Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\7ZSfx000.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ez-az!\EasyVBO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7ZSfx000.cmd" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.winsms.co.za/api/credits.ASP?User=
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
http://www.easyas.co.zaBYour
|
unknown
|
||
https://www.easyas.co.za/downloads/7zEasyVBO.exef
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
57A000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
14002B000
|
unkown
|
page write copy
|
||
858000
|
direct allocation
|
page read and write
|
||
46EC000
|
stack
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
526000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
140031000
|
unkown
|
page readonly
|
||
190000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
56E000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
23AA000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
5D7000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
14002B000
|
unkown
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
893000
|
heap
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
29C7000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
53B000
|
heap
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
4D6F000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
5EC000
|
heap
|
page read and write
|
||
140031000
|
unkown
|
page readonly
|
||
140000000
|
unkown
|
page readonly
|
||
48CB000
|
heap
|
page read and write
|
||
45F3000
|
heap
|
page read and write
|
||
140024000
|
unkown
|
page readonly
|
||
23AF000
|
heap
|
page read and write
|
||
48CE000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
148000
|
stack
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
140024000
|
unkown
|
page readonly
|
||
5F0000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
840000
|
direct allocation
|
page read and write
|
There are 51 hidden memdumps, click here to show them.