Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
bUHF.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bUHF.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\bUHF.exe
|
"C:\Users\user\Desktop\bUHF.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUHF.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rusia.duckdns.org
|
|||
http://go.microsoft.
|
unknown
|
||
http://go.microsoft.LinkId=42127
|
unknown
|
||
http://go.micros
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rusia.duckdns.org
|
46.246.84.12
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.246.84.12
|
rusia.duckdns.org
|
Sweden
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\SOFTWARE\aed0817703934
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22000
|
unkown
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
340E000
|
unkown
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
2AC6000
|
trusted library allocation
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
81A000
|
trusted library allocation
|
page execute and read and write
|
||
1B6000
|
stack
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
28000
|
unkown
|
page readonly
|
||
812000
|
trusted library allocation
|
page execute and read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page execute and read and write
|
||
27FA000
|
trusted library allocation
|
page read and write
|
||
36D1000
|
trusted library allocation
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
842000
|
trusted library allocation
|
page read and write
|
||
80A000
|
trusted library allocation
|
page execute and read and write
|
||
493C000
|
stack
|
page read and write
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
847000
|
trusted library allocation
|
page execute and read and write
|
||
4D0000
|
heap
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
82A000
|
trusted library allocation
|
page execute and read and write
|
||
26D4000
|
trusted library allocation
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
48F3000
|
heap
|
page read and write
|
||
7FB50000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
827000
|
trusted library allocation
|
page execute and read and write
|
||
57D000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
46D8000
|
trusted library allocation
|
page read and write
|
||
1B9000
|
stack
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
48EB000
|
stack
|
page read and write
|
||
36EF000
|
unkown
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
4978000
|
stack
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
32FC000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page execute and read and write
|
||
48AC000
|
stack
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page execute and read and write
|
||
99E000
|
stack
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
B9000
|
stack
|
page read and write
|
||
486D000
|
stack
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
5A28000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
7AB000
|
stack
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
84B000
|
trusted library allocation
|
page execute and read and write
|
||
38A0000
|
heap
|
page read and write
|
||
27BB000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
46C000
|
stack
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
802000
|
trusted library allocation
|
page execute and read and write
|
||
486F000
|
stack
|
page read and write
|
||
83A000
|
trusted library allocation
|
page execute and read and write
|
||
3512000
|
heap
|
page read and write
|
||
6DC000
|
stack
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
832000
|
trusted library allocation
|
page execute and read and write
|
There are 90 hidden memdumps, click here to show them.