Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ-HL51L05.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autED7A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autEDC9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cunili
|
ASCII text, with very long lines (29744), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\meshummad
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ-HL51L05.exe
|
"C:\Users\user\Desktop\RFQ-HL51L05.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\RFQ-HL51L05.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r3.o.lencr.org0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.cmcapama.top
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://cmcapama.top
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.cmcapama.top
|
unknown
|
||
cmcapama.top
|
194.36.191.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.36.191.196
|
cmcapama.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26FE000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
7C2000
|
system
|
page execute and read and write
|
||
1260000
|
direct allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
140B000
|
heap
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
F9F000
|
unkown
|
page read and write
|
||
3AB0000
|
direct allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
A3A000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
AB3000
|
trusted library allocation
|
page execute and read and write
|
||
A02000
|
heap
|
page read and write
|
||
F6F000
|
unkown
|
page readonly
|
||
3C10000
|
direct allocation
|
page read and write
|
||
6390000
|
heap
|
page read and write
|
||
4BE3000
|
heap
|
page read and write
|
||
3714000
|
trusted library allocation
|
page read and write
|
||
FAA000
|
unkown
|
page readonly
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
3DEE000
|
direct allocation
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
stack
|
page read and write
|
||
1E9F000
|
stack
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
C1D000
|
trusted library allocation
|
page execute and read and write
|
||
588E000
|
stack
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
1445000
|
heap
|
page read and write
|
||
ABD000
|
trusted library allocation
|
page execute and read and write
|
||
FA8000
|
unkown
|
page readonly
|
||
F6F000
|
unkown
|
page readonly
|
||
3D79000
|
direct allocation
|
page read and write
|
||
C35000
|
trusted library allocation
|
page execute and read and write
|
||
995000
|
heap
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
FB8000
|
unkown
|
page readonly
|
||
3A70000
|
direct allocation
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
3BD3000
|
direct allocation
|
page read and write
|
||
F95000
|
unkown
|
page readonly
|
||
3BD3000
|
direct allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
FA8000
|
unkown
|
page readonly
|
||
3D39000
|
direct allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page execute and read and write
|
||
1415000
|
heap
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
36D9000
|
trusted library allocation
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
5A02000
|
heap
|
page read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
46B8000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
26FC000
|
trusted library allocation
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
5A5E000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
C26000
|
trusted library allocation
|
page execute and read and write
|
||
59F0000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
F9F000
|
unkown
|
page write copy
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
3D79000
|
direct allocation
|
page read and write
|
||
7F870000
|
trusted library allocation
|
page execute and read and write
|
||
789000
|
stack
|
page read and write
|
||
3DEE000
|
direct allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page execute and read and write
|
||
2725000
|
trusted library allocation
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
2717000
|
trusted library allocation
|
page read and write
|
||
FB8000
|
unkown
|
page readonly
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
7C0000
|
system
|
page execute and read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
4C0E000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
C37000
|
trusted library allocation
|
page execute and read and write
|
||
68A000
|
stack
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
4BB0000
|
trusted library allocation
|
page execute and read and write
|
||
3DEE000
|
direct allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
5C1D000
|
stack
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page execute and read and write
|
||
59D0000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
519C000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
484D000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
4C9C000
|
stack
|
page read and write
|
||
4BFE000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
3C50000
|
direct allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
3D7D000
|
direct allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
trusted library allocation
|
page read and write
|
||
59F8000
|
heap
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
5A40000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
FAA000
|
unkown
|
page readonly
|
||
A30000
|
heap
|
page read and write
|
||
CDC000
|
stack
|
page read and write
|
||
FA3000
|
unkown
|
page write copy
|
||
3C50000
|
direct allocation
|
page read and write
|
||
3AB0000
|
direct allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
5B3D000
|
stack
|
page read and write
|
||
11B0000
|
direct allocation
|
page execute and read and write
|
||
4C16000
|
trusted library allocation
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
C32000
|
trusted library allocation
|
page read and write
|
||
3BD3000
|
direct allocation
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
direct allocation
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
3D79000
|
direct allocation
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3D7D000
|
direct allocation
|
page read and write
|
||
3D7D000
|
direct allocation
|
page read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
4F2C000
|
stack
|
page read and write
|
||
59DE000
|
heap
|
page read and write
|
||
3AB0000
|
direct allocation
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
C2A000
|
trusted library allocation
|
page execute and read and write
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
110E000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
C3B000
|
trusted library allocation
|
page execute and read and write
|
||
12EE000
|
heap
|
page read and write
|
||
F95000
|
unkown
|
page readonly
|
||
4BF6000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
stack
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
There are 217 hidden memdumps, click here to show them.