Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NRFQFP.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut7D3A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\seskin
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NRFQFP.exe
|
"C:\Users\user\Desktop\NRFQFP.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\NRFQFP.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B0000
|
system
|
page execute and read and write
|
||
2CD0000
|
direct allocation
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
FC1000
|
unkown
|
page execute read
|
||
4339000
|
direct allocation
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
18E3000
|
heap
|
page read and write
|
||
17DB000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1190000
|
direct allocation
|
page read and write
|
||
18AE000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
104D000
|
unkown
|
page readonly
|
||
4210000
|
direct allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
23BE000
|
stack
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
1ADC000
|
heap
|
page read and write
|
||
209E000
|
stack
|
page read and write
|
||
2F00000
|
direct allocation
|
page execute and read and write
|
||
2613000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
FC1000
|
unkown
|
page execute read
|
||
106E000
|
unkown
|
page readonly
|
||
4339000
|
direct allocation
|
page read and write
|
||
106E000
|
unkown
|
page readonly
|
||
2613000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
18E3000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
31D1000
|
direct allocation
|
page execute and read and write
|
||
18E3000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
18E2000
|
heap
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
1084000
|
unkown
|
page readonly
|
||
4070000
|
direct allocation
|
page read and write
|
||
107A000
|
unkown
|
page write copy
|
||
2613000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
23D000
|
stack
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2817000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
2E2D000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
||
2613000
|
heap
|
page read and write
|
||
31CD000
|
direct allocation
|
page execute and read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
104D000
|
unkown
|
page readonly
|
||
3242000
|
direct allocation
|
page execute and read and write
|
||
107F000
|
unkown
|
page write copy
|
||
4339000
|
direct allocation
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
107A000
|
unkown
|
page read and write
|
||
1A5A000
|
heap
|
page read and write
|
||
1084000
|
unkown
|
page readonly
|
||
2C23000
|
heap
|
page read and write
|
||
2602000
|
heap
|
page read and write
|
||
3401000
|
heap
|
page read and write
|
||
2E29000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
17BB000
|
stack
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
18E3000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page execute and read and write
|
||
2901000
|
heap
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
2805000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
17FC000
|
stack
|
page read and write
|
||
1930000
|
heap
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
27C000
|
stack
|
page read and write
|
||
309E000
|
direct allocation
|
page execute and read and write
|
||
2817000
|
heap
|
page read and write
|
||
3029000
|
direct allocation
|
page execute and read and write
|
||
D2A000
|
stack
|
page read and write
|
||
2812000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
302D000
|
direct allocation
|
page execute and read and write
|
||
320000
|
heap
|
page read and write
|
||
2D30000
|
direct allocation
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
18DA000
|
heap
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
1AD8000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1ADF000
|
heap
|
page read and write
|
||
18AA000
|
heap
|
page read and write
|
||
2380000
|
direct allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
2805000
|
heap
|
page read and write
|
||
FC0000
|
unkown
|
page readonly
|
There are 154 hidden memdumps, click here to show them.