read and write
|
||
3EEA000
|
heap
|
page read and write
|
||
4749000
|
direct allocation
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
3F48000
|
heap
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
4620000
|
direct allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
3E1F000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
970000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
46ED000
|
direct allocation
|
page read and write
|
||
FB1000
|
heap
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
474D000
|
direct allocation
|
page read and write
|
||
695D000
|
stack
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
663E000
|
trusted library allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
475E000
|
direct allocation
|
page read and write
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
3FAC000
|
heap
|
page read and write
|
There are 317 hidden memdumps, click here to show them.