Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
hcjt7Ajt5t.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hcjt7Ajt5t.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\hcjt7Ajt5t.exe
|
"C:\Users\user\Desktop\hcjt7Ajt5t.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pushjellysingeywus.shop/api
|
172.67.217.241
|
||
pushjellysingeywus.shop
|
|||
bordersoarmanusjuw.shop
|
|||
suitcaseacanehalk.shop
|
|||
entitlementappwo.shop
|
|||
economicscreateojsu.shop
|
|||
mealplayerpreceodsju.shop
|
|||
absentconvicsjawun.shop
|
|||
wifeplasterbakewis.shop
|
|||
https://pushjellysingeywus.shop/Oi
|
unknown
|
||
https://pushjellysingeywus.shop/apip
|
unknown
|
||
https://pushjellysingeywus.shop/l
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pushjellysingeywus.shop
|
172.67.217.241
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.217.241
|
pushjellysingeywus.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3815000
|
trusted library allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
2812000
|
trusted library allocation
|
page execute and read and write
|
||
2A4C000
|
stack
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
3324000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
E4B000
|
trusted library allocation
|
page execute and read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
F2A000
|
heap
|
page read and write
|
||
E24000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
E13000
|
trusted library allocation
|
page execute and read and write
|
||
B09000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
F70000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
26BD000
|
stack
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
2825000
|
trusted library allocation
|
page read and write
|
||
D68000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page execute and read and write
|
||
294E000
|
stack
|
page read and write
|
||
CBF000
|
stack
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page execute and read and write
|
||
44A000
|
remote allocation
|
page execute and read and write
|
||
5BC000
|
stack
|
page read and write
|
||
32E7000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
E14000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
AEC000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
11B0000
|
heap
|
page read and write
|
||
338E000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
There are 79 hidden memdumps, click here to show them.