Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
__ ___.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\__ ___.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\__ ___.scr.exe
|
"C:\Users\user\Desktop\__ ___.scr.exe"
|
||
C:\Users\user\Desktop\__ ___.scr.exe
|
"C:\Users\user\Desktop\__ ___.scr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
spencerstuartllc.top/document/five/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://www.ibsensoftware.com/
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
391C000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
397F000
|
trusted library allocation
|
page read and write
|
||
701000
|
remote allocation
|
page read and write
|
||
4CF1000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
700000
|
remote allocation
|
page execute and read and write
|
||
A3E000
|
stack
|
page read and write
|
||
5847000
|
heap
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
4D99000
|
trusted library allocation
|
page read and write
|
||
4CD4000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
C48000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7A0000
|
remote allocation
|
page execute and read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
267D000
|
stack
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
4CDB000
|
trusted library allocation
|
page read and write
|
||
4C98000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
4D05000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
3CD000
|
stack
|
page read and write
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
4EF2000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
AB4000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
4EC3000
|
trusted library section
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
4CA5000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
4E90000
|
trusted library section
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
AD6000
|
trusted library allocation
|
page execute and read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
583D000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
482000
|
unkown
|
page readonly
|
||
2690000
|
heap
|
page read and write
|
||
4CF6000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4EF9000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
494D000
|
stack
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
AA3000
|
trusted library allocation
|
page execute and read and write
|
||
4F10000
|
trusted library section
|
page read and write
|
||
ADA000
|
trusted library allocation
|
page execute and read and write
|
||
480000
|
unkown
|
page readonly
|
||
AC0000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page execute and read and write
|
||
1020000
|
heap
|
page read and write
|
||
5D2F000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
AE7000
|
trusted library allocation
|
page execute and read and write
|
||
522E000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
trusted library allocation
|
page read and write
|
||
AA4000
|
trusted library allocation
|
page read and write
|
||
4EC000
|
unkown
|
page readonly
|
||
2687000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
AEB000
|
trusted library allocation
|
page execute and read and write
|
||
50AE000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
There are 96 hidden memdumps, click here to show them.