Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\MotionPro_Windows_1.2.25 (1).zip (copy)
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\MotionProSetup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\OEM.ini
|
Generic INItialization configuration [Settings]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\OEM_Help.pdf
|
PDF document, version 1.7, 10 pages
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\application.ico
|
MS Windows icon resource - 1 icon, 256x256, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\connected.ico
|
MS Windows icon resource - 4 icons, 256x256, 32 bits/pixel, 48x48, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\disconnected.ico
|
MS Windows icon resource - 4 icons, 256x256, 32 bits/pixel, 48x48, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\license.txt
|
ASCII text, with very long lines (1786), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\logo.bmp
|
PC bitmap, Windows 3.x format, 190 x 56 x 24, image size 32032, resolution 3780 x 3780 px/m, cbSize 32086, bits offset 54
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\motionpro_templete.ini
|
Microsoft Windows Autorun file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\oauth.png
|
PNG image data, 120 x 120, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae\MotionProSetup\reconnecting.ico
|
MS Windows icon resource - 4 icons, 256x256, 32 bits/pixel, 48x48, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\56f01623-0cbf-4c0f-b639-a76b581c07a5.tmp
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\Downloads\MotionPro_Windows_1.2.25 (1).zip.crdownload
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1912,i,11780309818604107129,14762667450560493039,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://nxtgen.infinitevaults.com/index.php/s/0jEImnXiQQYBh5D/download"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\MotionPro_Windows_1.2.25 (1).zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\2gqt1g00.4ae" "C:\Users\user\Downloads\MotionPro_Windows_1.2.25
(1).zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nxtgen.infinitevaults.com/index.php/s/0jEImnXiQQYBh5D/download
|
|||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.arraynetworks.net
|
unknown
|
||
http://nxtgen.infinitevaults.com/index.php/s/0jEImnXiQQYBh5D/download
|
103.230.39.225
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
nxtgen.infinitevaults.com
|
103.230.39.225
|
||
www.google.com
|
142.250.189.132
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
103.230.39.225
|
nxtgen.infinitevaults.com
|
Singapore
|
||
142.250.189.132
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1892000
|
trusted library allocation
|
page execute and read and write
|
||
4641000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
36A9000
|
trusted library allocation
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
stack
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
1A90000
|
trusted library allocation
|
page read and write
|
||
596D000
|
stack
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
369E000
|
trusted library allocation
|
page read and write
|
||
367A000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
16CD000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
18A2000
|
trusted library allocation
|
page execute and read and write
|
||
BBC000
|
stack
|
page read and write
|
||
16B7000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
18EB000
|
trusted library allocation
|
page execute and read and write
|
||
189A000
|
trusted library allocation
|
page execute and read and write
|
||
36A3000
|
trusted library allocation
|
page read and write
|
||
16E8000
|
heap
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
135B000
|
stack
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
369B000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
18E7000
|
trusted library allocation
|
page execute and read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
7F790000
|
trusted library allocation
|
page execute and read and write
|
||
3641000
|
trusted library allocation
|
page read and write
|
||
1A8F000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5AAD000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
16D2000
|
heap
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
1356000
|
stack
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
1B0E000
|
stack
|
page read and write
|
||
18D0000
|
heap
|
page execute and read and write
|
||
367C000
|
trusted library allocation
|
page read and write
|
||
169B000
|
heap
|
page read and write
|
||
1359000
|
stack
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
3695000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
18AA000
|
trusted library allocation
|
page execute and read and write
|
||
169E000
|
heap
|
page read and write
|
||
18AC000
|
trusted library allocation
|
page execute and read and write
|
||
EFD000
|
stack
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
18C2000
|
trusted library allocation
|
page execute and read and write
|
||
36A6000
|
trusted library allocation
|
page read and write
|
||
18CA000
|
trusted library allocation
|
page execute and read and write
|
||
5D2E000
|
stack
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
trusted library allocation
|
page execute and read and write
|
There are 72 hidden memdumps, click here to show them.